Here are some blogs and podcast I follow. I highly recommend them …
Recently a friend ask me how does he knows if his mail server is vulnerable to impersonation or relay attacks. (SPAM, Phishing, etc)
First we have to think why these attacks happen. For one thing there is no authentication/authorization on the SMTP connections between servers and mostly misconfiguration. Sometime we think we did all there is to do when configuring our serves an sometime we trust what vendors say (are we suppose to?), but that the way to tragedy in security.
Continue reading Testing your mail server for impersonation or relay attacks.
I was just thinking if I was doing recon with a Windows machine and had a limitation of just using built-in tools, how would I do DNS interrogation?
Continue reading Finding what you need with nslookup
Just started my Blog again I hope I can bring interesting IT stuff to all of you in the future.
I might post in English or Spanish, depends how I feel that day. So, swicthing to spanish:
Estare tratando de publicar articulos interesantes u opiniones de cosas que esten pasando en el ambiente de TI asi que hasta pronto.