March, 2018

  • 8 March

    Extracting Information From DNS

    Extracting Information From DNS

    Extracting Information from DNS: DNS servers are an excellent target for hackers and penetration testers. They usually contain information that is considered highly valuable to attackers. DNS is a core component of both our local networks and the Internet. Among other things, DNS is responsible for the process of translating …

  • 7 March

    Brief Guide on HOST

    Brief Guide on HOST

    Host: Oftentimes, our reconnaissance efforts will result in host names rather than IP address. When this occurs, we can use the “host” tool to perform a translation for us. The host tool is built into most Linux systems including Kali. We can access it by opening a terminal and typing: …

  • 6 March

    The Basics of Web Hacking: Our Approach

    The Basics of Web Hacking: Our Approach

    Basics of Web Hacking: Our approach is made up of four phases that cover all the necessary tasks during an attack. Reconnaissance Scanning Exploitation Fix It’s appropriate to introduce and discuss how these vulnerabilities and attacks can be mitigated, thus there is a fix phase to our approach. As a …

  • 5 March

    Noteworthy HTTP Headers

    Noteworthy HTTP Headers

    Noteworthy HTTP Headers: Each HTTP cycle also includes headers in both the client request and the server response that transmit details about the request or response. There are several of these headers, but we are only concerned with a few that are most applicable to our approach covered in this …

  • 4 March

    Noteworthy HTTP Status Codes

    Noteworthy HTTP Status Codes

    HTTP Status Codes: As web server responses are received by your browser, they will include a status code to signal what type of response it is. There are over 50 numerical HTTP responses codes grouped into five families that provide similar type of status codes. Knowing what each type of …

  • 3 March

    The Early Days of Hacking

    The Early Days of Hacking

    The Early Days of Hacking: The idea of hacking and hackers goes way back to the first technologies enthusiastic that wanted to learn about new technology and were curious about how it worked. They were the same types of people who today are interested not only in acquiring all sorts …

  • 2 March

    Bluetooth Threats

    Bluetooth Threats

    Bluetooth Threats: Much like Wi-Fi, Bluetooth has a bevy of threats facing it that you must take into account. Bluetooth suffers from many shortcomings that have been slowly addressed with each successive version, but many flaws remain and can be exploited. The technology has already seen many attacks take their …

  • 1 March

    Hacking Bluetooth

    Hacking Bluetooth

    Hacking Bluetooth: Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly used to connect devices such as headsets, media players, and other types of technologies. Bluetooth operates in the 2.4 GHz frequency range and …

February, 2018

  • 28 February

    Working with Email

    Working with Email

    Working with Email: Email is one of the tools that a business relies on today to get its mission done. Without email many businesses would have serious trouble functioning in anything approaching a normal manner. The contents of email are staggering and can be extremely valuable to an attacker looking …

  • 27 February

    The Value of Job Sites

    The Value of Job Sites

    The Value of Job Sites: An oft-overlooked but valuable method of gathering information about a target is through job sites and job postings. If you have every looked at a job posting, as many of us have, you will notice that they can take a lot of forms, but something …