Capturing Network Traffic and Logs – CompTIA Security+ SY0-401: 2.4

Capturing Network Traffic and Logs – CompTIA Security+ SY0-401: 2.4

A lot of the things we do with our computers traverse the network. They’re sending information back and forth over our network connections. And being able to pull up traffic logs can tell you a lot about what a person did, where they visited on the network, what information might have been transferred. These are

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2

The domain name services are a critical part of our IP networking. These are obviously the servers that are taking the names that we provide and give us IP addresses in translation. If you’re able to modify the information in the DNS server, if you are able to manipulate the information inside of this DNS

Proxy Servers – CompTIA Network+ N10-006 – 1.3

Proxy Servers – CompTIA Network+ N10-006 – 1.3

A proxy server is a device that sits in the middle of the communication and makes the request for us, thus the name proxy when we talk about a proxy server. Our client workstation would communicate to a proxy– maybe request a website– the proxy then goes to the website, receives the response from that