User contributions for Vegard
Jump to navigation
Jump to search
20 June 2025
- 08:3308:33, 20 June 2025 diff hist +179 Scripting Basics →Scripting Basics current
- 08:1408:14, 20 June 2025 diff hist −31 Basic Linux Commands →Replace Text In File Preview current
- 08:1208:12, 20 June 2025 diff hist +237 m Basic Linux Commands →Examples
- 08:1008:10, 20 June 2025 diff hist +220 Basic Linux Commands →Examples
15 June 2025
- 06:2706:27, 15 June 2025 diff hist −26 m Nmap →Performance & Output current
- 06:0406:04, 15 June 2025 diff hist −13 m Nmap →Detection & Enumeration
- 06:0406:04, 15 June 2025 diff hist −210 m Nmap No edit summary
- 06:0306:03, 15 June 2025 diff hist +1,446 m Nmap No edit summary
- 05:4805:48, 15 June 2025 diff hist +211 m Password Attacks →Tools current
- 05:3705:37, 15 June 2025 diff hist +3,514 N Password Attacks Created page with "== Password Attacks == Password attacks target authentication systems by attempting to gain access using valid or guessed credentials. These techniques play a central role in assessing the strength of user access controls, exposing weak password hygiene, misconfigurations, or lack of rate-limiting. Password-based authentication remains the most common form of access control, making it a recurring target for security assessments and enumeration strategies. === Goals ==..."
14 June 2025
- 14:1314:13, 14 June 2025 diff hist +4,716 N Making HTTP Requests Created page with "= Making HTTP Requests = == Introduction == HTTP requests are used to interact with web servers by requesting data, submitting forms, uploading files, or modifying resources. Understanding how each method works enables deeper interaction with web applications and can expose misconfigurations or unintended functionality. This page outlines how common HTTP methods are used in practice, with real-world examples suitable for exploration and testing. == GET == The GET me..." current
- 07:3407:34, 14 June 2025 diff hist +5,012 N HTTP Protocols Created page with "= HTTP Protocols = == Introduction == The Hypertext Transfer Protocol (HTTP) is the application-layer protocol used for communication between clients and servers on the web. It enables retrieval of resources such as HTML, JSON, or binary content by defining a standardized format for request and response messages. HTTP is stateless, meaning each request is independent unless explicitly managed using sessions, cookies, or tokens. == HTTP vs HTTPS == {| class="wikitabl..."
13 June 2025
- 14:3214:32, 13 June 2025 diff hist +4,381 N Stateless vs Stateful Firewalls Created page with "= Stateless vs Stateful Firewalls = ; Introduction : Firewalls control how traffic enters or leaves a network. : They inspect packets and decide to allow or block them based on rules. : There are two core types of firewalls — '''stateless''' and '''stateful'''. : Knowing the difference is key to understanding how filtering works in both simple and complex environments. == Visual Summary == {| class="wikitable" ! Firewall Type !! Tracks Sessions? !! Decision..." current
- 13:4413:44, 13 June 2025 diff hist +229 m UDP Protocol →3. UDP Header Structure current
- 13:4113:41, 13 June 2025 diff hist +4,656 N UDP Protocol Created page with "= UDP Protocols = ; Purpose : UDP (User Datagram Protocol) is one of the two main transport protocols in the TCP/IP suite, alongside TCP. : It provides a simple, fast way to send data over networks without establishing a connection or tracking session state. : Understanding how UDP behaves helps identify when it is used, how it differs from TCP, and what it means when analyzing or generating traffic. == 1. Key Characteristics of UDP == UDP is a connectionless an..."
- 13:3013:30, 13 June 2025 diff hist −53 TCP/IP Stack →TCP/IP Stack — For Learners Who Want Full Network Understanding Tag: Visual edit
- 13:2813:28, 13 June 2025 diff hist +109 m Networking Concepts →Networking Concepts
- 13:2113:21, 13 June 2025 diff hist +4,435 N TCP/IP Stack Created page with "= TCP/IP Stack — For Learners Who Want Full Network Understanding = ; Purpose : The TCP/IP stack shows how data travels through a network, from a software application to the physical wire or Wi-Fi signal. : Understanding this structure is key to reading, analyzing, and shaping network traffic with intention. == 1. The Four TCP/IP Layers == Each layer plays a specific role. Together, they handle everything from human-readable data to raw electrical signals. {| cl..."
7 June 2025
- 13:5913:59, 7 June 2025 diff hist −1,400 m Networking Concepts →Networking Concepts
- 13:5713:57, 7 June 2025 diff hist +779 Networking Concepts No edit summary
- 12:0412:04, 7 June 2025 diff hist +2,299 N Ping Created page with "= Ping = '''Ping''' is a fundamental network utility used to test the reachability and responsiveness of a target device on a network. == What Ping Does == Ping sends a type of packet called an '''ICMP Echo Request''' to a specified IP address or hostname. If the target is online and reachable, it replies with an '''ICMP Echo Reply'''. This process measures both '''connectivity''' and '''latency''' between source and destination. == ICMP Protocol == Ping operates us..." current
- 11:5811:58, 7 June 2025 diff hist +2 m IP Addressing →IPv4 Format current
- 11:5611:56, 7 June 2025 diff hist +4 MAC Addressing →How MAC Addresses Work current
- 11:5511:55, 7 June 2025 diff hist +2,423 N MAC Addressing Created page with "= MAC Addressing = Every device on a network has a built-in network interface, and that interface is assigned a unique identifier called a '''MAC address''' (Media Access Control address). == What is a MAC Address? == A MAC address is a 48-bit identifier burned into the device’s network interface card (NIC) by the manufacturer. It's written as 12 hexadecimal digits, grouped in pairs, separated by colons. '''Example:''' <pre> a4:c3:f0:85:ac:2d </pre> === Breakdown..."
- 11:4911:49, 7 June 2025 diff hist +384 m IP Addressing →Private vs Public IP Addresses
- 11:4711:47, 7 June 2025 diff hist +2,571 N IP Addressing Created page with "= IP Addressing = IP (Internet Protocol) addresses are numerical labels used to identify devices on a network. Without them, no device would know where to send or receive data. == What is an IP Address? == An IP address is a unique identifier for a device on a network. It works like a digital address so data knows where to go. === IPv4 Format === Most commonly, IP addresses appear in IPv4 format: four numbers (0–255) separated by dots. Example: * `192.168.1.10`..."
- 11:4211:42, 7 June 2025 diff hist +1,241 Networking Concepts →Network Fundamentals
4 June 2025
- 18:3518:35, 4 June 2025 diff hist −1,973 m Main Page Reverted edits by Vegard (talk) to last revision by 84.211.245.84 Tag: Rollback
30 May 2025
- 22:3722:37, 30 May 2025 diff hist +3,318 N Maintaining Access Created page with "== Maintaining Access == Once initial access is achieved, attackers often need to maintain persistent access to the compromised system without detection. This phase involves deploying tools and methods that ensure continued control while evading monitoring systems and incident response. Maintaining access is typically reserved for advanced engagements such as red teaming or adversary simulation, and focuses on stealth, resilience, and persistence. These techniques corr..." current
- 18:5218:52, 30 May 2025 diff hist +341 m Privilege Escalation →Linux Enumeration Commands current
- 18:5118:51, 30 May 2025 diff hist +3,576 Privilege Escalation →Linux Enumeration Commands
- 18:4218:42, 30 May 2025 diff hist +11,212 Privilege Escalation →Linux Enumeration Commands
- 18:3218:32, 30 May 2025 diff hist +3,339 m Privilege Escalation →Linux Enumeration Commands
- 18:2818:28, 30 May 2025 diff hist +751 m Privilege Escalation →Linux Enumeration Commands
- 18:1118:11, 30 May 2025 diff hist +4 m Privilege Escalation →Linux Enumeration Commands
- 18:0718:07, 30 May 2025 diff hist +1,176 Privilege Escalation →Linux Enumeration Commands
- 17:3617:36, 30 May 2025 diff hist +477 Privilege Escalation →Privilege Escalation
- 17:2217:22, 30 May 2025 diff hist +539 Privilege Escalation →Linux Enumeration Commands
- 16:5516:55, 30 May 2025 diff hist +285 m Privilege Escalation →Linux Enumeration Commands
- 00:2900:29, 30 May 2025 diff hist +306 Privilege Escalation →Windows
- 00:2800:28, 30 May 2025 diff hist +273 m Privilege Escalation →Linux
- 00:2700:27, 30 May 2025 diff hist +1,160 Privilege Escalation No edit summary
- 00:2500:25, 30 May 2025 diff hist +4,395 N Privilege Escalation Created page with "= Privilege Escalation = Privilege escalation is the process of gaining higher-level permissions or access within a system after an initial foothold has been established. It plays a critical role in post-exploitation, allowing an attacker to move from a limited user account to administrative or root-level access — often enabling lateral movement, persistence, or full system compromise. Privilege escalation is typically divided into two categories: *vertical escalat..."
29 May 2025
- 23:3623:36, 29 May 2025 diff hist +1,323 m Dig →Examples current
- 23:3223:32, 29 May 2025 diff hist +3,706 N Dig Created page with "= dig = '''dig''' (Domain Information Groper) is a powerful command-line DNS lookup tool used to query DNS name servers and retrieve resource records. It is commonly used in reconnaissance to resolve hostnames, enumerate DNS records, test custom name servers, and analyze DNS responses in detail. == <span id="options"></span>Common Options == === Basic Queries === {| class="wikitable" ! Option !! Description |- | <code>A</code> || Query IPv4 address record..."
- 23:2923:29, 29 May 2025 diff hist +1,749 m Ffuf No edit summary current
- 02:3402:34, 29 May 2025 diff hist +1,927 Networking Concepts →Port Overview
- 02:3302:33, 29 May 2025 diff hist −19 m Networking Concepts No edit summary
- 02:3202:32, 29 May 2025 diff hist −948 Networking Concepts No edit summary
- 01:5201:52, 29 May 2025 diff hist +5,330 N Networking Concepts Created page with "== Networking Concepts == Networking is the backbone of all digital communication. Understanding how systems connect, route data, and expose services is foundational for both attackers and defenders. === Core Concepts === * OSI Model and TCP/IP Stack * IP Addressing (IPv4 vs IPv6), CIDR Notation, Subnets * MAC Addressing and ARP Protocol * DNS Resolution and record types (A Record, CNAME, MX, TXT) * NAT, PAT, and..."