Network Attack

SMB – 139, 445 – TCP

SMB is a client-server communication protocol used for sharing resources on a network.  Server Message Block (SMB) allows clients to read from and write to a server service, providing core authentication and communications for Windows file and print servers. It was (and is) so popular that *nix operating systems created their own compatible Samba service […]

Active Reconnaissance

Web Mapping

Google dork your targetsite: google.com Also go to the site and click View CertificateGo to DetailsLook for data like subdomains The tool nmap can also be used to search for vulnerabilities Run sublist3r on your target Execute subbrute on your target Enumerate subdomains Run traceroute Execute a dig on your target Check DNS with dnsenum […]

Network Scan & Map

Nmap

https://github.com/nmap/nmap Nmap, or network mapper, is the most widely used network scanner. It has been ported to most platforms, and is the underlying scan tool in a number of commercial and open source vulnerability testing products. It can incorporate scripts and has speed and performance settings for intrusion detection system (IDS) evasion. You can use […]

OSINT

Open-Source Intelligence

Data is money and it is everywhere Open source intelligence (OSINT) is actionable information that has been gathered from freely and publicly available sources. The type of information that can be considered OSINT is not something that an organization or other entity can reasonably expect to keep private. Anyone, regardless of affiliation or authorization, can […]