Posts

Understanding VLANs: Tagged, Untagged, and Native VLANs

Image
What is VLAN ?? Virtual Local Area Networks (VLANs) are a fundamental concept in modern networking, allowing us to segment a physical network into multiple logical networks. By creating VLANs, we can isolate traffic, enhance security, and improve network performance. However, to fully utilize VLANs, it's crucial to understand the differences between tagged, untagged, and native VLANs. Untagged VLANs Untagged VLANs are the default configuration for most network devices. When a device sends a packet to a switch, it does not include any VLAN information. The switch then assigns the packet to a specific VLAN based on the port configuration. For example, if a port is configured as an untagged member of VLAN 10, any untagged packets received on that port will be associated with VLAN 10 . Untagged VLANs are typically used for end devices that do not support VLAN tagging, such as workstations, IP cameras, and some servers. These devices simply want to communicate on the netw

50+ Best Ethical hacking free resources and Tools, lab

Image
    Online Penetration testing Resources and Tools Penetration Testing Resources Metasploit Unleashe – Free Offensive Security Metasploit course The Metasploit Unleashed (MSFU) course is provided free of charge by Offensive Security in order to raise awareness for underprivileged children in East Africa. PTES  – Penetration Testing Execution Standard The penetration testing execution standard consists of seven (7) main sections. Pre-engagement Interactions Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Reporting OWASP  – Open Web Application Security Project Open Web Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software PENTEST-WIKI  – A free online security knowledge library for pentesters / researchers. pentest-wiki is a free online security knowledge library for pentesters / researchers. Vulnerability Assessment Framework  – Penetration Testing Framework. The Pentes ters Framew

Network fundamantal ( free CCNA 200-301 Course class 1 )

Image
Network Fundamentals

What is OSI Model | How OSI Model works ?

Image
INTRO TO OSI Model      [ Open Systems Interconnection ] In the early 1980s , the development of networks was chaotic. Each vendor had its own proprietary solution(PC). The bad part was that one vendor’s solution(PC) was not compatible with another vendor’s solution (PC) ex. IBM and Microsoft both are developing they own standard so only Microsoft can communicate with Microsoft computer and IBM can communicate with IBM computer. This is where  I nternational Organization for Standardization (ISO) come in action and ISO  developed an Open model called OSI Model ( Open System Interconnection ) ,OSI comes with a Layering approach to the network or hardware vendors would design hardware for network, and others could develop software for the application for this hardware or network. Using an open model which everyone agrees so means we can build a network that is compatible with each other.        The OSI Model is a conceptual Model ,  Nowadays most vendors build networks based on the