March 2026
Intermediate to advanced
400 pages
15h 45m
English
In addition to exploiting clients and infrastructures, cybercriminals can (and do) exploit network protocols and services. This is especially effective when network security protocols and services can be spoofed. In that scenario, the very foundation of an organization’s security is used against itself.
Remote Authentication Dial-In User Service (RADIUS) was invented in 1991—during the time of dial-up modems—the same year that HTTP was released and started the World Wide Web, and long before modern cryptographic methods were developed. RADIUS was adapted to IP networks utilizing the User Datagram Protocol (UDP) (Layer 4) protocol. UDP is a connectionless and best-effort transport that ...
Read now
Unlock full access