Skip to main content

Posts

Strip down a Website example, a.k.a. Reverse Engineering skill UNLOCKED

 🧠 How a Website Really Works — Broken Down Simply When you open a website like www.example.com , a lot goes on under the hood — but let’s strip it down to the core parts so you see exactly how it runs from top to bottom. 📍 Step 1: You Type a Website into Your Browser When you type a URL (like https://frizasecurity.com ) into your browser and hit Enter, the first thing that happens is: ✅ The browser needs to find the website's IP address. Think of the domain name (like frizasecurity.com ) as a contact name in your phone, and the IP address as the phone number. Your browser asks a DNS server (Domain Name System) to find the number behind that name. You type the name → Browser says: “What’s the IP address for this?” DNS responds: “Here it is: 123.456.789.10 .” 💡 DNS = like the internet’s phone book. 🔄 Step 2: Your Device Talks to the Server Now that your browser knows the IP address, it sends a request to the web server that hosts the site. Think of the...
Recent posts

The entire journey: https://panel.exampleapp.net

🧠 Step 0: Human Intent You type: https://panel.exampleapp.net That’s a human-readable name — it needs to be translated to numbers (an IP address) to go anywhere. 📡 Step 1: The “Radio Ping” – Network Stack Fires Up Your device doesn’t yet know where this domain lives. So it checks: 🔍 Is this in my local cache? ❌ Nope? Ask the next source. Your OS builds a DNS query → wraps it in a UDP packet → and sends it via your network interface card (NIC) out into your default gateway . This is like sending a radio signal from your laptop to your ISP’s first router, asking: "Hey, where is panel.exampleapp.net ?" 🌐 Step 2: Recursive Resolver – “The Station Directory Booth” Your request reaches your ISP’s DNS resolver . This resolver is a smart guide that builds the path from scratch if needed: 🧭 It checks if it has the answer cached. ❌ If not, it starts walking the root DNS chain : Ask the root server : "Where are the .net nameservers?" ...

DNS: When One Name Goes Many Ways

Imagine visiting a secure control panel for a cloud-based dashboard — let’s call it panel.exampleapp.net . You expect one clear path, but a DNS query reveals something unexpected: a variety of IP addresses, spanning different number spaces and even protocol types (IPv4 and IPv6). Here's a simplified look: panel.exampleapp.net → 0.1.2.35 panel.exampleapp.net → 1.2.3.35 panel.exampleapp.net → 172.2.0.114 panel.exampleapp.net → 2606:4700:20::681d:523 panel.exampleapp.net → 2606:4700:20::ad43:4672 At first glance, this might raise questions: Why is a single name resolving to different networks — even different types of addresses? 🌍 A Global Dispatch System, Not a Single Gate Think of panel.exampleapp.net not as a door to a single building, but as a radio frequency broadcasted across a secure network of towers worldwide. When your system tunes in (makes a DNS request), it doesn’t get one frequency. Instead, it receives a list of optimal towers — nearby, unjammed, and onl...

What Makes A Server?

In cybersecurity, web development, or ethical hacking, it’s essential to understand what a server actually is — without confusing the concept with interfaces, tools, or websites when servers may be used often in those scenarios, touching exploitable, vulnerable surfaces (just need to identify and follow the CSF [Cybersecurity Framework]). So with the help of ChatGPT , writing this article, saving more time, and explaining intuitively ( <--Search up that word, you're going to need it), this guide cuts through the noise and explains, in plain terms, what makes a server — using simulated examples. 🔧 What Makes a Server? A server is defined by its behavior , not its brand, location, or language. If a system does these below, it is acting as a server: Listens for incoming network requests (like on port 80, 443, or 22) Processes those requests based on logic or rules Responds with content, status, or data Handles multiple clients without direct user initiation...

Mental Post: 1 #NTS

  A list of frameworks provided by Thinkful #ACheggService as I was looking over some publicly documented notes for #cybersecurity in planning your assessment(s) especially for ethical hacking. Please comment below (hopefully, without any malware) for other known or unknown frameworks. So depending on your stable grounds on utilizing tools, collecting data (really just being a stalker (more obsessively in CyberSECURITY)), retaining problems, and then responding, with our focus to launch in care and for the better of an organization, here are some frameworks. 1) MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework, or knowledge base that categorizes real-world adversary behaviors. Click for IBM link -> https://lnkd.in/g2MXRxwY 2) OWASP (Open Web Application Security Project) Framework, or Website penetration testing methodology. 3) NIST (National Institute of Standard and Technology) CSF (Cybersecurity Framework), educated by the US department age...

Understanding DNS and Nameservers: A Complete Guide

The Domain Name System (DNS) is the silent backbone of the internet. It transforms human-friendly domain names into machine-readable IP addresses, allowing users to access websites, send emails, and more without having to memorize numerical addresses. In this article, we break down the components of DNS, how they interact, and why nameservers play such a crucial role. 1. DNS (Domain Name System) DNS, or Domain Name System, works like an internet phonebook. When a user types a domain name like example.com into a browser, DNS translates it into an IP address like 192.0.2.1 , which computers use to locate and connect to each other. 2. Name Server A nameserver is a specialized server that holds the DNS records for a domain. It responds to DNS queries by providing the necessary information to route traffic correctly. For example, if you own friza.net , you might use Cloudflare's nameservers like: abby.ns.cloudflare.com matt.ns.cloudflare.com These servers hold all records...

Modern Websites And Business

In today’s economy, a website isn’t just a digital brochure—it’s the core operational hub of a business. It sells products, handles transactions, processes identities, and often stores customer trust in the form of data. But just like a gleaming flagship store or corporate headquarters, a website must do more than attract visitors—it must protect its assets, enforce policies, and stand resilient under attack. The difference between a secure and vulnerable site isn’t just technical—it’s strategic. Security must be treated as an operational imperative and designed into the website’s foundation with the same attention a Fortune 500 CEO gives to financial controls, supply chains, and brand reputation.  1. Authentication: Gatekeeping the Front Lobby In a physical business, not everyone can walk into executive offices without clearance. Similarly, a website’s authentication system acts as a digital gatekeeper , validating the identity of users, vendors, and staff. Encrypted protocols ...

Conditions or really, the Access Control List: Firewall

More references for more information below: Title Link What Is a Firewall? Cloudflare Access Control Lists (ACLs) Cisco Firewall vs ACL Explained GeeksForGeeks Dynamic ACLs & Firewalls Microsoft Azure Docs Firewall Penetration Testing Offensive Security 🔐 Firewalls and ACLs: The Digital Bouncer Guarding the Network Party In the world of cybersecurity and network infrastructure, firewalls are often the  first line of defense  — but at their core, a firewall is simply an  automated Access Control List (ACL) . To understand how they function, imagine a  VIP party , where only  invited guests  are allowed past the velvet rope. 🎉 The Party Analogy: ACL as the Guest List A  firewall  acts like a  professional bouncer  standing at the door of a high-profile event. But this bouncer doesn't work alone — they use a  guest list  (the ACL) to check who’s allowed in. Like if you're white and you where sunglasses with none dark circles...