Recently I went to the Computer Sciences Department of the University of PR – Rio Piedras Campus and had a great time with the students talking about pivoting networks. I decided to share it with you … hope you enjoy it.
Recently I presented at an ISSA meeting and some people wanted to know about my setup. Well; here it is:
Recently a friend ask me how does he knows if his mail server is vulnerable to impersonation or relay attacks. (SPAM, Phishing, etc) First we have to think why these attacks happen. For one thing there is no authentication/authorization on the SMTP connections between servers and mostly misconfiguration. Sometime we …
Hello all, I was just thinking if I was doing recon with a Windows machine and had a limitation of just using built-in tools, how would I do DNS interrogation?