Code Tracing - Snort3 Packet Acquisition II
Tracing Snort3 with GDB – DAQ(Data Acquisition) Purpose of the Article To know how snort acquire packet by the new “Data Acquisition” mechanism, and take a step further to understand pros and con...
Tracing Snort3 with GDB – DAQ(Data Acquisition) Purpose of the Article To know how snort acquire packet by the new “Data Acquisition” mechanism, and take a step further to understand pros and con...
Tracing Snort3 with GDB – DAQ(Data Acquisition) Purpose of the Article To know how snort acquire packet by the new “Data Acquisition” mechanism, and take a step further to understand pros and con...
Tracing Snort3 with GDB How to read the source code of a large project? It’s daunting to read exstreamly mass codebase on my own, but I think there might be someone who has been through this before...
Today’s purpose After the emulation, now we are going to verify our migrating strategy: Using BGP dynamic route to smoothy substitute MPLS network with SASE network structure. MPLS has been well-k...
Problem Description I was working on a project require me to emulate a customer MPLS enviornment, so that we can do furthter networking architecture migration and recontruction. In brief, below is...
How Boot Operate Breaking Point1 - Start_Kernel asmlinkage __visible void __init __no_sanitize_address start_kernel(void) { char *command_line; char *after_dashes; set_task_stack_end_magi...
Why Need to Trace Kernel When it comes to learning Linux or system programming in C, one of the most effective methods is tracing kernel code. Despite the complexity of the kernel and its constant...
Prerequest 2+ Installed already Proxmox nodes 2+ network links for separate purposes Create a new Cluster from master node Proxmox clustering capability is managed by the Proxmox Cluster M...
Target #VM3 - 10.10.10.100 Service Enumeration Port Scan Results Server IP Address Ports Open 10.10.10.100 TCP: 53,88,135,139,389,445,464,593,636...
What is GOAD? GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack tech...