TechnoGb

Author : Deepanshu Rai

http://technogb.com - 17 Posts - 0 Comments
CCNA R&S

The Seven Layers of OSI Model

Deepanshu Rai
OSI (Open System Interconnection) Model defines a network framework to implement the protocol in Seven Layers. The main purpose of the OSI Model is to
CCNA R&S

CISCO Networking Devices | TechnoGB

Deepanshu Rai
This post is a continuation of a previous article on ‘Introduction to Cisco Packet Tracer’. In this article, I am going to discuss in detail about
CCNA R&S

Introduction to CISCO Packet Tracer | TechnoGb

Deepanshu Rai
1. INTRODUCTION Packet Tracer is a Software or a protocol simulator developed by CISCO. Cisco Packet Tracer is a very powerful tool that displays various
Mobile Specifications

OnePlus 6: Latest leaks | full specifications OnePlus

Deepanshu Rai
OnePlus 6: Latest leaks | full specifications OnePlus OnePlus 6 full specifications have leaked, once again. Ahead of the official launch, the latest OnePlus flagship
Ethical Hacking

TCP Hijacking | Ethical Hacking | TechnoGb

Deepanshu Rai
TCP Hijacking | Ethical Hacking | TechnoGb TRANSFER CONTROL PROTOCOL: TCP (Transfer Control Protocol) Hijacking is most popular technique to gain the access to the
Ethical Hacking

Metasploit Framework | Ethical Hacking | TechnoGb

Deepanshu Rai
Metasploit Framework | Ethical Hacking | TechnoGb METASPLOIT FRAMEWORK: Metasploit Framework is one of the world’s best Ethical Hacking tools, and most powerful exploit tool
Ethical Hacking

Exploiting Vulnerabilities | Ethical Hacking | TechnoGb

Deepanshu Rai
Exploiting Vulnerabilities | Ethical Hacking | TechnoGb EXPLOITATION Exploitation is the process of getting into the target system with the help of some known vulnerabilities
Ethical Hacking

Sniffing Network | Ethical Hacking | TechnoGb

Deepanshu Rai
Sniffing Network | Ethical Hacking | TechnoGb SNIFFING: Sniffing in Ethical Hacking is known as the process that moniter all the network and all the network
Ethical Hacking

Fingerprinting | Ethical Hacking | TechnoGb

Deepanshu Rai
Fingerprinting | Ethical Hacking | TechnoGb FINGERPRINTING Fingerprinting is one the most important process of Ethical Hacking or any type of hacking, this process is
Ethical Hacking

Enumeration | Third Step of Ethical Hacking | TechnoGb

Deepanshu Rai
ENUMERATION: Enumeration is the first phase of Ethical Hacking, it is basically the first attack to the target network, Enumeration is the process to gather