Network forensics / UC2DIN101

Network forensics / UC2DIN101

Most of the time when you are doing different types of forensics work, you analyze different types of data stored in different ways – like hard drives, ram storage, flash and so on. With network forensics it is a bit different, because normally you dont leave...
Cracking WEP / UC2WMD051

Cracking WEP / UC2WMD051

Although most providers and users today are using WPA2 encryption, there are still a lot of users that set their wireless network with WEP security (Wired Equivalent Privacy). It is estimated that the amount of WEP-users correlate with the number of Swedish people in...
Network scan / UC2WMD051

Network scan / UC2WMD051

After you have gained access to a network either by doing the MITM attack, or perhaps using Brute Force or social engineering, there are a number of different things you can do to go from there. Like looking at the network traffic with Wireshark or you can force users...
Interaction / UC2NSE101

Interaction / UC2NSE101

In previous courses we all have not been performing our best in the department of interaction with our peers. We can gain a lot from this, and especially in the networking class I felt this were important. Since network is one of those topics you don`t get to play...
Wild Cards / UC2NSE101

Wild Cards / UC2NSE101

One part that I struggled to understand was the implementation of wild cards in subnet masks. Or to be more precise, how you could calculate them. But before I explain how they work, I will explain what they are used for. Lets say you have big network with a massive...