IP Spoofing Attack Types

I’ll explain some common IP spoofing attacks using stories and examples that are easy to understand. 1. Man-in-the-Middle (MitM) Attack Imagine you’re passing notes to your friend in class, but the class bully intercepts them and pretends to be both you and your friend. Story: Sarah and Tom were chatting online about planning a surprise party…

Vue Js Music Player App

Here a small vue app to play music online, the list is manuelly arranged. TO DO for this app can be creating a search bar and making the music list dynamic. View the end product : LInk : https://thirsty-meitner-361acf.netlify.app/ GitHub : https://github.com/altasismail/Mars-Attack_MusicPlayer To download the project : https://github.com/altasismail/Mars-Attack_MusicPlayer.git Live App view :

Wireshark and tcpdump

Wireshark and tcpdump are powerful tools used for network analysis and troubleshooting. To understand it better and visualise these tools, let’s dive into the details of Wireshark and compare it with tcpdump through a relatable story. The Tale of Two Network Detectives Imagine two detectives, Wanda (Wireshark) and Tom (tcpdump), who specialize in solving network…