Advanced Search
Search Results
120 total results found
Asymmetric Encryption
Diffie-Hillman Key Exchange
Hashing
Overview Cryptographic hash functions transform data of any size into a fixed-length message digest or checksum, with SHA256 producing a 256-bit (64 hexadecimal digit) output regardless of input size. These functions are deterministic and demonstrate the avala...
PKI & SSL/TLS
Overview The fundamental Diffie-Hellman key exchange is susceptible to a Man-in-the-Middle (MITM) attack because it lacks a mechanism for participants to authenticate each other's identity, allowing an attacker to establish two separate secret keys and decrypt...
High-Level Overview
Network Topology
Subnets LAB Main Media 10.0.0.0/24 VLAN 50 192.168.0.1/24 VLAN 0 192.168.2.0/24 VLAN 20 DMZ VPN Security 192.168.4.0/24 192.168.3.0/24
Security Policies
Firewall Zone Definitions (e.g., DMZ, LAN, IoT) Core Access Rules (e.g., Management access allowed only from specific VLAN)
Virtualization Platform
Host Setup Notes (Installation, storage configuration) Management Access Procedures
Cloud Platform
Host Setup Notes (Installation, storage configuration) Management Access Procedures
Configuration Management
Repository Structure and Location New Deployment/Provisioning Process
Storage Systems
Pool Layout and Redundancy Level (e.g., RAIDZ2) Dataset/Share Mount Points
Core Services Index
Table of all running services (Name, IP, Port, Purpose)
Monitoring
Dashboard URLs and Authentication Notes Key Metrics Being Tracked
DNS & DHCP
Configuration details and upstream DNS providers
Backup and Recovery Strategy
What is backed up (config/data), frequency, and retention policy Location of backup storage
Disaster Recovery
Step-by-step procedure for recovering a core system (e.g., Firewall) Service restoration order
Standard Procedures
Patching and Update Schedule Adding a New VM or Container Checklist
Authenticating With Passwords
Overview Cryptography is essential for protecting passwords both in transit (via SSL/TLS) and at rest (in databases), where the latter requires secure storage methods to prevent exposure during a breach. Simply hashing passwords is insufficient due to rainbow ...