Available articles related to Telecom and Security:
- 3.10.2017 Crafting Network Protocols
The document describes the methods and approach how to craft any protocol message which could be used to try to find vulnerabilities also in not common protocols. The precondition is to have some existing traffic capture (pcap) and that the protocol is dissected by the wireshark.
- 3.10.2017 Kali Linux Tips
This document is providing selected steps and is presenting approaches which could be used to perform the security assessment effectively within the limited allocated time with Kali Linux.