Tagged articles
8 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement?

This article explains the core logic of internal firewalls, outlines compliant bypass techniques for boundary, segmentation, and host firewalls, and then details step‑by‑step lateral movement methods—including credential reuse, tunneling, and legitimate tool abuse—while emphasizing safe, authorized testing practices.

Lateral Movementcredential reusefirewall bypass
0 likes · 33 min read
How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement?
Black & White Path
Black & White Path
Feb 18, 2026 · Information Security

How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement

This article explains the core logic of internal firewalls, outlines practical techniques for bypassing boundary, segmentation, and host firewalls—including legitimate‑port tunneling, rule‑configuration flaws, jump‑host exploitation, and tunneling methods—and then details step‑by‑step credential‑reuse and tool‑abuse strategies for stealthy lateral movement within a compromised network.

Lateral Movementcredential reusefirewall bypass
0 likes · 35 min read
How to Bypass Internal Firewalls and Achieve Lateral Privilege Movement
Efficient Ops
Efficient Ops
Sep 24, 2025 · Fundamentals

What Is a VLAN and How Do Routers, Switches, and Gateways Work?

This article explains VLAN concepts, using classroom analogies, then details single‑arm routing, layer‑3 switches, gateways, DNS, MAC addresses, and subnet masks, illustrating how network segmentation improves efficiency and how devices communicate across different broadcast domains.

DNSLayer 3 SwitchMAC address
0 likes · 13 min read
What Is a VLAN and How Do Routers, Switches, and Gateways Work?
Architects Research Society
Architects Research Society
Jan 28, 2022 · Information Security

Purdue Model and Best Practices for Secure Industrial Control System (ICS) Architecture

This article explains the Purdue Enterprise Reference Architecture (PERA), compares it with other reference models, and outlines best‑practice guidelines for segmenting and protecting industrial control system networks, while reviewing related standards, frameworks, and practical security recommendations.

ICSPurdue Modelcybersecurity
0 likes · 25 min read
Purdue Model and Best Practices for Secure Industrial Control System (ICS) Architecture
Open Source Linux
Open Source Linux
Dec 21, 2021 · Fundamentals

Why VLANs Matter: Unlocking Network Efficiency and Security

This article explains VLAN fundamentals, why they are needed, how they differ from subnets, the role of VLAN tags and IDs, various interface types, practical deployment scenarios, related protocols, and the challenges VLANs face in modern cloud environments.

Layer 2NetworkingVLAN
0 likes · 12 min read
Why VLANs Matter: Unlocking Network Efficiency and Security
dbaplus Community
dbaplus Community
Aug 9, 2017 · Information Security

Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery

This guide outlines practical steps for constructing a secure enterprise operations platform, covering network zone segmentation, selection and deployment of firewalls, IPS/IDS/WAF, endpoint management, web traffic control, monitoring, disaster‑recovery procedures, and incident response best practices to protect corporate data and systems.

IDSIPSWAF
0 likes · 14 min read
Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery