Tuesday 21 April 2020

VPN USE PROTOCOL (Protocol for virtual privet network)

Types of Virtual Private Network (VPN) Protocols:
1. Internet Protocol Security (IPSec) :                         
 Internet Protocol Security, known as IPSec, is used to secure Internet communication across an IP network. IPSec secures Internet Protocol communication by verifying the session and encrypts each data packet during the connection.

IPSec runs in 2 modes:
  1.  Turnaling mode ( Tunneling mode encrypts the whole data packet)
  2.  Transport mode (Transport mode is to encrypt the message in the data packet)
 IPSec can also be used with other security protocols to improve the security system.

2. Layer 2 Tunneling Protocol (L2TP) :

L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is often combined with another VPN security protocol like IPSec to establish a highly secure VPN connection. 
L2TP generates a tunnel between two L2TP connection points and IPSec protocol encrypts the data and maintains secure communication between the tunnel.

3. Point–to–Point Tunneling Protocol (PPTP): 


PPTP Protocol generates a tunnel and confines the data packet. 
Point-to-Point Protocol (PPP) is used to encrypt the data between the connection.  
PPTP is one of the most widely used VPN protocol and has been in use since the early release of Windows. 
PPTP is also used on Mac and Linux apart from Windows.

 4. OpenVPN :

OpenVPN is an open source protocol that allows developers access to its underlying code.
This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm.
TL;DR: open source, strongest encryption, slower speeds

5. SSTP

Secure Socket Tunneling Protocol is popular due to its full integration with every Microsoft operating system since Windows Vista SP 1.
SSTP utilizes 2048-bit SSL/TLS certificates for authentication and 256-bit SSL keys for encryption. The biggest drawback to SSTP is that is basically a Microsoft-developed proprietary protocol and developers do not have access to the underlying code.
TL;DR: good security, difficult to block and detect, great support for native and third party clients

6.IKEV2

Internet Key Exchange version 2 is a common VPN tunneling protocol that provides a secure key exchange session. Similar to L2TP (and IKEv1), IKEv2 is normally paired with IPsec for encryption and authentication. This protocol is very good at re-establishing the link after temporary connection loss and excels at switching connections across network types (from WiFi to cellular, for example).
TL;DR: fast, mobile friendly, network switching capabilities, open source options, great support for native and third party clients



Saturday 4 April 2020

PEOPLE AS SECURITY TOOL

  • SECURITY AWARENESS
Probably the single most effective method to counter potential  social engineering attacks,after goals and policies,is an active security awareness program.

many government organization have created security awareness posters to constantly remind individual of this possible of attack.
security newsletters,of an in form of e-mail, have been used to remind employees of their security respectability.
an important element that should be stressed in training about social engineering in types of information that the organization considers sensitive social engineering attacks .
There are undoubtedly signs that the organization could point to as indicative
  

Wednesday 1 April 2020

Encryption and Decryption.(List Top Encryption method)

TwofishTwofish
Encryption and Decryption.
  • encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
  • referred to as Plaintext, is encrypted using an encryption algorithm–a cipher–generating     cipher text that can be read only if decrypted.
  • plaintext – information that can be directly read by humans or a machine (this article is an example of plaintext. Plaintext is a historic term pre-dating computers, when encryption was only used for hardcopy text, nowadays it is associated with many formats including music, movies and computer programs
  • ciphertext – the encrypted data
  • a cipher – the mathematics (or algorithm) responsible for turning plaintext into ciphertext and reverting ciphertext to plaintext (you might also see the word ‘code’ used – there is a technical difference between the two but it need not concern us now)
  • encryption – the process of converting plaintext to ciphertext (occasionally you may see it called ‘encipherment’)
  • decryption – the process of reverting ciphertext to plaintext (occasionally ‘decipherment’).
  • Plaintext and ciphertext For More Info about


  • Top Encryption method
  1. TripleDES(Data Encryption Standard)
  2. Twofish
  3. Blowfish
  4. advanced_encryption_standard (AES)
  5. MD5

Ftx Crash

 RUMEAR SAAY THIS HACKE IS  CREATE BY FTX                                                                                                   ...