MCA Articles

Page 36 of 95

What is Virtual LAN?

Moumita
Moumita
Updated on 16-Mar-2026 17K+ Views

A Virtual Local Area Network (VLAN) is a logical grouping of devices that appear to be on the same LAN regardless of their physical network location. Network administrators use VLANs to partition networks based on functional requirements, allowing devices to communicate as if they were connected to separate physical LANs. VLAN Configuration Example Switch PC1 (Sales) PC2 (Sales) ...

Read More

What is Cut-through switching?

Moumita
Moumita
Updated on 16-Mar-2026 961 Views

In data communications, cut-through switching is a method of switching data frames or packets where the switching device (bridge or switch) forwards the frames as soon as the destination address is available without waiting for the rest of the data to arrive. Working Principle Cut-through switching is used in packet switching systems. In packet-switching, the message is divided into a number of units called packets that are individually routed from the source to the destination. There is no need to establish a dedicated circuit for communication, since it is a connectionless network switching technique. In cut-through switching, ...

Read More

What is Wormhole switching?

Moumita
Moumita
Updated on 16-Mar-2026 1K+ Views

In data communications, wormhole switching is a flow control technique where large data frames or packets are partitioned into smaller units and then transmitted. When a switching device (a bridge or a switch) receives a data packet, it partitions the packet into small parts called flow control units or flits. The flits are transmitted one by one instead of the whole packet. Also called wormhole flow control, wormhole switching is a subtype of flit-buffer flow control methods and is based upon fixed links. Wormhole Switching — Packet Division Original Packet ...

Read More

Address Space Layout Randomization (ASLR)

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 443 Views

Address Space Layout Randomization (ASLR) is a critical security mechanism that randomizes the memory layout of running programs to prevent attackers from predicting memory addresses. This makes it significantly harder for malicious code to exploit memory corruption vulnerabilities. Memory corruption vulnerabilities occur when a program mistakenly writes attacker-controlled data outside of an intended memory region. This may crash the program or, worse, provide the attacker full control over the system. ASLR serves as a failsafe mechanism to limit the damage should such vulnerabilities be exploited. How ASLR Works ASLR works by randomizing the memory locations where program ...

Read More

Get the Reverse Shell with MSI package

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 2K+ Views

Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is msiexec.exe. In penetration testing, MSI packages can be leveraged to obtain reverse shells on target Windows systems. This technique exploits the legitimate Windows Installer functionality to execute malicious payloads. How It Works The MSI reverse shell technique works by creating a malicious MSI package containing a reverse shell payload. When executed on the target system using msiexec, the package triggers the payload to establish a connection back ...

Read More

Hacking with Santet

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

This article demonstrates how to use the Santet penetration testing tool, which combines multiple security testing capabilities into a single package. Santet includes payload generation, Facebook group hijacking, SMS bombing, SMS spoofing, and Denial of Service (DoS) attack functionalities for ethical hacking and security research purposes. Important: This tool should only be used in authorized penetration testing environments or for educational purposes. Unauthorized use against systems you don't own is illegal and unethical. Installation and Setup To install Santet on Kali Linux, follow these steps: Step 1: Clone the Repository Open a terminal in Kali ...

Read More

Hacking with HTA file (MSHTA.exe)

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 2K+ Views

The Windows OS utility MSHTA.exe is responsible for running HTA (HTML Application) files that can execute JavaScript or VBScript code. These files can be interpreted and executed using the Microsoft MSHTA.exe tool, making them a potential attack vector for malicious activities. HTA File Execution Process HTA File .hta extension MSHTA.exe Windows utility Code Execution JS/VBScript ...

Read More

TheZoo Repository Live Malware Analysis

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

TheZoo is an open-source repository that provides cybersecurity researchers and malware analysts with access to live malware samples for educational and research purposes. It enables the study of malware behavior, analysis techniques, and development of countermeasures in a controlled environment. TheZoo contains a comprehensive collection of malware samples categorized by family, type, and platform. This repository serves as a valuable resource for security professionals, researchers, and students who need to understand how malicious software operates and spreads. Installation and Setup To set up TheZoo repository on your system, follow these steps: git clone https://github.com/ytisf/theZoo cd ...

Read More

Pentesting using Docker

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 359 Views

Penetration testing using Docker provides security professionals with an efficient way to deploy and test vulnerable applications in isolated environments. Docker containers offer a clean, reproducible setup for security assessments without affecting the host system. Docker is a containerization platform that packages applications with all their dependencies into lightweight, portable containers. This makes it ideal for quickly setting up vulnerable web applications like DVWA (Damn Vulnerable Web Application) for penetration testing practice. Installing Docker Before setting up vulnerable applications, install Docker on your system using these commands: apt update apt install docker.io systemctl start docker ...

Read More

Functions of the Network Layer

Moumita
Moumita
Updated on 16-Mar-2026 22K+ Views

The network layer or layer 3 of the OSI model is responsible for delivering data packets from source to destination across multiple hops or links. It also controls the operation of subnets and manages logical addressing for end-to-end communication. The network layer acts as an intermediary between the transport layer above and the data link layer below, ensuring reliable packet delivery across interconnected networks. Network Layer Functions Source Host Transport ...

Read More
Showing 351–360 of 941 articles
« Prev 1 34 35 36 37 38 95 Next »
Advertisements