Posts

Featuring...

Telnet Under the Microscope: Why It's Unsafe for Modern Use

Image
Telnet, an early protocol for remote server and device access, was once groundbreaking. However, in today’s era of cybersecurity threats, Telnet’s lack of encryption has made it obsolete and dangerous to use. This blog will demonstrate the security risks of Telnet by capturing and analysing its unencrypted communication over a network. We Will: Create two Ubuntu instances using Multipass. Install and configure a Telnet server on one instance. Create a user and password on the server. Capture network packets while authenticating to the server. Analyse the captured packets to show how credentials are sent in plain text. Part 1: Introduction and Setting Up Ubuntu Instances In Part 1 , we start by setting up Ubuntu instances using Multipass . We walk through the process of creating a Telnet server and Telnet client , preparing the environment for the next steps. Watch the video here: In Part 2 , we install and configure the telnetd package on the Telnet server . This is the crucial step...

What Happens Under the Hood of SSH Connections? Analyzing SSH Packets with Wireshark.

Image
Prerequisites Before we dive into packet analysis, make sure you have the following set up: Two Endpoints (VMs or Containers) Wireshark tcpdump It’s also important to have a basic understanding of: TCP SSH Linux Introduction In this blog post, I'll guide you through the step-by-step process of analyzing SSH connection packets using Wireshark. Whether you're troubleshooting SSH issues or simply curious about how SSH works at the protocol level, this tutorial is for you. We'll cover both successful and failed SSH connections, examining the packet flow and explaining what’s happening in the background. I've already set up a working environment for this use case. Let’s dive right into packet capture and analysis, and uncover what happens during an SSH connection. Fig. 1: A list of servers with roles and IP addresses for quick network reference. Breaking Down Packet Capture and Analysis: A Step-by-Step Guide In this post, we'll break down the process of packet capture...

Continuous Integrations Concepts and Demo

Image
Continuous Integration  (CI) is a development practice where developers commit  code into a shared repository frequently, preferably several times a day. Each commit  then gets verified by an integrated & automated build and similarly with integrated & automated tests. While automated tests aren't strictly part of CI but typically implied. The posted video includes two demos with relative examples and CI concepts. Demo 1:    Python Flask API, Test Cases, Azure DevOps Intro, Docker Multi Stage Builds & CI with GitHub Demo 2:    Python Django MVT Application, Jenkins pipeline , Docker Hub , Terraform, GitHub

Containers and Virtual Machines Explained || Containerization is new virtualization || DevOps

Image
    Virtualization is about abstracting the hardware of single computer into several execution environments,thereby creating an illusion that each separate environment is running its own private computer. Containerization is new virtualization , Container is all about cgroups and Namespaces In this video i have tried explaining on virtual machines and containers subscribe for more Thank you !!!

Netcat: ( TCP/IP Swiss Army Knife ) | DevOps | Linux | Use-Cases

Image
netcat (often abbreviated to nc ) is a computer networking utility for reading from and writing to network connections using TCP and UDP The command  is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation tool, since it can produce almost any kind of connection its user could need and has a number of built-in capabilities.  Features:   - port scanning, transferring files, and port listening, and it can be used as a backdoor The way I learn CLI tools is by first learning the usage of the tool, followed by committing a few simple commands to muscle memory I have tried to cover few use cases with netcat in this video Thanks you, Subscribe osgroup-techies for more  

Certification for Kubernetes? I got it covered.

Image
Working in such a rapidly growing software industry, there are new software and certifications which are announced almost every day. And for every new certification announced, you would think that doing it would be cool or help you in your career. Similarly, I saw some of the certification announcements, which included AWS, Azure, Jenkins, Docker, and Kubernetes certification. My initial thought was that I should do each & every one of them, but time passed by and here I am, with just one and only certification "CKA". This made me realize and question myself if completing a certification is necessary. Decision : Here is my take on it. Holding a certification won’t get you on top of the world, and not holding one will not make you fall. That being said, I enrolled to complete CKA, and here are a few points which made it easier for me to decide. 1. Cost : For some, this may not be the most important, but I still consider if its worth spending 200/300$ for it...

What happens when you turn on the wifi on your phone.....

Image
Bit Of Theory 😐       DHCP(Dynamic Host Configuration Protocol) : ~                           -  assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks      My Phone When , I have No Ip  Now I Turn On my wifi (Things Work Happy Me😊 The DORA Process: Behind the Scenes Discover:             - DHCP Client ( your phone in this case ) sends out a DHCP Discover message to find out the DHCP ( your Router ) server What DHCP Discover message looks like? Offer    - DHCP server ( your router ) receives the DHCP discover message from client and sends back the DHCP offer message  How does DHCP Offer messag...