Network Advanced | SEの道標

Network Advanced

子カテゴリー

NW Security

Mechanism of outgoing e-mail address impersonation [Mailsploit] ~ Basic e-mail anti-spoof technology SMTP AUTH, DKIM, SPF / SenderID overview (merit · demerit) Commentary and relation with this attack-

What is Mailsploit?Mailsploit is an atta...
NW Security

Illustrate: WPA2’s vulnerability [KRACK] and Sequence of 4 way handshake

Logic that can be decrypted with KRACKI ...
NW Security

Man in the Middle attack (Channel-based MitM) in Wireless LAN

Man in the Middle attack of Wi-FiThe vul...
NW Security

Illustrate: Differences between [Specter] & [Meltdown] (Memory Protection & KPTI mechanism)

IntroductionIn this article "process" an...
NW Security

Illustrate : CPU vulnerabilities [Spectre], [Meltdown] and Speculative Execution (Branch Prediction, Out of Order Execution)

Overview and scope of influence of Spect...
MPLS-VPN

Configuration of MPLS-VPN (Super Backbone and Sham-Link)

I will introduce of the example of confi...
MPLS-VPN

MPLS-VPN (MP-BGP) Details

MP-BGPRoute information in can be transm...
MPLS-VPN

MPLS-VPN Overview

The router of the description in the bas...
MPLS-VPN

MPLS basic#5 TTL Propagation

The TTL Propagation, when transferring M...
MPLS-VPN

MPLS basic#4 PHP (Penultimate Hop Popping)

PHP ThePHP and stands for Penultimate Ho...
MPLS-VPN

MPLS basic#3 FIB table / LFIB table

FIB tableIn border router between MPLS N...
MPLS-VPN

MPLS basic#2 label exchange and LIB table

In front of the label exchange, by each ...
MPLS-VPN

MPLS basic#1 LDP Behavior

MPLS network needs to exchange not only ...
MPLS-VPN

About MPLS

MPLS (Multi-Protocol Label Switching) is...
Ethernet OAM

What is Ethernet OAM?

What is OAM?OAM stands for Operations, A...
OSPF

Right condition for exchange the router by OSPF

Right condition for exchange the router ...
OSPF

Features of multi-access topology

In multi-access topologies such as broad...
OSPF

Condition of OSPF neighbor establishment (2WAY)

What is 2WAYOSPF routers in the same seg...