2025-05-15 22:43:38

Protocols: FTPS


In today's digital world, moving files is a daily necessity. But as cyber threats become more sophisticated, the once-standard File Transfer Protocol (FTP) is showing its age, particularly its security shortcomings. Ent...

2025-05-14 23:56:36

Protocols: FTP


FTP operates on a client-server model, using two distinct communication channels between the FTP client and the FTP server: a control connection and a data connection.  



1. Client-Server Interaction Model In the FTP...

2025-05-14 00:03:41

Protocols: HTTPS


In the digital age, secure communication is paramount. Two fundamental protocols govern how data is transferred on the web: HTTP and HTTPS. While they both serve to facilitate interactions between web clients and server...

2025-05-12 21:22:13

Protocols: HTTP


The Hypertext Transfer Protocol (HTTP) is a fundamental application-layer protocol that powers the vast majority of data exchange on the World Wide Web. It's the system that allows your web browser (the client) to commu...

2025-05-11 22:36:03

Protocols: UDP


When we think about sending data online, we often picture reliable delivery – like sending an important letter that needs a signature. That's usually handled by TCP (Transmission Control Protocol). But there's another...

2025-05-10 21:50:19

Protocols: TCP


You're Browsing the web, sending an email, streaming a video, or perhaps even engaged in a critical online transaction. Behind the scenes of these seemingly simple digital actions lies a complex and incredibly robust sy...

2025-05-06 22:06:35

Impact (Mitre Att&ck Matrix)


The MITRE ATT&CK Framework defines 13 techniques within the Impact category. These techniques describe how adversaries can disrupt the availability, integrity, or confidentiality of systems and data. Below is a desc...

2023-04-20 22:50:07

Exfiltration (Mitre Att&ck Matrix)


The Mitre Att&ck Framework has defined nine techniques in the Exfiltration category.



The Automated Exfiltration technique is when the malware that the threat actor used to compromise the target is programmed to a...

2023-04-18 00:21:01

Command & Control (Mitre Att&ck Matrix)


The Mitre Att&ck Matrix has 16 techniques in the Command and Control Category.



Application Layer Protocol is when a command and control system utilizes an application layer protocol such as DNS or HTTP to attempt...

2023-04-12 01:30:43

Collection (Mitre Att&ck Matrix)


The Mitre Att&ck Matrix has defined 17 techniques for the Collection Category.



Adversary-In-The-Middle is when a threat actor redirects traffic from a target to the threat actor so the threat actor can collect da...