SavitarX
Ctrlk
LinkedinTryHackme
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
      • Defensive Security
        • Security Monitoring & SIEM Fundamentals
        • Windows Event Logs & Finding Evil
        • Introduction to Threat Hunting & Hunting With Elastic
        • Understanding Log Sources & Investigating with Splunk
        • Windows Attacks & Defense
        • Intro to Network Traffic Analysis
        • Intermediate Network Traffic Analysis
          • ARP Spoofing & Abnormality Detection
          • ARP Scanning & Denial-of-Service
          • 802.11 Denial of Service
          • Rogue Access Point & Evil-Twin Attacks
          • Fragmentation Attacks
          • IP Source & Destination Spoofing Attacks
          • IP Time-to-Live Attacks
          • TCP Handshake Abnormalities
          • TCP Connection Resets & Hijacking
          • ICMP Tunneling
          • HTTP/HTTPs Service Enumeration
          • Strange HTTP Headers
          • Cross-Site Scripting (XSS) & Code Injection Detection
          • SSL Renegotiation Attacks
          • Peculiar DNS Traffic
          • Strange Telnet & UDP Connections
        • Working with IDS/IPS
        • Introduction to Malware Analysis
        • YARA & Sigma for SOC Analysts
        • Introduction to Linux Forensics
      • Digital Forensics and Incident Response
    • Web Pentesting
  • Writeups
    • Tryhackme
  • Machines to pratice for
    • CPTS Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
Powered by GitBook
On this page
  1. CERTIFICATIONS & notes
  2. Blue Team
  3. Defensive Security

Intermediate Network Traffic Analysis

ARP Spoofing & Abnormality DetectionARP Scanning & Denial-of-Service802.11 Denial of ServiceRogue Access Point & Evil-Twin AttacksFragmentation AttacksIP Source & Destination Spoofing AttacksIP Time-to-Live AttacksTCP Handshake AbnormalitiesTCP Connection Resets & HijackingICMP TunnelingHTTP/HTTPs Service EnumerationStrange HTTP HeadersCross-Site Scripting (XSS) & Code Injection DetectionSSL Renegotiation AttacksPeculiar DNS TrafficStrange Telnet & UDP Connections
PreviousDecrypting RDP connectionsNextARP Spoofing & Abnormality Detection