"Welcome to my house! Enter freely. Go safely, and leave something of the happiness you bring...
...We are in Transylvania, and Transylvania is not England. Our ways are not your ways, and there shall be to you many strange things... Loneliness will sit over our roofs with brooding wings... It is a strange world, a sad world, a world full of miseries, and woes, and troubles...
...Enter freely and of your own free will..."
-
This repository has been intended to be a personal centralized place to store my own created data and also compile some public data such as databases, codes, scripts, write ups, binaries, labs, guides, resources and documentation that I commonly use in my day to day life as an engineer.
-
This repository also serves as my portfolio to show to potential employers and clients my work, experience, knowledge, education and resume in the area of IT, Network Engineering, Development, Programming, Cyber Security, Computer Systems, Infraestructure Management and other branches of Computer Science and Information & Communication Technologies.
-
This repository may contain configurations, techniques, codes or scripts that could harm some systems and devices or not comply with some regulations of all Countries. Read carefully each file documentation before download, extract, deploy, configure, execute, copy, compile. Be sure that you understand and are complying with the laws regarding Wireless and Radio Regulations, Information Technology, Sensitive Data & other kind of ICTs regulations in your area. It is recommended to study the legislation of the Regulatory Domain in each Country before replicating any process included in this repository.
-
It is mandatory to experiment only in controlled laboratory environments, whether physical or virtual. The administrator in charge of any device, network, or infrastructure must be aware and agree to any configuration, execution, deployment or security engagement that is intended to be carried out. Rules of Engagement (RoE), and external contract or other NDAs (Non-Disclosure Agreement) are recomended.
-
This repository is publicly accessible because it shares the GNU free software ideology and philosophy, it means the freedom to run the software, to study the software, to modify the software, and to share copies of the software (whether modified or not).
-
Any misuse of the information and files compiled in this repository will not be the responsibility of the author.
"The only good is knowledge, and the only evil is ignorance." Herodotus
I'm just a very lucky person who was born surrounded by IBM computers and walls of floppy disks back in the 80's...
When I was a little kid my father took me to a Data Center inside the Company where he worked, then I met a very funny guy with long hair and a beard (The Systems Engineer) who allowed me to play Prince of Persia in MS-DOS surrounded by those huge computers with that peculiar smell of silicon & technology inside that huge room, when I came back home I have never left the IBM 5170 that we had there... Since then I decided to focus on one thing: Let my hair and beard grow!... (and dedicate my life to Computer Science and Information and Communication Technologies) and here I am!
Today I'm a Level 3 NOC Engineer focusing on high-level troubleshooting, analytics, security, support and network performance design & optimization. I have experience with vendors such as: Cisco, Zyxel, Ruckus, Fortinet, SonicWall, MikrotTik, Aruba, Starlink, Huawei, Microsoft, Linux... but also I have some years of background experience with other IT branches like programming, scripting, data base administration, pentesting, ethical hacking and analytics.
My day-to-day tasks are Multi-Layer Packet & Frame Exchange analysis for a wide range of 802.3 Ethernet & 802.11 WiFi Protocols, Reverse Engineering, Hex modification, Packet Tampering & Injection. Proficient in tools like Wireshark, TCP Dump, Scappy, NMap, Python, HEX Editors, iPerf, etc. Experience with Network Security, Layer 2 & Wireless Pentesting; Defensive Security SIEM, IDS/IPS, DLP & AV... and some CTF in my spare time!
I also configure and manage network devices, including Next-Generation Firewalls, 802.11 Wireless Infraestructure, Routing, Switching and Services for high-density network environments, within verticals such as International Airports, Hospitality, Health, Retail, Education, Government & Public Transportation, as well as remote locations with Satellite-Only Connections.
Please check out the links of my Social Networks that I've placed above including my LinkedIn, where you will find more information regarding my professional career. Greetings and thank you for reading! 💀🎩
Bachelor of Science in Computer Systems Engineering
NetOps
NetSec
CCNA
RICXI
RSP
CWNA
ICND 1&2
NOC
Network Design
Enterprise Compus Networking
SOHO
NGNs
DevNeT
DevOps
Python
C++
Ruby
Visual Basic
VBA
Bash
Batch
PowerShell
HTML5
CSS3
Javascript
Node.js
PHP
SQL
MySQL
Mongo DB
NetSecOps
SecOps
CyberOps
Security+
PenTest+
Ofensive Pentesting
Cisco Cyber-Security
Red Team
Ethical Hacking
Defensive Security
Blue Team
Digital Forensics
Microsoft Windows
Windows Server & Active Directory
Linux
Unix
MacOS
Android
ΟΠΟΙΟΣ ΜΠΑΙΝΕΙ ΕΔΩ ΝΑ ΠΑΡΑΤΑ ΚΑΘΕ ΕΛΠΙΔΑ
A mitad del camino de la vida,
en una selva oscura me encontraba
porque mi ruta había extraviado...
Abandonad, los que aquí entráis, toda esperanza...
- 🔮 📖 🧙 Dark Wizardy for Networking & NetSec
- Wired Networking Components & Fundamentals
- Networking Groups & Organizations
- 🔐 🛠️ ⚙️ Configure it Like a Sir!
- 🛡️ 👩🔬 🧪 Secure Network Labs
- Wired Networking Components & Fundamentals
- Networking Groups & Organizations
- 📝 👷 🏰 IEEE Standards
- ➡️ 💥 ⬅️ Carrier Sense Multiple Access (CSMA)
- 🛰️ 📶 📡 Wireless Communication & RF
Para mis amigos que están empezando completamente de 0, cursa una ingeniería en una hora ¡o menos! ;)
- Computadora (Electrónica)- Diccionario RAE - Máquina electrónica que, mediante determinados programas, permite almacenar y tratar información, y resolver problemas de diversa índole.
"¿De qué tamaño es un problema... visto desde Saturno )? ... De ese tamaño son tus problemas." - La historia de las computadoras ¡en 2 minutos! Todo largo camino comienza por el primer paso...
- El ábaco La primer calculadora / computadora en el mundo
- La historia de la calculadora ¿Habías escuchado de Luis Pascal y Charles Charles Babbage?
- ¿Cómo funciona una calculadora? Calculadora = computadora "jr" ;)
- ¿Cómo funciona una computadora o PC? ¡en 3 minutos! Close your eyes, I remember...
- Computadora - Wikipedia Wiki
- ¿Qué es el Hardware y Software? ¡en 2 minutos! Aprendiendo la diferencia entre lo físico y lo lógico
- ¿Qué es un Algoritmo? ¡en 2 minutos! Más fácil de lo que pensabas ;)
- ¿Cómo funciona un PC y qué hace cada pieza (Hardware)? @ Nate Todas los componentes de PC explicadas por Nate
- ¿Qué es y Cómo empezar a programar Software de Computadora? Es más fácil de lo que crees...
- ¿Cómo se fabrica un procesador de Computadora? @ Intel El milagro de la ingeniería humana, es magia...
- ¿Cómo se fabrica la Memoria RAM? @ Droga Digital Dr. Hoodman nos lleva de paseo a Tapei
- ¿Cómo se ensambla una Motherboard? @ Droga Digital Dr. Hoodman nos lleva de paseo a Taiwan
- ¿Qué es el Internet y cómo funciona?
- La historia del Internet para principiantes ¡en 4 minutos! ¿Te suenan las palabras Sputnik, ARPA, ARPANET, WWW?
- La historia del Internet en México ¡en 2 minutos! ¡Unos mexicanos que controlan el machete!
- ¿Qué es una red de Área Local (LAN)? Simple... es una red... de área local...
- ¿Qué es una red de Área Amplia (WAN)? Simple... es el Internet :)
- ¿Cómo funciona un cable UTP/STP "Ethernet"?
- ¿Cómo funciona la fibra óptica?
- ¿Cómo funciona el WiFi?
- ¿Cómo funciona el radio AM y FM?
- ¿Cómo funcionan los celulares?
- ¿Cómo funciona el GPS?
- ¿Qué es el Internet de la cosas (IoT)?
- ¿Qué es una máquina virtual? (VM o Virtual Machine)
- ¿Qué es un Data Center?
- ¿Qué es una nube?
- ¿Qué es la Inteligencia Artificial (AI)?
- ¿Qué es Machine Learning?
- BONUS!!! Aprende inglés desde 0 Aprende a hablar inglés mejor que tu tío que se fué al gabacho ¡sin miedo!
- Open Source Society University - Path to a free self-taught education in Computer Science! OSSU
- ¿Cómo hackear en 2 minutos al mundo entero? ¡Un largo camino comienza aquí, aventuras podrás disfutar!
Monitoring devices, know where you go, mass media, total control. Digital delight, desire in megabite. Data overflow, virtual suicide. This information, is disinformation. Truth is hidden, knowledge forbidden. The structures of power, will delegate. To speak is to lie, to lie is to collaborate. Information streams, simulating dreams. Interactive mind-control, systematic overflow. Magnetic sleep, network addiction. Be absorbed, science fiction. It's pyschological, diabolical. Societies brainwash hospital...
The sun never sets, on cyber-space... Transmit, receive, log on to interface
Networking Lists, concepts, Tables, Models, Cheat-Sheets, Mind-Maps & Cool Resources!!!
- OpenManiak The leader in open source Network and Security tutorial.
- Network Lessons Cisco CCNA, CCNP and CCIE Enterprise Infrastructure
- David Bombal (el padrino santo) Vamos Bombal! ChikitubunalabiBonbal the man, the leyend!
- Chris Greer - Wireshark Megalodon I call this dude "The Megalodon of Wireshark", the man know things we don't...
- Sunny Classroom The best and easiest explanations of networking in the world, when asians learn english, we shut up and learn...
- TCP Guide _Reference resource on the TCP/IP protocol suite _
- Networking List 01 - facyber Networking Lists
- Awesome Mesh Networking Documentation, Free Software mesh protocols, and applications.
- How To WiFi A blog about Wi-Fi!
- 802.11 Frame Exchange - All combinations!
- Metageek
- Revolution WiFi
- Wirednot
- gcatewifi
- Wireless Professionals Wi-Fi industry experts | Technical Community
- Overview of Wireless History
- History of Wireless Communication
- Historia del WiFi - est. 1997
- Telecomunicaciones y Radiodifusión en México @ UNAM
TriForce: Create Standards | Certifies Products | Set Local Regulations
- Internet Governance: IGF, NRO, IANA, ICANN, IETF, ISOC
- Regulatory Bodies _Regulatory Domains:_ ETSI, FCC, TELEC, KCC regulates communications within & from USA
- IEEE Institute of Electrical and Electronics Engineers Best known for its LAN standards, the IEEE 802 project
- IETF - Internet Engineering Task Force Create Standards | RFC
- WiFi Alliance Ensure the interoperability of Wi-Fi products by providing certification testing
- ITU-R - International Telecommunication Union Radiocommunication Sector UN worldwide frequency assignments through five administrative regions
- ISO - International Organization for Standardization
Responsible for many matters related to ITC. "Committed to connecting the world."
- ITU - International Telecommunication Union
- ITU - International Telecommunication Union @ Wikipedia Wiki
A global hierarchy exists for management of the RF spectrum worldwide on land, sea, and in the skies
- ITU Members connect the world! @ ITU youtube
- ITU- R - Official Web One of the three sectors (divisions) of the ITU
- ITU- R - Radiocommunication Sector @ Wikipedia
- Region A: CITEL The Americas Inter-American Telecommunication Commission
- Region B: CEPT Western Europe European Conference of Postal and Telecommunications Administrations
- Region C: RCC Eastern Europe and Northern Asia Regional Commonwealth in the field of Communications
- Region D: ATU Africa African Telecommunications Union
- Region E: APT Asia and Australasia Asia-Pacific Telecommunity
- [Australia Australian Communications and Media Authority (ACMA)
- [Japan Association of Radio Industries and Businesses (ARIB)
- [United States Federal Communications Commission (FCC)
-
Internet Standards Organizations (ISOC, IAB, IESG, IETF, IRSG, IRTF)
-
How IAB Manage the protocol values done by IANA?
- IANA – Internet Assigned Number Authority DNS, Domain Names & IPs Authority Assignments
The premier Internet standards body concerned for Internet architecture and the smooth operation.
- IETF Official Web - About IETF official Web
- IETF WikiPedia Wiki
- ¿Qué es IETF y para qué sirve? IETF en Español
- The Tao of IETF A Novice's Guide to the IETF
- RFC - Request for Comments @ IETF IETF
- RFC - Request For Comments @ Wikipedia Wiki
- RFC Explained @ Computerphile not actually a request for comments but a statement or definition.
- How to read RFCs Pic
- RFC Stages of Development: Proposed Standard > Draft Standard > Internet Standard
- RFC Process Diagram
- RFCs Official Index Database
- RFC 793 - 1981: TCP (Transmission Control Protocol)
- RFC 791 - 1981: IP (Internet Protocol)
The world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
- IEEE - Official Web @ IEEE
- 802.11-2020 - Actual Official IEEE Preview @ IEEE
- IEEE @ Wikipedia Wiki
- ¿A qué se dedica la IEEE? | ¿Qué es la IEEE? ¡En 3 minutos! Return 0;
- Become a member of the IEEE! :D $160 USD
- IEEE: How Are Standards Made?
- IEEE Standards LifeCycle: Standards > Draft > Amandments > Updated Standards Image / Table
- IEEE Clause Highest level of hierarchically structured doc (7.3.2.4)
- List of IEEE "Fellows" The Fellow grade is the highest level of membership at IEEE
- IEEE 802 Standards | LAN,MAN,PAN | Complete Family of Internetworking & Management Wiki
- IEEE 802 @ IEEE Standard Association Official IEEE Web
- IEEE Nomenclature: Standard & Amandments Differneces easy! Pic
- 802.1Q - 2018 - Bridges and Bridged Networks Trunks ot Tagged Ports dot1q
- 802.1X - 2020 - Port-Based Network Access Control / Authentication Pro % Secure Authentication (AAA)
- 802.1AB - 2016 - Station & Media Access Control Connectivity Discovery LLDP LLDP
- 802.1AC - 2016 - Media Access Control MAC Services Definition MAC Address
- 802.1AX - 2020 - Link Aggregation / LAG / EtherChannel EtherChannel & LAGs
LAN & MAN - Specific Requirements - P.3 AKA IEEE 802.3
LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
IEEE 802.3 Ethernet Management Standards Specifies the set of MAC and PHY protocols for implementing LAN communication
-
IEEE 802.3 Ethernet Frame @ wifiwizardofoz
- 802.3ab - 1000BASE-T Gbit/s Ethernet over twisted pair at 1 Gbit/s (125 MB/s)
- 802.3ad - Link aggregation for parallel links, since moved to IEEE 802.1AX Open standard (Etherchannel is from Cisco)
- 802.3ae - 10 Gigabit Ethernet over fiber 10GBASE-SR/LR/ER/SW/LW/EW
- 802.3af - Power over Ethernet (PoE 15.4 W)
LAN & MAN - Specific Requirements - P.3 AKA IEEE 802.11
WLAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
IEEE 802.11 Wireless Standards @ Wikipedia MAC and PHY protocols for implementing WLAN communication
-
Celebrating 25 Years of IEEE 802.11 @ Commscope
-
IEEE 802.11_PHY_standards | Table | Clickie!!! @ wifi Wizard of Oz
-
WiFi Standards (and how they work) @ Kevin Wallace Training, LLC
-
IEEE Get PRogram IEEE Membershio $$$
-
802.11 Standards: Timeline from 1997 to now! Updated 2022
-
Estándar IEEE 802.11 / WiFi: Estándar y Regulaciones @ Sama WiFi IEEE, WiFi Alliance, FCC
-
802.11-1997 AKA 802.11 "Prime" or "Original" or "Legacy" 1st 802.11!!!
-
[802.11-2020 AKA 802.11 Actual]https://standards.ieee.org/ieee/802.11/7028/) Last update (review @ 2022)!!!
-
ALL IEEE 802.11 Standard and Amendments - Current, Draft, Withdrawn & Transferred Complete List (last updated 2020)!
-
Channel Bonding in WiFi @ Leo's Tech Talk
_"I am Solaire of Astora, an adherent to the Lord of Sunlight. Now that I am Undead, I have come to this great land, the birthplace of Lord Gwyn, to seek my very own sun!" _
-
The Evolution of IEEE 802 11 standards - BAG NAC+ AX | Layer 1 (PHY) & Layer 2 (MAC) @ Sunny
BAG NAC
+ AX
- Big Awful Gym Needs AC ;) AX cuz' 2022... - The Table by the MAESTRO Sunny- Updated by Commscope & Fz3r0 Archeology
3 shared
common features in all5 standards
Half Duplex
- Transmit or RecieveFreq bands
- They all use 2.4 GHz or 5 GHzMedium Access
- They all use CSMA/CA
( ) B A G
- "The old bag..."802.11
- 1997WiFi 0
(prime) | 2.4 GHz | Mod:DSSS
,FHSS
| Base version802.11b
- 1999WiFi 1
| 2.4 GHz | Mod:DSSS
| Oldest, least expensive802.11a
- 1999WiFi 2
| 5 GHz | Mod:OFDM
| Rarely used802.11g
- 2003WiFi 3
| 2.4 GHz | Mod:OFDM
| Compatible with 802.11b *cuz' 2.4 GHz ;)
N AC
"Naco" = "lo chido" (new technology from WiFi4 to actual)802.11n
- 2009WiFi 4
| 2.4 & 5 GHz | Mod:OFDM
| Backwards compatible with ALL " BAG" ;)MIMO
capabilities (802.11n) - Exploit Multipath for good!Channel Bondig
- Combines 2 narrow bands into 1 larger band | Double the BandwithFrame Aggregation
- Combines small frames into one large frame | Reduces Overhead
802.11ac
- 2014WiFi 5
| 5 GHz | Mod:MIMO-OFDM
| Backwards compatible with ALL " BAG" ;)MU-MIMO
capabilities (802.11ac) - Multiple User MIMO!1 GB
- Gigabit WiFi (Up to 7 Giga theorically)- Wave 1 2014 & Wave 2 2016
802.11ax
- 2014WiFi 6
| 5 GHz | Mod:OFDM
&OFDMA
| Backwards compatible with ALL " BAG" ;)MU-MIMO
capabilities (802.11ac) - Multiple User MIMO!1 GB
- Gigabit WiFi (Up to 7 Giga theorically)- Wave 1 2014 & Wave 2 2016
-
OFDMA vs. MU-MIMO - WiFi6 802.11ac @ Eye on Tech
MU-MIMO WiFi 5 vs WiFi 6
= 8 data streams (instead of 4) on each antennaReduce bandwith waste
= Divide Wireless channel intro subarriers, dividen into smaller units
Wireless association
active scanning vs passive scanning, & roaming @ Sunny- Association: Wireless devices register with an AP/router to gain full access to the (wireless) network
- Only infraestructure, no AdHoc | Wireless devices uses one og two methods to find an AP:
- Assosiation method 1
Active Scanning
The client/device start the search effort | APs answer | and so on... - Assosiation method 1
Passive Scanning
The client/device sit & listens for channels | APs send beacon frames with AP info | and so on...
- Assosiation method 1
Re-Association
&Roaming
Same ESS = same SSID so...device/client will not lose connection moving from one BSS to another ;)
Analog
vsDigital
@ Sunny
Analog
- Sun, light, sounds, colors | Smooth & Continious (no "steps") | Noise Amplification
Digital
- 1 & 0 | Discrete Steps (a lot! no infinite tho) | Digital Signal = Pulse Wave | Original Regen
AM
vsFM
Modulations - (Analog Modulation) @ Sunny
AM
- lower Freq = larger = far transmission, news channels, more noise (due amplitude moves)
FM
- high Freq = smaller = more data, less distance, music, less noise no-static (static amplitude)
Multiplexing:
TDM, Statistical TDM & FDM | Multiple Signals Combined Together @ Sunny
TDM
- Time Division Multiplexing | dividing time into slots/intervals | equally assignment | old
STDM
- Statistical Time division Multiplexing | Analyzes stats: workload/priority & determines time will take
FDM
- Frequency Division Multiplexing | Different (analog signals) | same time on no overlapping chan
Baseband TDM
- Transmit 1 signal at time 1&0 | ej.Wired / Ethernet
|TDM
&STDM
Broadband FDM
- Multi-transmit, share 1 channel at diff Freqs | ej.RF
,HSIA
,DSL
|FDM
OFDM
- Orthogonal Frequency Division Multiplexing - (Analog Modulation) @ Sunny
Based onFDM
| Multiple Users share 1 single link | OFDM = variation of FDM ;)
latestWireless
&Telecom
Standards| WiFi 802.11ac, 4g, 5g, WiMAX, satellite & more
FDM
- Multiple Freqs not interfering with each other (guard band / space in adjacent channs)
OFDM
- Multiple Freqs "pushed in" = overlapped in same bandwith | more data than FDM
Orthogonal
- For interference avoid! due overlap | waves use independent spaces matching only at 0 point/null
OFDM vs FDM
- More bandwith & Higher Data Transmission Rate than FDM due Orthogonal capacityOFDM Subcarriers
- OFDM 802 11a/g - Subcarriers
IFFT
- Inverse Fast Fourier Transform - 20 MHz bandwith channels | 64 subcarriers (312.5 KHz) | BPSK, QPSK, 16QAM, 64QAM
- https://youtu.be/TOBFfe_-UFw - https://youtu.be/lwGsdWkfweU
- OFDM 802 11a/g - Subcarriers
Digital modulation
- ASK, FSK, and PSK - (Digital Modulation)ASK
- Amplitude Shift Keying Same Freq & Amplitude changes = ASK signalsFSK
- Frequency Shift Keying 1 value = higher freq | 0 value = lower freqPSK
Phase Shift Keying Change phase everytime the value 0 or 1 changes
Sampling
- Take samples to reconstruct original signal | steps like ableton sample-rate waves :)PAM
- Pulse Amplitude Modulation | The result of all discrete sample values (AKA discrete steps)Sample Rate
- Number of samples per second (or steps!)Sample Rate Standards
- Phone 8KHz | VoIP 16 KHz | Audio 44 KHz (44,100 samples per sec)
Quantizing
-Encoding
-
QAM modulation
- Quadrature Amplitude Modulation - Digital & Analog Modulation_ -
What is QAM?
| Analog = AM Radios | Digital = Data, WiFi, Phone, etc -
Most common modulation of new technolgy of Radios use to encode info into RF wave
-
Uses
Phase modulation
+Amplitude modulation
at same time -
The higher
MCS
(Modulation Coding Scheme) rate, the higherSNR
needed (cuz' interference susceptible) -
Wi-Fi 4/5/6/6E (802.11
n/ac/ax
) @ duckware -
QAM Constellation Diagram | Clickie!!!
4 QAM
=QPSK
64 QAM
1999-2006 | 16 points per cuadrant =6 bits
| Legacy802.11b/a/g
= 64 QAM _(3/4)64 QAM
2007 | 16 points per cuadrant =6 bits
|WiFi4 802.11n
= 64 QAM (5/6)256 QAM
2011 (2014) | 64 points per cuadrant =8 bits
|WiFi5 802.11ac
= 256 QAM (5/6)1024 QAM
2019 | 256 points per cuadrant =10 bits
|WiFi6 802.11ax
= 1024 QAM (5/6)Coding rate
=1/2
,3/4
,5/6
??? | 3 for data | 1 for error protection data- IEEE 802.11 n/ac
Coding Scheme
/Coding rates
-
More QAM = More MCS (points) = Less Distance = More SNR Requiered - No more confusion ;)
New task groups were assembled to address potential enhancements to the 802.11 standard.
-
802.11-1997
Prime or Legacy - IEEE Standard for WLAN MAC and PHY SpecificationsWiFi0
PHY:
FHSS(Frequency-Hopping Spread-Spectrum), DSSS(Direct-Sequence Spread-Spectrum), IR(InfraRed)
MODU:
FHHS & DSSS @ 2.4 GHz ISM(Industrial Scientific Medical) band, 14 channels & 3 non overlapping -
802.11-1999
Revision:
MIB(Management Information Base)
A minor Revision of the original 802.11-1997 standard -
802.11b-1999 (WiFi1)
PHY:
HR-DSSS(High-Rate Direct-Sequence Spread-Spectrum), DSSS(Direct-Sequence Spread-Spectrum)
Mod:
CCK(Complementary Code Keying), PBCC(Packet Binary Convolutional Coding)
Higher Data Rates within the 2.4GHz ISM band of 5.5Mbps | Only backward compatible @ 802.11 with DSSS -
802.11a-1999 (WiFi2) OFDM: (due 5GHz) on U-NII band | no communication with legacy tech | now Clause-17
-
802.11d-2001 Country Code Information on Beacons & Probes
-
802.11g-2003 (WiFi3) Evolution of ERP: ERP-OFDM & ERP-DSSS/CCK > for higher data rates
-
802.11h-2003 DFS, TPC: detect & avoid interference (5 GHz satellite & radars) | now Clause-11.8 & 11.9
-
802.11i-2004 RSN Authentication | now Clause-12 | WiFi alliance: WPA2
-
802.11j-2004 Enhancing of 802.11 MAC & 802.11a PHY for Japanese 4.9 GHz and 5 GHz operation
-
802.11e-2005 VoWLAN: QoS Grandpa & WiFi cert WMM Grandma')
-
802.11k-2008 RRM: TPC, client & channel stats, neighbor report | helps roaming ;)
-
802.11r-2008 BSS transition (FT) / Fast Secure Roaming | CKM, PKC, OKC, fast session resumption
-
802.11y-2008 DSE procedures: Avoid interference from non-WiFi (when CSMA-CA is not enough)
-
802.11n-2009 (WiFi4) MIMO: MIMO antenas with OFDM tech (no more multipath) & moar throughput!
-
802.11p-2010 ITS & WAVE = for high-speed vehicles
-
802.11s-2011 MPS: AP act as portal for devices to a WDS...AKA Mesh Master Gateway ;)
-
802.11u-2011 WIEN: Wireless Interworking with External Networks | Hotspot 2.0, Passpoint & BYOD
-
802.11v-2011 WNM: info exchange for WiFi performance improvement & WNM-Sleep mode
-
802.11w-2009 Robust Management Frames: Protect wireless frames VS DoS attacks | CCMP, BIP, CMAC
-
802.11z-2010 DLS: allow operation with non-DLS-capable APs (not used on Enterprises)
-
802.11ae-2012 QMF: Enable QMF | Enhancements to QoS management frames
-
802.11aa-2012 GCR: QoS enhancements for robust audio & video streaming
-
802.11ad-2012 DMG: Uses MGWS, GCMP, CCMP | 60 GHz in WiGig Networks
-
802.11ac-2013 (WiFi5) VHT, MU-MIMO, Beamforming: Enhancements below 6 GHz (only for 5GHz) | moar ALL!
-
802.11af-2014 Allows the use of wireless in the TV white space (TVWS)
-
802.11ah-2016 Use of Wi-Fi in frequencies below 1 GHz | IoT & M2M Communications | WiFi Alliance: Wi-Fi HaLow
-
802.11ai-2016 FILS: High-density environments for users association to robust network
-
802.11aj-2018 CMMW: support for operating in the Chinese 45 GHz band
-
802.11ak-2018 GLK: Enhancement for 802.11 bridged links. Simplify AP to Wireless STA
-
802.11aq-2018 Delivery of network service info prior to the association of STA to the network
-
802.11az-2018 Improves physical location tracking & positioning, energy efficiency | SmartBuiding & IoT
-
802.11ax-2021 (WiFi6) HE & OFDMA: High Efficiency WLAN amendment. Big PHY enhancement including high density
-
802.11ay-2021 256-QAM added. faster speeds & longer range, above 45 GH | TV & Monitor Connectivity
-
802.11ba-2021 WUR: Increase battery life of devices (p.e battery powered IoT devices)
What does the future hold in store for us with 802.11 wireless networking?
- 802.11az
- 802.11bb
- 802.11bc
- 802.11bd
- 802.11be - TBA... (WiFi7) EHT: Extremely High Throughput | Full lvl up!
- 802.11bf
- 802.11bh
- 802.11bi
-
802.11m is often referred to as 802.11 housekeeping Internal IEEE 802.11 management & documentation
- 802.11 Standards: Enmendias PHY / Amendments – The "Alphabet Soup" Evolution )
- 802.11 - 2.4 Ghz @ speeds of up to 2 Mbps
- 802.11a - 5 Ghz @ speeds of up to 54 Mbps
- 802.11b - 2.4 Ghz @ speeds of up to 11 Mbps
- 802.11g - 2.4 Ghz @ speeds of up to 54 Mbps
- 802.11n - (WiFi4) 2.4 Ghz & 5 GHz @ data rates range from 150 Mbps to 600 Mbps
- 802.11ac - (WiFi5) 5 Ghz @ data rates ranging: 450 Mbps - 1.3 Gbps using MIMO
- 802.11ax - (WiFi6) 2.4 Ghz & 5 GHz @ latest standard - WiFi 6
- 802.11d AKA 802.11d-2001 - Country Code Permite que equipos Wifi operen en píses sin estándar 802.11
- 802.11k - Assisted Roaming IOS XE 3.3 release Apple optimized Neighbor List for better roaming
- 802.11r
Eensure the interoperability of WLAN products by providing certification testing
- WiFi Alliance official Web The worldwide network of companies that brings you Wi-Fi®
- WiFi Alliance @ Wikipedia Wiki
- WiFi Alliance Certificate Example
- WiFi Alliance: Product Finder
- WiFi Alliance: Certification Procedure
- Wi-Fi 0 - 802.11 - 1997 2.4 GHz
- Wi-Fi 1 - 802.11b - 1999 2.4 GHz
- Wi-Fi 2 - 802.11a - 1999 2.4 & 5 GHz
- Wi-Fi 3 - 802.11g - 2003 2.4 GHz
- Wi-Fi 4 - 802.11n - 2008 2.4 & 5 GHz
- Wi-Fi 5 - 802.11ac - 2014 5 GHz
- Wi-Fi 6 (& 6E) - 802.11ax - 2019 & 2020 2.4 & 5 GHz | 2.4, 5 & 6 GHz
- Wi-Fi 7 - 802.11be - TBA... 2.4, 5 & 6 GHz
-
WiFi Alliance Certifications: Connectivity
-
WiFi Alliance Certifications: Security
-
WiFi Alliance Certifications: Access
-
WiFi Alliance Certifications: Applications and Services
-
WiFi Alliance Certifications: Optimization
-
WiFi Alliance Certifications: RF Coexistence
-
WiFi Alliance Certifications: Additional Capabilities
- ISO: International Organization for Standardization Official Web
- ISO @ Wikipedia Wiki
- What is a regulatory domain?
- Regulatory domain and compliance - Country Table
- Wireless LAN Compliance Lookup
- FCC - Federal Communications Commission North/Central/South America, Australia, New Zealand, Hong Kong, India, Malaysia, Philippines, Taiwan, Russia.
- ETSI - European Telecommunications Standards Institute Mainly European + Middle East, Africa, China, Indonesia, Singapore, Thailand, and Vietnam.
- TELEC - Telecom Engineering Center Only used in Japan
- KCC - Korea Communications Commission Only used in Korea
- CEPT / ECC / ETSI All European Regulatory Domains
- MIIC China
- MIC Japan
- Organos Reguladores de Telecomunicaciones en México y el Mundo
- DOF - Diario Oficial de la Federación Publica las leyes, decretos, reglamentos, acuerdos, circulares, órdenes y demás actos expedidos por los Poderes de la Federación
- Instituto Federal de Telecomunicaciones (IFT) Encargada del desarrollo eficiente de las telecomunicaciones y la radiodifusión
- Cuadro Nacional de Atribución de Frecuencias (CNAF) Adecuada planeación, administración y control del espectro radioeléctrico en nuestro país.
- COFETEL
- Bandas clasificadas como espectro de uso libre en México
- Normatividad del Espectro Radioeléctrico en México
- Ley Federal de Telecomunicaciones y Radiodifusión - Ultima reforma publicada (20 de mayo de 2021)
- DOF - Uso y Aprovechamiento de Bandas de Frecuencias 2019 Diario Federal de la Nación
- DOF - Condiciones técnicas de operación de la banda de frecuencias 2400 - 2483.5 MHz Clasificada como espectro libre
- ¿Qué son las redes y cómo funciona el Internet
- ¿Qué es un protocolo de Internet?
- Private Network Private access to the Network
- Public Network Public access from Internet
- LAN - Local Area Network Wiki
- WAN - Wide Area Network Wiki
- MAN - Wide Area Network Wiki
- Enterprise Campus Networks
- Branch Networks
- Internet Networks
- ¿Qué es SDWAN? Hasta tu abuelita podría entenderlo!
- PC - Personal Computer
- Laptop / Portatile PC
- Smartphone
- Tablet
- Smartwatch
- IP Phone
- IP TV
- Bluetooth Devices
- Coaxial Cable
- UTP - Copper Cable
- STP - Copper Cable
- Air The air around us (WiFi channels)
- DHCP Server -
- File Server -
- Windows Server / Active Directory -
- Video Server -
- Proxy Server -
- Game Server -
-
Consumer IoT for everyday use, easy & public access devices
-
Industrial Internet of Things (IIoT) _Industrial applications (p.e manufacturing & energy sectors)
- Client Connectivity
- Top-of-Rack (ToR) Deployments
- Middle and End-of-Row (MoR/EoR) Switching
- Stacking
Modelos de referencia para los protocolos de la red y la interconexión y comunicación entre dispositivos de redes
- OSI Model Official Web
- OSI Model @ Wikipedia Wiki
- TCP-IP Hybrid Model by Fz3r0 (TCP 5 layers)(TCP+OSI) A model I made with love for TCP-IP/OSI, all in one! :)
- TCP-IP - Internet Protocol Suite Model (All versions) Wikipedia
- TCP all in one! - TCP 3 Way Handshake, Communication Process, States, Data Transfer
- TCP / UDP : PORT Numbers / Protocols
- IP Protocol Numbers - IPv4 Headers
- Three categories of TCP/UDP port numbers (Well known, registered, dynamic/private) @ Sunny
- TCP/UDP Port Number IANA list @ Python - WhatPortIs
- Puertos TCP y UDP que se usan en los productos de software de Apple @ Apple
- Internet Protocol version 4 (IPv4)
- IPv4 Quick Guide
- Reserved IPv4 & IPv6 Addresses by Fz3r0
- IPv4 Packet Header
- Fases de Agotamiento de Direcciones IPv4 Actual Fase 4, no hay más IPs...
- Lista de espera para recibir direcciones IPv4 en LATAM
- Subnetting is simple @ Sunny
- Subnetting a subnet @ Sunny
- Subneting Guide - FLSM & VLSM
- IPv4 Subnetting Cheatsheet
- [Ethernet - IEEE 802.3](https://en.wikipedia.org/wiki/Ethernet)
- [7 parts of an Ethernet Frame @ Sunny](https://www.youtube.com/watch?v=qXtS1o1HGso)
- [Media Access Control Address - MAC-Address](https://en.wikipedia.org/wiki/MAC_address)
- [MAC vendor lookup](https://macvendors.com/)
- [Technitium MAC Address Changer (MAC Spoofing for Windows)](https://technitium.com/tmac/)
- [SMAC Address Spoofing Tool](https://smac-tool.com/#:~:text=SMAC%20is%20a%20powerful%2C%20yet%20an%20easy%2Dto%2Duse,whether%20the%20manufacturers%20allow%20this)
-
EtherType
-
802.1q: VLANs, Trunks, Natives, ISL /// General Modes, Tag & Untag, full 802.1Q mode, 802.1Q Tunneling (Q-in-Q).
- Ethernet Frame
- Ethernet Header
- IPv4 Packet
- IP Protocol Numbers
- TCP Segment
- UDP Segment Header
- Data encapsulation
- [Cisco Full VLAN Approach: Trunk VLANs](https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst_digital_building_series_switches/software/15-2_5_ex/configuration_guide/b_1525ex_consolidated_cdb_cg/b_1525ex_consolidated_cdb_cg_chapter_0110101.pdf)
- [Cisco: Configuring VLAN Settings for Interfaces (Trunk, Access & General)](https://www.cisco.com/assets/sol/sb/Switches_Emulators_v2_2_015/help/nk_configuring_vlans06.html)
- [Cisco Full 802.1q: 802.1Q Tunneling (Q-in-Q) Configuration](https://networklessons.com/switching/802-1q-tunneling-q-q-configuration-example)
- [VLAN-101 Open Vendor Approach](https://community.spiceworks.com/how_to/59173-vlan-101)
- [IEEE 802 1Q: VLAN **Tagging** and **Trunking** 101 @ Sunny](https://www.youtube.com/watch?v=vE5gvbmR8jg) _Trunk Port = Cisco terminology | Tagged Port = Other Vendors || Access Port = Cisco terminology | Untagged Port = Other vendors || Access VLAN = Untagged VLAN_
- [Diferencias en configuración de VLANs - Tagged, Untagged & Trunks](https://soporte.syscom.mx/es/articles/2042744-networking-diferencias-en-configuraciones-de-vlans)
- [FAQ - Should trunk ports be tagged or untagged?](https://faq-blog.com/should-trunk-ports-be-tagged-or-untagged)
- [GNS3 Extreme Networks VLANs Tagged Port (Trunk), Untagged Port (Access) & Untagged VLAN (Native VLAN)](https://www.youtube.com/watch?v=QdQzlOX9CJ8)
- Channel access method - Allows more than 2 terminals at same medium to transmit over it & share capacity @ Wiki
CAM
- Channel Access Method @ Technopedia- 802.11 Channel Access Requirements
- Deep Dive - Accessing the Network - How Wireless LANs Work @ CWNP
CSMA
- Carrier Sense Multiple Access @ WikiCSMA-CD
vsCSMA-CA
PictureChannel access method
- Allows 2 or more terminals on same medium to transmit & share its capacity @ WikiMultiplexing
- Method by which multiple signals are combined into one signal over a shared medium @ Wiki- 802.11 Channel Access Requirements
DCF
(CSMA-CA),PCF
(CSMA-CD) &HCF
(EDCA & HCCA) - The functions used by CSMA @ Amin Sedighfar
- Carrier-sense multiple access with collision detection (CSMA/CD) - Wired (MAC)
CSMA-CD
- Collision Detection @ Sunny- CSMA-CD Protocol Simulator on Python! Simulating the CSMA-CD Algorythm
- Construct & Design Aloha model and CSMA model Only for Pros!
- Carrier-sense multiple access with collision avoidance (CSMA/CA) - Wireless/WiFi
CSMA-CA
- Easy image!!! clickie!!! @ MrBrownCSCSMA-CA
- Collision Avoidance @ Sunny- CSMA-CA Simulator Online!!! Very Easy!!! Clickie! :D
- CSMA-CA - 7 easy steps Image ) @ CWNP
- Deep Dive - Wireless Collision Avoidance – CSMA/CA Though
DCF/EDCF
-
DCF - Employs CSMA/CA with the binary exponential backoff algorithm. @ Wiki
-
Carrier Sense
- Is anyone talking? Continious while: interframe space & backoff timerInterframe Spaces
- If nobody is talking, then i'll wait a while... (PT1)Pseudo-Random Backoff Timer
- If nobody is talking, then i'll wait a while... (random) | then I can transmit (PT2)Frame Transmission
- The actual transmission of frames....then carrier sense again
-
Carrier Sense Methods
- Physical & Virtual-
Physical Carrier Sense
- Image
-
-
Interframe Space Delay
- Wait before sendingRIFS
- Reduced InterFrame Space - Highest Priority & Shortest SpaceSIFS
- Short InterFrame Space - 2nd Highest PriorityDIFS
- DCF InterFrame Space - Lowest priority - Only used when using DCFAIFS
- Arbitration InterFrame Space - QoS Stations (set a number)EIFS
- Extended InterFrame Space - Used with retransissions
-
EDCA
- Enhanced Distributed Channel Access |IEEE 802.11e-2005
| Used by QoS @ Wiki -
EDCA
- Diagram @ CWNP -
EDCA
- Enhanced Distributed Channel Access @ Leo's Tech Talk
WMM
- Wireless Multimedia (AKA WME) - It provides basic QoS to 802.11 | Prioritizes traffic (4 categories) @ WikiWMM
- Wireless Multimedia - Image @ CWNP
-
Hidden Node
- Easy Image!!! Clickie clickie!!! @ MrBrownCS -
RTS/CTS
Parameters, in one minute! @ Pytriot -
CSMA/CA with and without RTS/CTS - Easy!!! Clickie!!! @ MrBrownCS
-
Channel Width Operations
-802.11n
= 20Mhz & Bonded |802.11ac
= 20Mhz, 40 Mhz & 80 MHz (20+20+40) @ CWNP -
HT Operation Modes @ CWNP
-
VHT Operation Mode Field - TXVECTOR format - supports the 3 HT modes! (for legacy) @ CWNP
-
Legacy Power Management
- Allways On | Client notifies AP of sleep state @ CWNP -
APSD
- Automatic Power Save delivery @ Tutorialspoint
- CSMA with Collision Resolution (CSMA/CR) - Vehicles, Trucks, Agriculture
- Virtual time CSMA (VTCSMA) - Real Time Computing
- Collision vs. Broadcast Domain: Hub, Switch and Router @ Sunny Sunny :D
- Collision Domains and Broadcast Domains @ Juniper Definition for Juniper Exam
- Collision Domains and Broadcast Domains Simulation Packet Tracer Lab
- Contention (Telecommunications)
- Wireless Contention, Co-Channel Contention (CCC) & Interference, Co-Channel Interference (CCI)
- Duplex (telecommunications) - Simplex, Half Duplex, Full Duplex Wiki
- Simplex, half-duplex y full-duplex @ Sunny
- Simplex, half-duplex y full-duplex - Image Image
Deep dive into the Packet / PCAP Analysis... & Sharks a lot of sharks!
-
Packet Headers, Parameters & Flags:
- TCP > Parameters
- UDP > Parameters
- ETHII > Parameters
- 802.11 - Header & 3 Types of Frames
- HTTP > List of HTTP Header Fields
- Security Headers - HTTP Header Analyzer
-
Better Known Protocols for Networking - Official RFCs from the IETF
- Address Resolution Protocol (ARP)
- Border Gateway Protocol (BGP)
- Domain Name System (DNS)
- Dynamic Host Configuration Protocol (DHCP)
- File Transfer Protocol (FTP)
- Hypertext Transfer Protocol (HTTP/1.1)
- Hypertext Transfer Protocol Version 2 (HTTP/2)
- Internet Protocol Version 4 (IPv4)
- Internet Protocol Version 6 (IPv6)
- Network Address Translator (NAT)
- Simple Mail Transfer Protocol (SMTP)
- Simple Network Management Protocol (SNMP)
- Secure Shell (SSH)
- Transmission Control Protocol (TCP)
- Telnet
- User Datagram Protocol (UDP)
-
Multicast Traffic
- Multicast Explained in 5 Minutes | CCIE Journey
- Multicast EZ Lab (IGMP Snooping included!!!)
- Diferencia entre IPTV Unicast y Multicast
- GNS3 Talks: Ostinato - Multicast traffic: what happens? @ David Bombal
- Fundamentos de Multicast + Ejemplo de IPTV en GNS3
- ¿Puedo transmitir IP TV por aire? True Multicast WiFi
- TV y video Multicast en redes LAN - Ejemplo con Hotel @ Netgear
- Como implementar redes Multicast de forma eficiente @ Netgear
- Multicast GNS3 Lab - CCNA CCNP (Part 1) @ PrimeScope
- Multicast GNS3 Lab - CCNA CCNP (Part 2) @ PrimeScope
- Multicast GNS3 Lab - CCNA CCNP (Part 3) @ PrimeScope
-
-
Mulitcast Protocols
-
- Procedimientos IGMP | Universitat Politècnica de València UPV
- Send IGMP Tool Clickie Clickie!!!
-
-
- mDNS Hacking Polymorph & Rosetta
-
Structured Cabling Fundamentals
-
UTP & STP
-
Optic Fiber
-
Structured Cabling Full Courses & Resources
-
ISM band - Industrial, scientific and medical purposes
- [RF Analysis Tools]()
- EverythingRF
- Iain Explains Signals, Systems, and Digital Comms
- WiFi Professionals log that helps WiFi enthusiasts to read and share their knowledge
- BadFi Trash, shitty, crap & full of WiFi Bad practices, DON'T DO THIS!!! Lo pongo hasta arriba porque es más utilizado de lo que parece jaja!
- BadFi Direct Twitter
- Dot 11 AP __
- WiFi inigel
- Leo's Tech Talk Wireless Library
-
Wireshark WLAN cheatsheet lo vuelvo a poner...again!
-
Official CWNA Study Guide & Exam Practice
- CWNP Universal Glossary CWNP
- CWNA - Exam Preparation WiFi-Professionals
- CWNA - Exam Objectives CWNP
- CWNA in 1 year
-
CWNA full course @ Kevin Wallace Training, LLC
-
CWNP - Free CWNP Youtube Library @ CWNP TV
-
WiFi 101 - WiFi Basic in simple lecture @ businesstechweekly
-
CWNA-108 Course - Exam Labs Paid $$$
-
CWNA-108 Course - Udemy Paid $$$
-
Understanding RF Path - DOWNLOAD BACKUP LINK Commscope Course
- VCE Exam Simulator Paid $$$
- ¿ómo instalar VCE?
- CWNP CWNA-108 Exam @ Exam Labs Paid $$$
- CWNP CWSP-206 Exam @ Exam Labs Paid $$$
- CWNP CWNA-108 @ NWexam Paid $$$
- CWNP CWNA-108 800 Question Bank $25
- (CWNA-108) Exam @ ITExams Free
- Free CWNA-108 Exam @ Braindumps Free
- CWNP CWNA-108 @ Certification Questions Free
- CWNP CWNA-108 Exam @ Pass 4 Success Free
- CWNP CWNA-108 Exam Practice Test @ CertsHero
- CWNP CWNA-108 Exam Practice Test @ Test Questions
- 4‐Way Handshake
- 40 MHz Intolerant
- AAA Framework
- AAA Server Credential
- Absorption
- Access Category (AC)
- Access Control List (ACL)
- Access Layer Forwarding
- Access Point
- Access Port
- Acknowledgement Frame
- Active Mode
- Active Scanning
- Active Survey
- Ad‐Hoc Mode
- Adjacent Channel Interference (ACI)
- Adjacent Overlapping Channels
- AES - Advanced Encryption Standard
- Aggregated MAC Protocol Data Units (A‐MPDU)
- Aggregated MAC Service Data Unit (A‐MSDU)
- AirTime Fairness
- Amplification
- Amplifier
- Amplitude
- Announcement Traffic Indication Message (ATIM)
- Antenna
- Association
- Association ID (AID)
- Attenuation
- Attenuator
- Authentication
- Authentication and Key Management (AKM)
- Authentication Server
- Authenticator
- Automatic Power Save Delivery (APSD)
- Autonomous AP
- Azimuth Chart
- Backoff Timer
- Band Steering
- Bandwidth
- Basic Service Area (BSA)
- Basic Service Set (BSS)
- Basic Service Set Identification (BSSID)
- Beacon Frame
- Beamforming
- Beamwidth
- Bill of Materials (BOM):
- Bit
- Block Acknowledgement
- Bridge
- BSS Transition
- Byte
- Capacity
- Captive Portal
- CardBus
- [BSS - One "LAN"(WLAN) Generated by one Wireless AP]
- BSSID - The "invisible" MAC of the AP who is broadcasting a SSID
- SSID - Identifier of the WLAN, visible for devices
- ESS - The "matrushka" of BSS, 2 APs or more broadcasting same SSID
- ESSID - The shared netweork name/ID between different "ESS" (Inexistent in 802.11 standards), hint: use same as SSID
- Tx / Rx - TX (transmit) is how loud you're talking / RX (receive) is how loud you think the other is talking.
- RF -
- WiFi - It means nothing!!!
RF: Radio Frequency
- Oscillation rate of frequency of an alternating voltage | magnetic, electric, electromagnetic field | mechanical system @ WikiRF: Radio Frequency
@ Techtarget- How Transmitting and Receiving Antenna works: From AC > to Antenna > to Air > to Antenna > to AC
Radio Waves
AKARadio Signals
@ NASA The basic building block of radio communications is a radio wave.Electromagnetic Spectrum
: radio waves, microwaves, infrared, light, ultraviolet, X-rays & gamma ray @ WikiRadio Spectrum
The radio spectrum is the part of the electromagnetic spectrum with frequencies from 0 Hz to 3,000 GHz(3 THz). frequency, same cycle, same wavelength, but are 2 or more wave forms not exactly aligned together._
Modified signals capable of distinguishing between 0s and 1s using modulation techs
- Multipurpose Interactive Waves!!! - Use use use!!! clickie clickie!
Carrier Signal
AKACarrier Wave
- **
Electromagnetic (EM) Waves**
: Amplitude, Wavelenght, Frequency & Hertz @ Sunny Radio Concepts
: Phase, Amplitude, Wavelenght & Frequency > CWNA in a nutshell @ yatebts
Amplitude
Height (crest) of the radio signal that it reaches while attenuatingWavelenght
Distance between the two successive crests- Wavelenght Formula & Calculation
- Wavelenght Calculation image & 2.4 GHz / 5 Ghz Table
- Lambda (Λ λ) Unit for Wavelenght
Frequency
Number of cycles per second- F (f) Unit for Frequency
- c (c) Unir for speed of light
- Hertz - Hz (unit) Freq is measured in Hertz (or Khz, Mhz, Ghz, etc...)
Phase
Relationship between two waves with the same frequency- Phase cancellation Technique (VHS)
- Phase cancellation in audio The phase in audio is easier to understand & it's basically the same
- RF Characteristics and Behaviors @ Bill Deitrick
- Wi-Fi signals: reflection, absorption, diffraction, scattering, & interference @ Sunny
- On Radio Frequency Behavioral Modeling: Measurement Techniques, Devices and Validation Aspects (Licentiate Thesis) @ Per Landin - KTH Stockholm
-
LOS
- Line Of Sight - Direct view with no obstacles in between Antennas -
Fresnel
- Elliptical shape created between a transmitter & receiver -
Wave propagation
- Any of the ways in which waves travel @ Wiki
- Radiowave Propagation - For aeronautics & radio navigation PT.1 @ Planes Overhead
- Radiowave Propagation - For aeronautics & radio navigation PT.2
Dense materials absorb energy & weaken the signal | Esponja
- RF Absorption @ Ruckus
- Absorption
- Absorption Image
Solid metal impact or "mirror" effect | L1 y X (pase) en el Winning Eleven
Bend away from the earth | Cup of water effect | Pink Floyd: Dark Side of The Moon
- RF Refraction @ Ruckus
- Refraction
- Refraction Picture
- RF Refraction - Bridge Link Example Picture
- Pink Floyd - The D̲ark S̲ide of the Mo̲o̲n (Full Album)1973
Bending & RF shadow generator behind obstacle | Travesaño!(balón cambia leve su trayectoria)
- RF Diffraction @ Ruckus
- Diffraction Image
- Diffraction - River & Rock Example Image
"Dispersión" en Español. Uneven surfaces hots, random surfaces, shake shake!
- RF Scattering @ Ruckus
- RF Scattering - side view Image
- Scattering
- Teoría de la dispersión
- Raylight Scattering - Why the sky is blue?
- Raylight Scattering - Why the sky is blue? II
- Loss: Intentional Loss, Attenuators, Natural Loss
- Inside Wireless: Pérdida de trayectoria / Path Loss
- RF Multipath @ Ruckus
- RF Delay Spread @ Ruckus
- Multipah & Delay Spread
- Results of Multipath legacy 802.11a/b/g Nemesis | but MIMO & MU-MIMO new tech Hero!
Upfade
- Increased signal strength | Multiple RF arrive at same time in-phaseDownfade
- Decreased signal strength | Multiple RF arrive at same time out-of-phaseNulling
- Signal cancellation | Multiple RF arrive at same time 180° out-of-phaseData Corrpution
- Delay Spread, Difference in time & reflected signals goes kaput!!!
- RF Modulation Ruckus
- Free Space Path Loss (FSPL) Wiki
- RF Free Space Path Loss @ Ruckus Education
- Free Space Path Loss @ Inside Wireless
Method of manipulating a signal (modulation) so that it can represent multiple pieces of data (Radio Signals into 1 & 0)
- Keying Method (Telecommunications) The capacity of a signal to encode its data so it can be transported to the reciever.
- Understanding Amplitude Shift Keying: On-Off Keying(OOK), Near Field Communications(NFC), M-ary ASK
- Current State The current value (state) of the signal is used to distinguish between 0s and 1s
- State Transition the change (transition) of the signal is used to distinguish between 0s and 1s
- Digital modulation: ASK, FSK, and PSK @ Sunny
- ASK - Amplitude Shift Keying
- FSK - Frequency Shift Keying
- PSK - Phase Shift Keying
The sum of Amplitude + Phase modulation = The king of modulations
- Modulación por Cuadratura QAM - La mejor explicación @ Telsco S.A.S.
- Binary PSK (BPSK) & Quadrature PSK (QPSK) @ Engineering Made Easy
- QAM Modulation: The king of Coding Capacity The sum of Amplitude + Phase modulation
- Inside Wireless Español: QAM Modulation pt.1
- Inside Wireless Español: QAM Modulation pt.2: Modulador QAM
- Constellation_Diagram Representation of a signal modulated by a digital modulation scheme
- QAM modulation constelation - push more data throught the networks using same space & time Image
- AM vs FM - Radio Modulation The oldschool modulation of Freq & Amplitude
- RF Components Diagram Image
- List of Full RF Components @ everythingrf
Transmitter
Initial component in the creation of the wireless medium
Antenna
Transmit & Recieve Radio Signals- Antenna Function, Patterns, BeamFlex and Options @ Ruckus
Receiver
Final component in the wireless medium | Recieves & modulate signals into 1 & 0
- RF Maths Full Course - Best RF Math Explanation @ GTHillWiFi
- RF Maths Cheatsheet @ 802dot11
- RF Calculators - Full Suite Everything RF
- Link Calculator - With Map @RF Elements
- Units of Measurments Comparison Table
- Understanding WiFi power @ Ruckus
- (W) - watt Basic unit of power | The highest value we deal in 802.11
- (mW) - milliwatt - watt to milliwatt calculator Less than 1 watt...
- (dBm) - Decibels Relative to 1 mW 0dBm = 1mW
- WiFi Signal Strenght & dBM dbm & RSSI
- (dB) - decibel Comparative measurmet value | "the difference between 2 power levels"
- (dBi) - Decibels Relative to an isotropic radiator Passive gain ;)
- (dBd) - Decibels Relative to a half-wave dipole antenna __
- Effect of Inverse Square Law on RF Propagation @ Leo's Tech Talk
- Inverse Square Law @ Isaac Newton @ mrwaynesclass
- Ley del cuadrado inverso (método de desviación) | Física @ Khan Academy
- Ley del cuadrado inverso - Aplicado a Rayos X @ Henry RX
If you hear the voice of an alien in your psychedelic experience... is the synthactical of magic
-
Logarithm Wiki
-
Relation between dBm & mW is logarithmic (Absolute vs Relative) Image
-
Rule of 10s and 3s @ Ruckus
-
Milliwatt (mW) to dBm Conversion - Easy Way! @ GTHillWiFi
-
Milliwatt (mW) to dBm Conversion - Mandrake: Understand why to use dBm in negatives @ GTHillWiFi
-
Potencias en RF - Convertir potencias ¡la mejor explicación! tabla chingona @ Telsco S.A.S.
- Regla del 10 y del 3 (dBm & Mw)- Fz3r0 @ Fz3r0
- Cálculos de dBm & Mw con Regla del 10 y del - Fz3r0 @ Fz3r0
- Ejercicios Fz3r0: Cálculo de dbm & Mw :) lo logré! Es muy fácil
- dBm to mW: Conversion Table Table
- Cálculos sencillo de FSL (Free Space Loss) - Fz3r0 @ Fz3r0
- Example1: Simplified RF Math fronm Transmitter to Receiver si se puede sumar todos los db/dbi directo | @ CWNP
- Example1: Solved (all in mind, just the last 17 solved) @ Fz3r0
- Example2: Not realistic due to free space loss is allways greater @ CWNP
- RSSI Ruckus Different for each vendor | non standard
- Receiver Sensitivity - how well RF "hear a device" The minimum signal strenght at which data can be received
- Receiver Sensitivity - Device Proximity Example
-
SNR
Signal-to-Noise Ratio @ Wiki -
SNR @ Ruckus
- SNR comparation Image
- SNR side view
- SNR spectrum
- SNR best image ) @ Ruckus
- Noise floor - Sum of all the noise sources & unwanted signals @ Wiki
- Noise Floor: ¿qué es y cómo afecta a los receptores de RF? @ borrowbits
- IR, EIRP and Relative Power Measurement @ Ruckus
IR
- Intentional Radiator Something that is specifically (intentional) designed to generate RF
(IR does NOT includes the antenna)EIRP
Equivalent Isotropically Radiated Power Highest RF signal strength or energy at tip of antenna
(EIRP is "The antenna" (IR + Antenna Gain))IR
&EIRP
- Easy & clear image- IR, EIRP & Relative Power Measurement @ Ruckus
-
Link Budget - Math of all power gains & losses that a signal experiences in a telecom-system @ Wiki
-
Link Budget - Used for WiFi bridged links (not indoor/outdoor "usual" coverages) @ Ruckus
-
Link Budget Calculator @ Everything RF
-
Link Budget Calculation - Deep Dive @ Graham Sexton
-
WLAN RF Components @ Ruckus
-
Basic WiFi components @ CWNP
-
Wireless LAN Components @ e tutorials
-
Wireless LAN Systems @ e tutorials
-
Wireless LAN Technologies @ e tutorials
-
Fundamental Antenna Operation: Fundamental job "Shape the Energy" @ GTHillWiFi
-
Antenna Patterns:
Azimuth: (Bird's eye | Top View) & Elevation (Eye level | Front View) @ UniFi- Azimuth: & Elevation Image
-
Polarization
(vertical-up-down & horizontal-side-side) &Antenna Types
- Antenna Polarization: Vertical, Horizontal, Circular, Eliptical Graphics | @ jemengineering
- [Antenna Polarization - Electric Field (up / e-plane) | Magnetic Field (side / h-plane)(https://user-images.githubusercontent.com/94720207/196008909-b128d519-bd4c-4a03-beb5-489980363c4d.png)
-
Isotropic Radiator
"The perfect wave" Theoretical (dBi) point source which radiates the same int in all directions
- Simple Diversity Systems - One antenna at a time Due to switch "one at a time" it prevents multipath
- MIMO (multiple input, multiple output) @ wiki
- MIMO (multiple input, multiple output) @ techtarget
- Multiple Diversity Systems - multiple transmission & receiving antennas Due to multiple transmission: exploit multipath propagation
- 802.11 Frames -
Full List
&All Types
@ Wiki - 802.11 Frame - WiFi (simplified for CWNA) @ CWNP TV
- 802.11 Frame - WiFi (simplified for CWNP) @ CWNP TV
- 802.11 Frame Types and Formats @ HowIwifi
- 802.11 - Framing in Detail @ O'reilly
Header
- 802.11 Information - Info that allows data be received by STAPayload
- User Data (or just extra info for oparations) - IP headers, TCP headers, App Data, etc | EncryptedFooter
- Error Correction / Frame Check Seq - Data generated to ensure accuarate delivery
- 802.11
MAC Header
- Frame Control
- Duration /ID Info: Time will take to finish the current frame transaction
- Address 1 Receiver Address
- Address 2 Transmitter Address
- Address 3 BSSID + SA + DA + DA
- Sequence control
- Address 4 SA
- QoS control
- HT control
- Frame Body
- FCS
- Frame Control
- Protocol Version
- Type Info: Control, Data or Management Frame
- Subtype Info: (specific type) p.e Type-Data >>> Subtype-QoS
- To DS
- From DS
- More Fragments
- Retry
- Power Management
- More Data
- Protected Frame
- +HTC / Order
-
Wiresharl WLAN cheatsheet lo vuelvo a poner
-
802.11 Frame Analysis Full webinar @ Tom Carpenter | CWNP Dark Wizard
PDUs & SDUs travel the OSI layer from top to layer 1 PMD, in layer 1 is modulated (ofdm, bpsk, etc)
-
PDU - In networking, a PDU is best understood in relation to a SDU
-
MSDU, MPDU, PSDU & PPDU @ Jacob Morton
MSDU
- LLC Logical Link Control: Data Link 2(Top) adds footer & header + frame check seq FCS, then >MPDU
- MAC Medium Access Control - Data Link 2 passes to physical layer to > PLCPPSDU
- PCCP Physical Layer Convergence Protocol - Physical 1 adds PLCP header, then >PPDU
- PMD Physical Medium Dependent - Physical 1 (Bottom) transmit with the preamble or training fields
-
Aggregation
in WIFI - Frame Aggregation (Combining Frames into larger frames) @ Leo's Tech TalkA-MSDU
- MAC frame: Adds multiple subrames of MSDUs into 1 MPDU > Reduces Overhead- [
A-MPDU
- PHY frame: Adds multiple subrames of MPDUs into 1 PPDU > Reduces Overhead]((https://user-images.githubusercontent.com/94720207/196087530-71d12c1e-59ab-4418-aeb8-eed2aaf2e214.png)
-
A-MSDU
&A-MPDU
- Added to the IEEE802.11 n
HT & VHT networks improvements -
A-MSDU vs A-MPDU - Why choose one over the other? @ Jacob Morton
-
Two Level Aggregation @ Jacob Morton
-
Centralized Data Forwarding
- All data goes back to the WLC, then is fwd to final destination -
Distributed the Data Forwarding
- For Data Plane, AP fwd the data directly to the final destination
-
Split MAC Architecture
- Typical WLC uses | Part of the MAC Ops are in the AP, other part in the WLC -
Scalability & Availability
AKAN +1
Solutions | HA & Clusters) -
Intra- and Inter-Controller STA Roaming
- Same WLC for both APs = Intra | Different WLC = Inter -
Cloud Based Model
- AP management & control from Cloud | Local GRE (server) available -
Distributed Model
- Cooperative Control | APs cooperate with each other | AeroHive vendor -
Controller-Less Model
(Autonomus) | EnGenius, like original manual APs
- Adjacent Channel & Co-Channel Examples with pics!
- Co-Channel Interference - Same channel full overlap
- Adjacent Channel Interference - Other channel partially overlaped
- VSWR | S11 | Return Loss @ inside wireless
- Understanding VSWR & Return Loss @ Rohde Schwarz
- U-NII - Unlicensed National Information Infrastructure | Channel List
- U-NII - WiFi Table | U-NII 1 & 2 = indoor | @ Russel Rahman
- BSS coloring - 802.11ax o wifi 6 @ Ruckus
- How RF coverage works
- Antenna Gain | dBi
- Basics of Antennas and Beamforming - Massive MIMO Networks
- Antenna Beamwidht @ Inside Wireless
- Side Lobes
- [Fresnel Zones](Inside Wireless: Zonas de Fresnel)
- CWNA Mathematics Resume Notes (bottom)
- Inside Wireless en Español: Presupuesto de Enlace - Prx > Gtx / Ptx
watt to milliwatt calculator](https://www.rapidtables.com/convert/power/mW_to_Watt.html
- [Diferencias entre: WiFi4, WiFi5 & Wifi6](https://www.youtube.com/watch?v=P_nCjxi9Egc)
- [Tabla de comparación 802.11n VS 802.11a VS 802.11ax](https://user-images.githubusercontent.com/94720207/179373976-9e06f543-283a-4ecb-a623-7e9b71a5d64b.png)
Wireless WLAN Troubleshooting & Ass-Savers
-
Power Measurement Fundamentals - Tx | Rx | IR | EIRP @ GTHillWiFi La mejor epxlicación de IR & EIRP
-
Advanced Power Measurement @ GTHillWiFi La mejor epxlicación de db y milliwatts y cómo calcular medidas relativas
-
Wifi Bands 2.4 Ghz VS 5 Ghz Easiest and shortest explanation for kids who like to hack
-
Wireless LAN (WLAN) most important concepts:
U-NII bands
-
WiFi
-
Interferece
-
Radio Frequency (RF) Components and Measurements
-
Important Functions of Wireless Devices
-
Components of RF Communications
-
-
CWNA - Certified Wireless Network Administrator: The 4th Impact Horizon alternitatis systema sephiroticvm X divino rvm nominvm.
-
EVA I - Overview of Wireless Standards, Organizations, and Fundamentals
-
EVA V - Radio Frequency Signal and Antenna Concepts
-
EVA VI - Wireless Networks and Spread Spectrum Technologies
-
EVA VII - Wireless LAN Topologies
-
-
EVA X - MIMO Technology: HT and VHT
-
-
- [Nonstandard PoE]() - [IEEE 802.3af]() - [IEEE Std 802.3-2005, Clause 33]() - [IEEE 802.3at-2009]() - [IEEE Std 802.3-2018, Clause 33]() - [IEEE 802.3bt-2018]()
-
EVA XIII - WLAN Design Concepts
-
EVA IV - Site Survey and Validation
-
-
EVA XVI - Wireless Attacks, Intrusion Monitoring, and Policy
-
EVA XVII - 802.11 Network Security Architecture
-
EVA XVIII - Bring Your Own Device (BYOD) and Guest Access
-
- [Access Network Query Protocol]() - [Hotspot 2.0 Architecture]() - [802.1X/EAP and Hotspot 2.0]() - [Online Sign-Up]() - [Roaming Agreements]()
-
EVA XIX - 802.11ax: High Efficiency (HE)
The King of Networking...
- Cisco Dashboard UI Online test
- Cisco Networking Infraestructure CLI/IOS - Command Bible My CCNA+CCNP Commands & Configurations Pocket Bible
- Cisco CCNA v7 200-301 Full Course English
- Cisco CCNA v7 200-301 Full Course Español
- Cisco CCNA Cheat Sheet I
- https://github.com/Fz3r0/cisco-cheatsheet
- https://github.com/Fz3r0/Cisco-IOS-Command-CheatSheets
- all commands ios
Somehow my life always return here...Ruckus Wireless, maybe because I love dogs?
- [**Band Balancing**](https://www.youtube.com/watch?v=gsv9Tiqpt18)
- [**Rogue AP Detection** - De-Auth Attack for Mitigation](https://www.youtube.com/watch?v=Uk0QN7ckL-I)
- [**Auto Cell Sizing** - Background scanning + Auto Cell - Auto-FTW!](https://www.youtube.com/watch?v=E0_kISkfEd0)
- [Orientation Matters](https://www.youtube.com/watch?v=_7ZZodhMieI&t=1s)
- [Materials and Obstacles](https://www.youtube.com/watch?v=p4fUJkqNjFs&t=1s)
- [WiFi is NOT One Size Fits All](https://www.youtube.com/watch?v=ovHhIgwrbRg)
- [Consider Your Environment](https://www.youtube.com/watch?v=Ccv-b7YmcZA)
- [Establishing Connectivity](https://www.youtube.com/watch?v=dk0SuhQJc48)
- [Understanding Intended WiFi Usage in regards to design](https://www.youtube.com/watch?v=STBKccFPf_g)
- []()
- [Deploying APs](https://www.youtube.com/watch?v=YlRatjSfTVw)
- [Defining Requirement Area (Materials, Walls, Floors & Stuff!)](https://www.youtube.com/watch?v=h5jfpAGXhEw)
- [Airtime Utilization](https://www.youtube.com/watch?v=srTxvfasRIg)
- [Antenna Function, Patterns, BeamFlex and Options](https://www.youtube.com/watch?v=K2ZhXLuJMfg) _Very visual presentation of RF!_
- [WiFi Frequency Bands, Channels and ChannelFLy](https://www.youtube.com/watch?v=iwteOMhB0kw)
- [CommScope Ruckus CVE Announcement - **FragAttack**](https://www.youtube.com/watch?v=nfz6v2NsS2Y)
- [**Ruckus Log4J vSZ Patch** and Work Around](https://www.youtube.com/watch?v=56_tgSApKkA&list=PLwZotTMbkZQFA_Lm9qjAFKOQMWM3aOCHG)
- [What Is **Ruckus Unleashed**?](https://www.firewalls.com/blog/what-is-ruckus-unleashed/)
- [**Deploy Ruckus Unleashed** in Less than a Minute & Admin like a Sir!](https://www.youtube.com/watch?v=8skRjj0OfhM&list=PLwZotTMbkZQHmY4cyfbwFOH8lCSRF_VDA)
- **Full SmartZone Guides**
- [**SmartZone OS5: THE FULL DARK BIBLE TO CONTROL THE AIR, WOOF WOOF!!!**](https://www.youtube.com/watch?v=CBB9CSuOJHY&list=PLySwoo7u9-KJLZWZj0tDtG5jo-QRdeQw0)
- [**SmartZone: SZ-300 VSZH scg200 administrator guide PDF**](https://github.com/Fz3r0/Fz3r0/files/9128430/SMART_ZONE_sz300-vszh-scg200-administrator-guide.pdf)
- [**SmartZone: 2022 version: RUCKUS SmartZone 100, SmartZone 144, and Virtual SmartZone-Essentials Administrator Guide, 5.2.1F**](https://docs.commscope.com/bundle/sz-521-adminguide-sz100vsz/page/GUID-C9A5B40D-6500-49E7-B589-A060619DF747.html)
- **Ruckus Networks Education - SmartZone**
- [Configuring a SmartZone 3.6.1 Controller Prior to Adding APs](https://www.youtube.com/watch?v=j-cDiGTtLUI)
- [Provisioning Access Points with Ruckus SmartZone 3.5](https://www.youtube.com/watch?v=8kT_hL7Slec)
- [System Configuration](https://www.youtube.com/watch?v=KIJ5h6rV098)
- [Zone Configuration: Advanced Options](https://www.youtube.com/watch?v=G79JTDPrBt4)
- [Directed Multicast](https://www.youtube.com/watch?v=1q2iPheO-dY)
- [Bonjour Services](https://www.youtube.com/watch?v=TyG-N9f8lsk)
- [Bonjour Services (offical HTML version)](https://docs.commscope.com/bundle/sz-521-adminguide-sz100vsz/page/GUID-C9A5B40D-6500-49E7-B589-A060619DF747.html)
- [Auto Cell Sizing](https://www.youtube.com/watch?v=tKfvlFRc37M)
-
SmartZone 5.2 HighScale Deployment - Last Version: Secrets, Hints & Tricks
-
Commscope/Ruckus Official Online Course RAZA 200
-
Ruckus Education - SmartZone 5.2
-
-
Zone Director
-
Cloud & Virtualized
-
Ruckus Wireless Troubleshooting
-
Fortinet Fundamentals
-
Fortigate Labs Campechanos
-
Tutorials
- La clásica de borde: IP + VLANs + DHCP + Salida a Internerd
- Configuración de GNS3 para emular dispositivos Mikrotik con QEMU FULL!!!
- Curso MikroTik de principiante a expoerto
- Cargar Imagen de Mikrotik Router en GNS3 2022
- MikroTIK desde CERO @ TikAcademy
- MikroTIK desde CERO 2021 @ TikAcademy
- Mikrotik desde 0 en GNS3
- Usar Multiples IP WAN en una sola Interface
-
Fz3r0 Labs @ GNS3
-
Tutorials
Pro and Secure Network Configurations Guides by Fz3r0
-
Cisco
- Configurar VLANs de Noob a Pro! En Español
- Configure Spaning Tree Protocol like a Sir (STP, RSTP+, PVSTP & R-PVSTP)
- Configure Ether-Channel like a Sir! (Etherport, PAgP, LACL, Static) | STP)
- Configure DHCPv4 like a Sir (DHCPv4, DHCP Client, DHCP Server, DHCP Relay Agent, Cisco Router, Home Router)
- Configure FHRP like a Sir! (Pro HSRP + intro to VRRP, GLBP, IRDP)
- Configure Remote Site Wireless (WLAN) like a Sir! (Home/SOHO Wireless Router, WLAN Setup, WPA2, WPA2 Enterprise, AES, Mesh, NAT, QoS, Port Forwarding & Triggering )
- Configure WLAN on a Wireless Controller (WLC) using Personal WPA2 Authentication like a Sir! WPA2, AES, WLC, WLAN Setup
- Configure WLAN on a Wireless Controller (WLC) using Enterprise WPA2 Authentication like a Sir! WPA2 Enterprise, AES, RADIUS/TACACS, AAA, WLC, WLAN Setup
-
Cisco Wireless
-
Cisco Security
- CCNA Security Full Labs
- Cisco ASA > Basic Intro & Initial Configuration
- Cisco ASA > Full Basic Settings Firewall using CLI
- ACL > Configure Time Based ACL like a Sir!
-
Commscope Ruckus
- ICX > Ruckus Stacking: The Main Weapon of Ruckus and Campus Switches
- ICX > Ruckus Stacking: Configuring Stacking (video)
- ICX > Ruckus Stacking: Configuring Stacking Guide
- ICX > Ruckus Stacking: Lab Demo CLI Basics & Stacking
- ICX > Configuring SSH on Ruckus ICX
- ICX > Configuring AAA Authentication on ICX
- ICX > Web Management (HTTP) on Ruckus ICX
- ICX > Configuring Link Aggregation Group (LAG)
- ICX > Configuring PoE on ICX
- ICX > Configuring STP & RSTP on ICX
- ICX > Configuring DHCP Server on Brocade ICX
- ICX > Configuring *DHCP Snooping
- ICX Triforce CC pt.1 > Ruckus ICX - Stack
- ICX Triforce CC pt.2 > Ruckus ICX - SPX LAG (AKA Campus Fabric / Non traditional SPX, Ruckus unique)
- ICX Triforce CC pt.3 > Ruckus ICX - UFI upgrade (upgrading UFI on entire fabric example)
Networking Labs using simulators, emulators like Packet Tracer, GNS3 & eve / and/or physical infraestructure by Fz3r0
-
Misc
-
Fz3r0 Labs:
- Lab 01 > Secure Home Network + Internet to Home (FTTH) Simulation Packet Tracer
- Lab 02 > Secure InterVLAN Routing: Router on a Stick Packet Tracer
- Lab 03 > Secure InterVLAN Routing: Switch Virtual Interface SVI Packet Tracer
- Lab 04 > Secure Routing Dual Stack Topology + InterVLAN Routing
- Lab 05 > Secure RSTP & Rapid PVST+STP (aka STP) in 3-leaf-spine Data Center Packet Tracer
- Lab 06 > Secure RSTP & Rapid PVST+STP (aka STP) in 3-leaf-spine Data Center GNS3
- Lab 07 > EtherChannel All-in-One! LACP, PAgP & Static + RSTP+ Packet Tracer
- Lab 08 > DHCPv4 All-in-One! DHCP Servers, DHCP Clients & DHCP Relay Agents of all types! Packet Tracer
- Lab 09 > Secure Layer 2 - Semi-FULL Security + Best Practices VS Layer 2 Attacks (No SSH)
- Lab 10 > Secure Layer 2 + SSH Local Login = FULL Security + Best Practices VS Layer 2 Attacks (No AAA)
- Lab 11 > RADIUS Server Config - Using WinRadius on Windows Server GNS3
-
Other nerds Labs:
- Cisco ASA (Adaptive Security Appliance) - Trusted & Untrusted | easy config! @ Internetworks
- Cisco ASA firewall - Inside | Outside | DMZ | easy config! @ Internetworks
T-Shoot & Incidence Response for Notworking Hardware & Software by Fz3r0
-
Wired LAN Network Troubleshooting
- Boot/Start-up from a Binary .bin or config.text & Recover from a System Crash The tricks and hints for booting
- Reset config of Cisco device Back to Factory Default settings Shiny as new, it also smells! yummm
- Find & Troubleshoot Access Layer Issues, Output & Input Errors {Runt, Giants, CRC, Collisions} (show interface) Find and repair shitty errors in the transmission
- Cut-Throught & Store-and-forward Switching Spoiler-alert: Store-and-Forward for the win! Checksum FTW
- Fixing Kali VM Bridge Network [VMware] (GNS3 + Hacking Labs = ETH kaput!) Easy fix to the bridge VMware incidence
- Fixing GNS3 - VMWare 'Taking ownership of this virtual machine failed' Error
-
Wireless LAN Network Troubleshooting
Attack switching protocols & Hack the Layer 2
- Yersinia Attack STP, CDP, DTP, DHCP, HSRP, 802.1q, 802.1X, ISL, & VTP
- Ettercap Sniffing, active and passive dissection of many protocols, data injection & more fun!
- Scapy Packet manipulation tool, packet generator, network scanner, network discovery, packet sniffer, etc.
- MAC Flooding/CAM Overflow, Man-In-The-Middle (MITM) ARP Poisoning + MAC Spoofing + TCP Packet Tamper, Pivot + PrivEsc @ Fz3r0 Full writeup attacking a THM machine using Layer 2 Attacks to intercept PDUs & PrivEsc a compromised Linux machine
- What is a VLAN Hopping Attack? Vectors: Switch spoofing & Double tagging
- VLAN Hopping Attack DTP @ Cheng Zhang A very classic attack by switch trunking DTP setting. @ Yersenia
- VLAN Hopping Attack & How To Stop it @ Yersenia + GNS3
- VLAN Hopping Attack: Hack a Cisco Switch with a Raspberry Pi @ Network Chuck
- VLAN Attack Double Tagging
- VLAN Attack Attack Between Devices
- Hacking networks with VLAN hopping and Python @ Bombal Vamos Bombal!
- DHCP Snooping: Stop Kali DHCP Hacks and MiTM @ Bombal
- DHCP Attack DHCP Starvation @ Yersenia
- DHCP Attack DHCP Spoofing
- DHCP Attack Rougue DHCP Server | MiTM @ Ettercap
- ARP Attack ARP Spoofing
- ARP Attack ARP Poisoning
- Address Spoofing MAC & IP Spoofing
- STP Attack Spaning Tree Protocol Manipulation
- CDP Attack CDP Recon & Crafting
- Attacking STP & BPDUs crafting packs @ Yersenia
Attack and control the air...
- Best WiFi Hacking tools: Airgeddon, Kismet, Raspberry Pi & More! @ Kody & Bombal
- WEF - WiFi Exploitation Framework A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA and WEP, automated hash cracking, bluetooth hacking and much more.
- Alfa AWUS036ACM WiFi adapter - 2.4 and 5 Ghz Use this sword you will need it for your adventure!
- Deauthentication Attack
- Authentication Attack
- Beacon Flood Attack
- PKMID Attack
- EvilTwin Attack
- Passive/Stealthy Attack
- Pixie Dust Attack
- Null Pin Attack
- Chopchop Attack
- Replay Attack
- Michael Exploitation Attack
- Caffe-Latte Attack
- Jamming, Reading and Writing bluetooth connections
- GPS Spoofing with HackRF
Guides for performing Penetration Attacks involving the Network Infrastructure Exploiting Known Vulverabilities and how to Mitigate and Secure the Network Against those threats
-
Security & Best Practices Configurations for Networking
- Pro Configs @ Best Practices, Security Standards & SSH LOCAL-Logins For any Cisco device (IOS)
- Pro Configs @ Best Practices, Security Standards & AAA - SSH REMOTE- RADIUS SERVER
- Pro Configs @ Best Practices & Security Standards for Switchports & Interfaces
- Pro Configs @ Defending Layer 2 Attacks - Cisco Switches Defensive Security Configurations for a Pro Stronghold!
- E-Mail & Raw Source Analysis for Secure Theat detection
- LAN-Security: Endpoints, Hosts, & Security Appliances
- Cisco Auto Security Configuration
-
Attacks & Mitigation on Cisco Devices Resources
- Awesome Cisco Exploitation A curated list of awesome Cisco exploitation resources.
- Network Security - Deep Dive Replay @ Kevin Wallace Training, LLC 3 Hours of Full Info of NetSec
- [Fencing and Physical Barriers]()
- [Biometrics]()
- [Badges and Access Logs]()
- [Surveillance (Guards, Escorts, VoIP & Electronic Survillance, RFID & Wireless)
- [Hardening: Network and Routing Services (DHCP, DNS, ICMP, RIP, NTP)]()
- [Hardening: Telnet, SSH & SCP]()
- [Secure Protocols: SNMP > SNMPv3 | HTTP > HTTPS | FTP > FTPS | POP, IMAP > S/MIME]()
-
Network Hardening: Segmentation
-
Endpoints Protection & Security
- Traditional Host based Security,Host Firewall,Antivirus,HIPSs,etc
- [Top Security: NAC,host-based AMP, ESA, WSA]
- [Cisco ESA & WSA]
-
Access Control
- Authentication with Local Password
- AAA Standards
- IEEE 802.1X: Port-based Access Control & Authentication
-
RADIUS & TACACS Server & Authentication
-
Wireless Networking Guides, Tips, Tricks & Hints
-
Wireless Threats & Attacks
- DoS Attack - Interference & Misconfigurations
- Rogue Access Points
- Man-in-the-Middle Attack (MITM)
- Log4j Vulnerability @ Unify Access PWN!
- Hacking: Cracking de Contraseñas en redes WPA2
- Rogue Access Point - Evil Twin
-
Defending Wireless Networks
Guides, Tips & Tricks, Downloads, Training, Crafting, Arsenal, Binaries, Executables, Scripts, Open Source Codes
http://revolutionwifi.blogspot.com/p/wi-fi-tools.html full list sacar!!!
- MCindex MCS Index Table, Modulation and Coding Scheme Index 11n, 11ac, and 11ax
- Client and Cappabilites for 5 GHz - which band they take?!
- WiFi Aliance Product Finder
- [JPerf ]()
- [TamoSoft Throughput test]()
-
Wired
- arpwatch – keep track of ethernet/ip address pairings.
- bmon – bandwidth monitor and rate estimator.
- bwm-ng – console-based live network and disk io bandwidth monitor.
- curl – transfer data with URLs. (alternatives aria2, httpie)
- darkstat – Captures network traffic, calculates statistics, and serves reports over HTTP.
- dhclient – Dynamic Host Configuration Protocol Client.
- dhcpcd - RFC2131 compliant DHCP client daemon.
- dig – DNS lookup utility.
- dstat – A versatile resource statistics tool.
- ethtool – utility for controlling network drivers and hardware.
- gated – gateway routing daemon.
- host – DNS lookup utility.
- hping – TCP/IP packet assembler/analyzer.
- ibmonitor – shows bandwidth and total data transferred.
- ifstat – report network interfaces bandwidth.
- iftop – display bandwidth usage.
- ip (PDF file) – ifconfig on steroids.
- iperf3 – A TCP, UDP, and SCTP network bandwidth measurement tool.
- iproute2 – collection of utilities for controlling TCP/IP.
- iptables – utility for configuring Linux kernel firewall.
- IPTraf – Console-based network monitoring utility.
- iputils – Network monitoring tools, including ping.
- iw – a new nl80211 based CLI configuration utility for wireless devices.
- jwhois ( improved whois) – client for the whois service.
- “lsof -i” – reveal information about your network sockets.
- Lynis - Auditing, system hardening, compliance testing.
- mtr – network diagnostic tool.
- net-tools – the collection of base networking utilities for Linux.
- ncat – much-improved re-implementation of the venerable Netcat.
- nethogs – Linux 'net top' tool written in C++.
- Netperf – Network bandwidth benchmark.
- netsniff-ng – Swiss army knife for your daily Linux network plumbing if you will.
- netstat – Print network connections, routing tables, interface statistics, masquerade connections, etc.
- netwatch – monitor network connections.
- ngrep – ngrep is like GNU grep applied to the network layer.
- nload – Monitors network traffic and bandwidth usage.
- nmap – Nmap ("Network Mapper") utility for network discovery and security auditing.
- nmcli – command-line tool for controlling NetworkManager.
- nmtui – provides a text interface to configure networking by controlling NetworkManager.
- nslookup – for querying DNS to obtain domain name or IP address mapping. (alternatively dnslookup)
- openssl - The Open Source toolkit for SSL and TLS protocols.
- openvpn - robust and highly configurable VPN
- paping - TCP ping on specific port.
- ping – send icmp echo_request to network hosts.
- iproute2 (route) – show / manipulate the IP routing table.
- slurm – yet another network load monitor.
- snort – A lightweight network intrusion detection system.
- smokeping – A tool to keep track of your network latency.
- socat – relay for bidirectional data transfer between two independent data channels
- ss – another utility to investigate sockets.
- ssh – the infamous Secure Shell protocol.
- speedometer – Measure and display the rate of data across a network connection or data being stored in a file.
- speedtest-cli – for testing internet bandwidth using speedtest.net.
- systemd-networkd - a system daemon that manages network configurations.
- tcpdump – dump traffic on a network.
- tcptrack – displays information about TCP connections on a network interface.
- telnet – User interface to TELNET.
- tracepath – traces path to a network host discovering MTU along this path (similar traceroute)
- traceroute – Tracks the route taken by packets over an IP network.
- vnStat – A console-based network traffic monitor.
- websocat – CLI client for web sockets, like netcat/curl/socat for ws://
- wget – Network utility to retrieve files from the Web.
- WireGuard - extremely simple yet fast and modern VPN.
- wireless_tools – Tools allowing to manipulate the Wireless Extensions.
- Wireshark – network protocol analyzer.
This tool is so awesome that in needed it owns Chapter, Megalodon Street Shark mode
- OS Fingerprinting - How it works? @ Megalodon
- Wireshark - Display Filter Reference over 271000 fields in 3000 protocols as of version 3.6.5
- Wireshark - Capture Filters Reference
- [Wireshark - From Nemo to Black Megalodon: Pro Sniffing & Network Traffic Audit/Analysis. by @ Fz3r0]
- Wireshark - Troubleshooting Slow Networks - Presented by Megalodon Chris Greer @ UC Berkeley
- Wireshark - Multicast Traffic Measurement (MDNS & more!)
- Wireshark Map IP Address Locations @ GeoIP
- **Wireshark - Analyzing Botnet Attack Activity + Geolocalization @ Megalodon Chris Greer
- Wireshark - Analizyng a Hacked Webserver (HTB) @ M.Hadam
- Wireshark - Malware analysis, fake Firefox Traffic
- Wireshark + Virus Total Analyzing Malware Traffic @ HackerExpert
- Wireshark - Analyze A Bot Infected Host @ Laura Chappell
-
Analyzers
-
Iperf
-
Sniffers
-
tcpdump
-
T-Shark
-
-
IDS & IPS
-
Snort The foremost IPS in the world supported by Cisco Talos
- Snort > Instalación(1) en Kali y Configuración @ D.Pereira
- Snort > Instalación(2) {error fixes}
- Snort > Install on Debian {error fixes II}
- Snort > Detección, Mitigación de Intrusiones y Threat Hunting
- Snort @ Cisco Talos - Introduction by @ Hackersploit
- Snort @ Cisco Talos - The foremost IDS + IPS in the world. Define malicious network activity. by @ Fz3r0
-
-
-
Recon & Network Mapping
-
NetSec
- EtherApe
- Ntop
- Ngrep
- Kismet
- Ettercap
- SIEM Testing tool has the ability to provide details on the source of suspicious network activity.
- Tripwire Tripwire is used to assess if network devices are compliant with network security policies, recommended best practices, and compliance standards.
- SOAR Stack of compatible software programs that enables to collect data about security threats and respond to security events without human assistance.
- L0phtcrack Tool is used for password auditing and recovery
- GFI LANguard
- Nessus
-
Testers & Troubleshooting
- LDWin - Link Discovery for Windows Discover connected ports on Switch using CDP & tcpdump.exe
- iPerf The ultimate speed test tool for TCP, UDP and SCTP
-
Calculators, Converters, Editors, Charts, Dumps
- Domain to IP Converter URL to IP Address online
- IP Info Accurate IP address data "whois" online
- Hexadecimal to Text Converter For Networking & Exploiting Buffer Overflow hohoho
- UTF-8 string lenght & byte counter chars to bytes!
-
The Black Arts of Packet Crafting & TCP/OSI destroying with Scapy Framework
- Scapy Cheatsheet 1 @ SANS Institute
- Scapy Chapter I - Install, Run, Sniff
- Scapy Chapter II - Reading PCAPs
- Scapy Chapter II - Crafting Customized Packets
- Dark Art of Packet Crafting with Scapy @ Python + Scapy
- Creating malicious packets & breaking TCP/IP rules @ Python + Scapy
- Simple Network Scanner @ Python + Scapy
- Medium Network Scanner @ Python + Scapy
-
Full Network Scanner @ Python
-
Simple Port Scanner @ Python + Sockets
-
Full Port Scanner @ Python + Sockets
-
Subnet Calculator @ Python
-
OS Identifier using TTL @ Python
-
CAM overflow / MAC flooding attack Cyber-Weapon @ Python + Scapy ) @ Python + Scapy
-
SQL Server Exploit @ Python For RCE
-
THM Network Offensive Security & Red Team
-
THM Network Defensive Security & Blue Team
Network Automation is a cross between the discipline of Network Infrastructure and the discipline of Programming.
-
Network Automation Full Courses & Resoursces
-
Software Defined Networks (SDN)
- Awesome SDN An awesome list about Software Defined Networks (SDN)
-
Cisco DNA Center
-
Cisco SD-WAN
-
Network Automation Bibles
- Cisco DevNet - Notwork Automation & Programmability Basics
- Pynet - Full Resources of Python for Network Programming @ ktbyers
- Pynet - Full Network Automation Course Excercises @ ktbyers
- Awesome Network Automation This list was created to serve as a one-stop shop for information related to Network Automation.
- Awesome Network Automation & Programmability A curated list of resources and packages for networking programmability and automation
- Python Code Samples for Network Automation A collection of Python Code Samples for Network Management.
- Network Automation @ NAPALM Network Automation and Programmability Abstraction Layer with Multivendor support
- Network Automation @ Trigger
- Automate Cisco IOS Commands @ Python
- Auto-Configure Cisco Routers @ Python
- Auto Secure Firewall Templates and Automation Resources for Cisco Secure Firewall on diverse cloud platforms.
Here's the machine the strangers use to amplify their thoughts, the machine that changes their world...
You must take control of it. You must make the machine yours...
I know you can beat them...but you must concentrate...
I have mastered the ultimate technology, the hability to alter physical reality and read peoples minds.
- Red Teaming Tool Kit - Tool for each Cyber Kill Chain
- Red Team Guide Practical Guide for Red Teaming Operations
- iRed Team Notes Red teaming and offensive security notes.
- Red Team Notes 2.0
- The Book of the Secret Knowledge A collection of lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools & more.
- Pentest Tools @ S3cur3Th1sSh1t Full arsenal for pentesting, scripting and pwning
- Pentester Book This book contains a bunch of info, scripts and knowledge by six2dez
- Pentest Cheatsheet God
- Hacktricks _Hacking trick/technique/whatever by Carlos Plop jooooodeeer!!! _
- Cyber-Bookmarks
- High On Coffee Security Research and Penetration Testing Blog - Cheat Sheets, Techniques, Hardening, WalkThroughs
- ReconShell
- Cobalt.io Modern pentesting for security and development teams
- SecLists Collection of multiple types of lists used during security assessments, collected in one place.
- The Art of Hacking Over 9,000 References, Scripts, Tools, Code & Resources for Offensive/Defensive Security
- Hakin9 magazine dedicated to hacking and cybersecurity. Defensive and offensive secuirty techniques
- Awesome Hacking A collection of awesome lists for hackers, pentesters & security researchers.
- Tib3rius FULL Pentesting Black Magics Cheatsheets, Tools, PrivEsc, Checklist, Exploits
- Aldeid Wiki about Network and Web Applications Security, Ethical Hacking and Network Forensics.
- Hacking Writeups @ jlajara Very good writeups PrivEsc, XSS, Path Traversal, SQLi, Evasion & more.
- Shodan: The Complete Guide Complete guide for Shodan.io: a search engine for the Internet of Things.
- shodan.io Hacks, Dorks & Bonus
- Dorks Collection List
- Awesome Threat Hunting This repository is a library for hunting and detecting cyber threats.
Mind-Maps, Paradigms, Way-to-Go, Hints & Tricks for Seek & Exploit TICs!
- Hacking & Exploiting Everything! > Full Security Assessment: Mind-Map & Tools
- Bug Bounty Mind-Map & Tools
- Lockheed Martin Cyber Kill Chain
- Unified Kill Chain
- Varonis Cyber Kill Chain
- Active Directory Kill Chain Attack & Defense
- MITRE ATT&CK Framework
- ATT&CK knowledge base of adversary tactics & techniques based on real-world observations
- ATT&CK Navigator Web-based tool for annotating and exploring ATT&CK matrices.
- ATT&CK Navigator (Example with Carabanak) Carabanak Group Example Search
- OST map A map tracking the use of libraries with offensive capabilities by threat actors.
- D3FEND A knowledge graph of cybersecurity countermeasures.
- Adversary Emulation Library library of adversary emulation plans. Emulate real-world attacks
-
CVE Databases
-
Vulnerability Information Sources
-
CVE & PoCs finders and tricks
- Exploit DB
- Marc.Info CVE POCs collection!!!
- trickest CVE Almost every publicly available CVE PoC.
- PoC finder in Github Finds CVE PoCs on Github.
-
Common & Recent Exploits for CTFs, CVEs & Wild Vulns
- SANS (SysAdmin, Audit, Network, Security)
- Mitre
- FIRST (Forum Incident Repsonse and Security Teams)
- SecurityNewsWire
- (ISC)²
- CIS (Center for Internet Security)
- Alien Vault
-
Cisco Talos Talos is one of the largest commercial threat intelligence teams in the world, and is comprised of world-class researchers, analysts and engineers.
-
FireEye FireEye offers SIEM and SOAR with the Helix Security Platform
-
AIS - Automated Indicator Sharing U.S. Department of Homeland Security real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
-
Enterprise Patch Management
- STIX - Structured Threat Information Expression Set of specifications for exchanging cyber threat information between organizations.
-
Databases & Arsenals
- Blackhat Arsenal Tools Official Black Hat Arsenal Database
- Kali Tools
- Black Arch Tools Over 2800 Tools. Every package of the BlackArch Linux repository
-
Standalone Tools
-
Brownser Extensions for Hacking
- Wappalyzer Site profiler tool
- BuiltWith Site profiler tool
- Cookie-Editor
- Useragent Manager & Switcher
- Foxy Proxy
- Tamper Data for FF Quantum Monitor live requests, Edit headers on live requests, Cancel live requests, Redirect live requests.
- IP Address and Domain Information
- Permission to Hack This extension crawls the security.txt of each website you visit.
- KNOXSS Community Edition by Brute Logic Tool for XSS (Cross-Site Scripting) discovery.
-
Pivoting & Port Forwarding
- Chisel server/client. Fast TCP/UDP tunnel, transported over HTTP, secured via SSH
-
Enum & PrivEsc
- pspy Process viewer
- peas (winpeas, linpeas) Tasty peas :3
- Fz3r0 > Commands and Scripts for Dark Arts < Fz3r0
- https://github.com/Fz3r0/CheatSheet
- https://github.com/Fz3r0/PowerTools powershell
- Payload All the Things Payloads and bypasses for Web App Security.
- Payload All the Things - Reverse Shells Payloads and bypasses for Web App Security.
- High on Coffee - Reverse Shells
- Pentest Book - Reverse Shells
- TheFatRat Payload Automation,Listener Generator,Bypass anti-virus backdoors & more...
- One List for All... @ Six2dez All fuzzing lists in one
- Seclist >>> Usernames: Common, Leaked, Stolen, Hacked & Default
- Seclist >>> Passwords: Cracked Hashes, Leaks, Stolen, Hacked, Databases, WiFi-WPA default**
- Seclist >>> DNS, File System, Web Content, Directory, URL, Infraestructure, Variables
- National Cyber Security Center >>> Passwords: Top 100,000 used
-
Subcat Subdomain discovery tool
-
Wordlists
-
Usernames
-
Passwords
-
Discovery
-
-
Linux PrivEsc
- Linux PrivEsc - OSCP Methodology @ Conda
- How to use LinEnum - Each module explained @ Conda
- Fz3r0 Linux PrivEsc Ninjitsu My own logs & writeups about Linux PrivEsc
- Linux | Pergamino I
- Linux | Pergamino II - swisskyrepo
- Linux | Pergamino III - OSCP Guide
- Linux | Pergamino IV - Payatu
- Fz3r0 @ Linux PrivEsc
- Linux PrivEsc Workshop @ sagishahar
-
Windows PrivEsc
- Windows PrivEsc - OSCP Methodology @ Conda
- Fz3r0 Windows PrivEsc Ninjitsu(/Networking/Labs/) My own logs & writeups about Windows PrivEsc
- Juicy Potato Technique
- Pergamino I - Detailed Checklist for Windows PrivEsc & Scenarios
- Mimicatz Tutorial
- Windows PrivEsc Checker
-
Active Directory PrivEsc & Explotation (Windows Server)
- Active Directory Exploitation Cheat Sheet @ ReconShell
- Active Directory PrivEsc - OSCP Methodology @ Conda
- How to Setup a Virtual Windows Active Directory Domain
- Bloodhound > Attacking Active Directory
- AS-REP Roasting > Attacking Active Directory
- Kerberoasting > Attacking Active Directory
- GPP Credentials > Attacking Active Directory
- Windows Server | Pergamino I Detailed Checklist for Windows Server PrivEsc & Scenarios
- Active Directory Exploitation Cheat-Sheet @ Tib3rius
TryHackMe - Windows Server Basics Basic concepts and functionality provided by Active Directory.
- Buffer Overflow guide - Vuln Server, writeup by @ Fz3r0
- Buffer Overflow Lab - THM Brainstorm, writeup by @ Fz3r0
- Buffer Overflow guide - OSCP Peparation, writeup by @Fz3r0
- Buffer Overflow Lab - Gatekeeper, writeup by @ Fz3r0
-
OSINT Bibles
-
Meta OSINT The full list of 4,000+ OSINT resources
-
OSINT Tool Connection @ Cyber Detective Sifferent services, techniques, tricks and notes about OSINT and more
-
Nos vemos en tu próxima publicación - Reflexión de la Privacidad en Redes Sociales @ Victor Ruiz
-
OSINT Search Engines
-
Onion Search Engines
-
Onion Links
- Types of XSS @ OWASP
- Brute Logic - Brute XSS Bible Master the art of Cross Site Scripting.
- Laboratorio XSS en formulario sencillo
- XSS Práctica @ A. Caballero
- XSS & Beef Lab @ Chanchito Feliz
- XSS Attacks: Cross-site Scripting Exploits and Defense
- XSS Cheat Sheet
- SQL Injection and WAF Bypass @ CyberSecurityTV
- sql injection payload list
- NETSPI > SQL Injection Wiki
- PortSwigger > SQLi Cheat Sheet
- Pentest Book > SQLi queries
- https://github.com/Fz3r0/Advanced-SQL-Injection-Cheatsheet
- SQLinjection TimeBased PWN! @ Fz3r0 SQLi Time bases Python Script made by me!
- SQLMap Automatic SQL Injection And Database Takeover Tool
- jSQL Injection Java Tool For Automatic SQL Database Injection
- BBQSQL A Blind SQL-Injection Exploitation Tool
- NoSQLMap Automated NoSQL Database Pwnage
- Whitewidow SQL Vulnerability Scanner
- DSSS Damn Small SQLi Scanner
- explo Human And Machine Readable Web Vulnerability Testing Format
- Blind-Sql-Bitshifting Blind SQL-Injection via Bitshifting
- Leviathan Wide Range Mass Audit Toolkit
- Blisqy Exploit Time-based blind-SQL-injection in HTTP-Headers (MySQL/MariaDB)
-
Path Traversal
-
Local File Inclusion (LFI)
-
Remote File Inclusion (RFI)
-
Remediation & Defending against File Inclusion
- Direct Object References (IDOR)
Serpentium lingua et artes magicae obscurae
"Parseltongue was the language of serpents (as well as other magical serpentine creatures, like the Runespoor and Basilisk) and those who could converse with them. A wizard or witch who could speak Parseltongue was known as a Parselmouth.
The ability had an association with Dark Wizards. This association with the Dark Arts generally caused fear and distrust of those with the ability.
Python is the actual Parseltongue, an individial who can speak Python is known as a Pythonista, the myth says they can read peoples minds..."
I am the Black Wizards
Fz3r0 Cyber-Weaponry Crafting, Tools Programming & Open Source Projects
-
Software Development Models, DevOps & Shifting Left.
- Waterfall Model Legacy: A long time ago, in a galaxy far, far away...
- Manifesto for Agile Software Development
- DevOps Methodology
- DevSecOps Approach Development approach where security is introduced from the early stages of a development lifecycle until the final stages
- Secure SDLC 101 - Cicle and steps for secure developement
-
IDEs / Source Code Editors
-
Programming Resources
- Search Code Search 75 billion lines of code from 40 million projects
- Grep.app Search across a half million git repos
- Hacker Earth
-
Misc Tools
- Beautifier.io Beautify, unpack or deobfuscate JavaScript and HTML, make JSON/JSONP readable, etc.
-
Python Bibles from ancient Pythonistas
- Awesome Python A curated list of awesome Python frameworks, libraries, software and resources.
-
Python WriteUps & Guides
-
Python Projects & Scripts
-
Python Misc
- [C y Ensamblador desde 0: ¿Cómo se pinta un sprite? (CPU, RAM, programas, registros, funciones y +)](https://www.youtube.com/watch?v=D7fnvMPfmPQ)
-
Guides & Resources
-
Tools
- Git Bash - Git for Windows Bash shell in Windows!
-
Scripts
- Most Basic Bash Script in the World
- Pentesting > boot & Enum
- Pentesting > boot & Enum
-
HTML WriteUps & Guides
-
HTML Resources & Scripts
-
CSS WriteUps, Guides & Resources
- CSS CC - CC Mastery! Guide by Fz3r0 En español My CC writeup to master CSS (En español)
- W3 Schools - CSS Bible All necessary stuff for CSS scripting
- CSS Resources - CSS Bible
- Flexbox Froggy A game where you help Froggy and friends by writing CSS code!
-
CSS Codes, Scripts & Examples
-
Javascript WriteUps & Guides
-
Javascript Resources & Scripts
-
Node.js / Postman /
-
JavaScript Projects
- Digital Clock Using JS - Vanilla JS Clock @ DEE-CODER
- Diagrama Entidad-Relación (ER) easy! La explicación más básica y sencilla que he encontrado en español de ER
- Diagrama Entidad-Relación (ER) Deep Dive
- Cardinalidad Bases de Datos Tabla con las cardinalidades y sus símbolos
- Visual PAradigm Online Free Online Entity-Relation Diagram creator (no register, ready to go!)
- Lucid App Online Entity-Relation Diagram creator
- SQL Cheatsheet @ W3Schools
- SQL Table Syntax & Parts Detailed Diagram @ Fz3r0 Super important SQL Cheatsheet made by me!
- FULL SQL Course...and I mean FULL!!!
-
MySQL Installation, Cheatsheets & Guides
- MySQL CC by @ Fz3r0 My super CC Writeup!
- MySQL Super Important Cheatsheet!!! Install & Table Taxonomy @ Fz3r0
- MySQL GPL Community - Community Server & MySQL Workbench Download Select the complete version! (400mb)
- MySQL guía rápida
- Stored Procedure - La magia de los Procedimientos Almacenados
-
MySQL Workbench Labs
- NIST Special Publication 800-86 Guide to Integrating Forensic Techniques into Incident Response
- Guide to Computer Forensics and Investigations, 6th Edition
- Evidence Chain of Custody Tracking Form
- Cyber Kill Chain The Cyber Kill Chain was developed by Lockheed Martin to identify and prevent cyber intrusions.
- The Diamond Model of Intrusion Analysis
- NIST - Computer Security Incident Handling Guide NIST recommendations for incident response - Special Publication 800-61, revision 2
-
Blue Team Path Writeups & Courses
-
Blue Teaming Bibles
- ATT&CK (MITRE) Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
- D3fend (MITRE) A knowledge graph of Cyber-Security countermeasures.
- MISP Threat Sharing Software to facilitate threat analysis and sharing to freely usable structured Cyber Threat Information and Taxonomies.
-
Windows: Event Logs
- Microsoft Event Viewer Introduction
- How to use Event Viewer in Windows 10
- Microsoft - Event Logging Full Documentation
- Ultimate Windows Security
- Common Theats detected on Windows Event Logs
- EVTX-Attack Samples Scripting Security and Protection Advances
- Powershell - The Blue Team
- Tampering with Windows Event Tracing: Background, Offense, and Defense
-
Windows: wevtutil.exe
-
Windows: Get-WinEvent
-
SIEMs
-
SIEM - What is a SIEM? @ Varonis Security SIEM Introduction
-
Splunk Top SIEM (Security Information and Event Management) on market
-
Splunk: Sinkgle Subject Courses (Official)
-
Splunk Tutorial
-
Splunk Apps
-
Splunk Data
-
Splunk Queries
-
Sigma Rules
-
Uncoder.io Online Sigma translation engine for SIEM saved searches, filters, queries, API requests.
-
-
-
IBM QRadar Detect and eliminate threats faster with the industry’s leading XDR suite
-
LogRythm Good SIEM for smaller organizations
-
-
[The Digital Evidence Forensic Process - Collection>Media | Examination>Data | Analysis>Information | Reporting>Evidence ] ()
-
Evidence Collection Priority - From Volatile to Non- Volatile Data
-
Evidence Chain of Custody Chain of custody involves the collection, handling, and secure storage of evidence.
-
Perform a cyclic redundancy check using a checksum or hashing algorithm to ensure the integrity
-
Recolección de Evidencia Volátil - Usando Redline, FTK Imager & Forma Manual @ A. Caballero Preservar evidencia volátil la cual luego será utilizada en una investigación
-
Volatile Evidence Manual Collect - CMD | SysInternals | Nirsoft
-
Volatility > Analizar una Imágen RAM @ Master Alonso Caballero Extraer y analizar artefactos digitales desde la RAM
-
Volatility > Volatility Framework - Write Up @ Fz3r0 Gold standard for memory forensics in incident response
-
Tools for Obtaining a memory captures from machines
- FTK Imager Data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis.
- Redline Premier free endpoint security tool.
- DumpIt.exe
- win32dd.exe / win64dd.exe
- %SystemDrive%/hiberfil.sys
- Redline find signs of malicious activity through memory and file analysis
- Volatility
- HxD - HEX editor & Disk Editor HEX editor & raw disk editing and modifying of RAM
- VX-Underground (PASS: infected)The largest collection of malware source code, samples, and papers on the internet.
- The Zoo
- Malware Samples
- Malware Traffic Analysis PCAPs (PASS: infected) Almost every post on this site has pcap files or malware samples (or both).
- Malware Samples & Sources Malware Archives & Databases
- https://github.com/Fz3r0/CuteVirusCollection
- https://github.com/Fz3r0/MalwareDatabase
- https://github.com/Fz3r0/malwaredatabase-1
- https://github.com/Fz3r0/MalwareDatabase-2
- https://github.com/Fz3r0/reversed-malwares
- https://github.com/Fz3r0/MalwareScripts
The Strength Of The Human Heart. The Difference Between Us And Machines"
- YARA
- [Yara Full Documentation](https://yara.readthedocs.io/en/latest/)
- [YARA - Simple effective way dissecting malware](https://resources.infosecinstitute.com/topic/yara-simple-effective-way-dissecting-malware/)
-
CTF Tools
- HTB machines S4vitar Machine's Resolutions
- https://github.com/Fz3r0/rsatool
- https://github.com/Fz3r0/ctf-tools
- https://github.com/Fz3r0/katana
-
Bug Bounty - Bug Bounty Cheatsheet I
-
OSCP Related
-
[fz3r0 - CTFs]
- Wgel CTF THM
-
Breach Forums (after Raid Forums were raided by the feds lol)
-
InfoSec Streams Actively maintained list of Information Security-related Twitch streams
-
Programming, Scripting, Databases
-
IT & Computer Science
Honor a los seres humanos que han dejado huella en este hermoso mundo y han contribuido en la evolución de la raza humana...
- Women in computing
- Women in engineering
- List of Pioneers in Computer Science
- Aaron Hillel Swartz Creative Commons dev, Reddit co-founder, dev, Internet activist
- Alan Turing
- Alber Einstein
- Alexey Pajitnov Videogame Designer & Microsoft Engineer | Tetris
- Ada Lovelace
- Adrian Lamo the Homeless Hacker
- Alan Cooper - Visual Basic creator
- Anakata - Gottfrid Svartholm PirateBay
- arma - Roger Dingledine MiT scientist, Director & Research Director at Tor Project
- Barrett Brown Anonymous friend of friend...
- Bill Gates
- Bjarne Stroustrup Creator of C++ & Multi-awarded mathematican and computer scientist
- brokep - Peter Sunde Kolmisoppi PirateBay
- Charles Babbage - El padre de la computadora
- Charles Ranlett Flint IBM Founder
- c0mrade - Jonathan James Hacked the NASA for knowledge
- Dennis Ritchie
- Edward Snowden Technology consultor, NSA ex-employee & hacker
- Ed Logg Videogame designer | co-creating Asteroids, Centipede, Gauntlet
- Fyodor Vaskovich - Gordon Lyon NetSec expert, creator of Nmap, Honeynet Project & Vice President of CPSR
- Guido van Rossum
- Gus Rodriguez
- geohot, million75, mil, dream hax0r - George Hotz Hacker, Jailbreak for iOS & PS3
- Gordon Moore Robert Noyce() Intel co-founder | Moore Law
- H. D. Moore Metasploit creator, InfoSec researcher, programmer & hacker
- Katherine Johnson "Human Calculator" | calculations of orbital mechanics at NASA for takin' us to space...
- Larry Page
- Hideo Kojima TV Hideo
- Larry Wall Programmer & creator of Perl programming language
- George Antheil AMusician & Inventor | Frequency Hooping - WiFi inventor
- Grace Murray Hopper Computer scientist, mathematician, USA Navy rear admiral | COBOL grandma'
- Hedy Lamarr - Hedwig Eva Maria Kiesler Actress & Inventor | Frequency Hooping - WiFi inventor
- Jerry Sanders AMD
- James Gosling
- JJ Jose Juan García
- Joseph Carl Robnett Licklider
- John Atanasoff
- John Carmack
- John Romero
- John McCarthy
- John von Neumann
- Julian Assange Software programmer & Wikileaks founder
- Konrad Zuse
- Leonard Kleinrock
- Linus Torvalds
- Leonard Kleinrock ARPANET
- Luis Pascal
- Marie Curie Physics & Chemistry Scientist | Pioneering research on radioactivity
- nickm - Nick Mathewson Chief Network Architect & co-founder of Tor Project
- Robert Morris Scientist at Bell Labs & NSA
- Robert Morris Jr. The son of the leyend, became a hacker & professor at the MIT
- Ray Tomlinson
- Ricardo CPP
- Robert Kahn TCP/IP protocol
- Sabu - Hector Xavier Monsegur Informatics, Back Hat Hacker & LulzSec Founder
- Serguéi Brin
- Shigeru Miyamoto
- Steve Jobs -
- Steve Wozniak
- Stephen Hawking
- Solo - Gary McKinnon Hacked NASA in search for Aliens
- th3j35t3r Grey Hat Hacker: PWN anti-American, jihadist & homophobic websites
- TiAMO - Fredrik Neij PirateBay / Hacker
- Tim Berners-Lee
- Tomohiro Nishikado Programmer & Videogame Designer | Space Invaders
- Toru Iwatani Programmer & Videogame Designer | PacMan
- Vinton Cerf TCP/IP protocol
- Woz
https://www.v500.com/false-positive-false-negative-true-positive-and-true-negative/ true positive etc
https://osintframework.com/ osint framework
https://developer.cisco.com/docs/ APIs y demas sdwaun dna center
https://developer.cisco.com/docs/dna-center/#!cisco-dna-center-platform-overview dna overview
A nasty collection of sexy tools for Networking, Programming, Cyber-Security, Scripting & having fun all around with computers
- Microsoft Visio $$$
- draw.io Free!
- Excali Draw Free!
- [CPU-Z]
- [HW Monitor]
- WinDirStat Disk usage statistics viewer and cleanup tool for various versions of Microsoft Windows.
- advanced-archive-password-recovery-4-54-110.zip
- Password Monster Test: How Secure is Your Password?
- Dialupass - VPN Password Recovery enumerates dialup/VPN entries, displays logon details: User Name, Password, and Domain.
- WTF is my IP?!?!?! Get your fu$%&ng IP!
- Where goes? - URL redirect checker Show you the full redirection path of URLs, shortened links, or tiny URLs.
- Technitium MAC Address Changer for Windows A freeware utility to spoof MAC address instantly
- Cisco Packet Tracer Network simulation tool for networking, IoT, and cybersecurity in a virtual lab
- GNS3 Real-time network simulation for pre-deployment testing
- Eve NG Emulated Virtual Enviorment for Network, Security and DevOps
-
Secure-CRT Terminal Emulation, secure remote access, file transfer & data tunneling.
-
Putty Open Source SSH and telnet client
- Reverse Shell Generator
- NetCat
- SoCat
-
Type1 Hyper-Visors - BareMetal
-
Type2 Hyper-Visors - Operating System Hosted
- Containers 101
- What is a Container?
- ¿Qué son los contenedores, Docker y Kubernetes?
- Contenedores vs VM: ¿Cuál es la diferencia?
- Containers and VMs - A Practical Comparison
- Virtualize vs. Containerize (Which should I choose?)
- wifiphisher
- WiFi-Pumpkin
- eaphammer
- RogueSploit
- SniffAir
- fluxion
- wifite2
- airpwn-ng
- mitmAP
- hcxdumptool
- wifipumpkin3 Powerful framework for rogue access point attack.
https://github.com/danielmiessler/SecLists
https://github.com/berzerk0/Probable-Wordlists
https://github.com/govolution/betterdefaultpasslist
https://github.com/insidetrust/statistically-likely-usernames
https://github.com/LandGrey/pydictor
https://github.com/sc0tfree/mentalist
https://github.com/skahwah/wordsmith
https://github.com/1N3/IntruderPayloads
https://github.com/fuzzdb-project/fuzzdb
https://github.com/Bo0oM/fuzz.txt
https://github.com/laconicwolf/Password-Scripts
https://github.com/FlameOfIgnis/Pwdb-Public - A collection of all the data i could extract from 1 billion leaked credentials from internet.
https://github.com/Ciphey/Ciphey - Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back.
https://github.com/Coalfire-Research/npk - A mostly-serverless distributed hash cracking platform
https://github.com/JoelGMSec/Cloudtopolis - Cracking hashes in the Cloud (for free!)
https://github.com/f0cker/crackq - CrackQ: A Python Hashcat cracking queue system
Generar una BACKDOOR INDETECTABLE para el ANTIVIRUS | Reverse Shell
- Fix Kali Linux drivers for Alfa & Other adapters @ David Bombal
- How to install and use WiFi Pumpkin on Kali 2022
- Build a Pumpkin Pi — A Rogue AP & MitM Framework That Fits in Your Pocket @ NullByte
- WiFi PumpkinPi3 Wireless MiTM devices hardware build @ Brains933
- Rogue AP, DNS Spoofing Attack & Sniffing with Proxy @ Wifi Pumpkin
- Rogue AP - Cómo espiar tu red Wi-Fi con WiFi Pumpkin
- Captive Portal Attack
Un recuerdo que dejo
"¿Con qué he de irme?
¿Nada dejaré en pos de mi sobre la tierra?
¿Cómo ha de actuar mi corazón?
¿Acaso en vano venimos a vivir,
a brotar sobre la tierra?
Dejemos al menos flores
Dejemos al menos cantos"
Nezahualcoyotl
I have come to this great land to seek my very own sun.
Finally, I have found it, I have!.... Ahhh, it's over... My Sun... it's setting... it's dark, so dark...
....
...
..
.
- Hecho en México - by Fz3r0 💀
"I have delved deep into the abyss of the mind, attuned to the agonized cries and clamors for respite that lurk behind the veils, thereby discerning the selfsame sprout of obsession that blooms in cognition.
I am the wraith within the Machine, the ghost in the Shell, the darkness that embrace the Network, the Decipherer of ancient runes, the one who commands the air wave after wave, the Reversing of worlds and a Pythonista, the one who holds the knowledge of the dark arts of communing with serpentine creatures of magic.
In the mist of the night you may see me come, where shadows move and demons lie...
...I am Fz3r0 and the Sun no longer rises..."