Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation… a graphic representation of data abstracted from the banks of every computer in the human system.
Neuromancer – William Gibson
What follows is a writeup of the lab Footprinting Hard from the HackTheBox Academy. Given scenario. The third server is an MX and management server for the internal network. Subsequently, this server has the function of a backup server for the internal accounts in the domain. Accordingly, a user named HTB was also created here, whose credentials we…
What follows is a writeup of the lab Footprinting Medium from the HackTheBox Academy. Given scenario. This second server is a server that everyone on the internal network has access to. In our discussion with our client, we pointed out that these servers are often one of the main targets for attackers and that this server should…
What follows is a writeup of the lab Footprinting Easy from the HackTheBox Academy. Given scenario. We were commissioned by the company Inlanefreight Ltd to test three different servers in their internal network. The company uses many different services, and the IT security department felt that a penetration test was necessary to gain insight into their overall…
In this post I will explore how DNS can be abused to establish a C2 covert communication channel using sliver and how to hunt for it using two tools of mine: YAPSBT and Blue Notebooks. But before that, let’s have a quick overview about DNS. What is DNS and how does it work? DNS stands…
All right, here we are! Since this is the first post for my blog, I would like to share a WIP (Work In Progess) tool for packet sniffing.Hopefully, with time, it will become a useful tool for Incident Response and Threat Hunting. Components The tool is written in Python and is built on the awesome…