domain

domain

Gerard, a did gruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attack and bring down its reputation in the market . To launch the attack process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attack. What is the tool employed by Gerard in the above scenario?

Gerard, a did gruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attack and bring down its reputation in the market . To launch the attack process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network …

Gerard, a did gruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attack and bring down its reputation in the market . To launch the attack process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attack. What is the tool employed by Gerard in the above scenario? Read More »

Google

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use?

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use? Option 1 : inurl Option 2 : site Option 3 : ext Option 4 : filetype 1. inurl Find pages with a certain word (or words) in the url. For this example, any results containing the word “apple” …

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use? Read More »

DDOS attack

A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete. Which attack is being described here?

A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete. Which attack is being described here? Option 1 : Slowloris attack Option 2 : Session splicing Option 3 : Phlashing Option 4 : Desynchronization 1. Slowloris attack Developed by Robert “RSnake” Hansen, …

A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete. Which attack is being described here? Read More »

Understand-IP-Address-Locating-Tools

Understand IP Address Locating Tools

Understand IP Address Locating Tools in this article explain types of tools which using for ip address location in forensic investigation. and also explain WHOIS lookup tools. 1. SmartWhois SmartWhois may be a network information utility that permits you to seem up all the available information about an IP address, hostname or domain, name of the network provider, administrator and technical support contact information. It supports Internationalized Domain Names (IDNs) and also fully supports IPv6 …

Understand IP Address Locating Tools Read More »

ISO-27001-Annex-A.13-Communications-Security

ISO 27001 Annex : A.13 Communications Security

ISO 27001 Annex : A.13 Communications Security in this article explain A.13.1  Network Security Management, A.13.1.1  Network Controls, A.13.1.2  Security of Network Services, A.13.1.3  Segregation in Networks. A.13.1  Network Security Management It’s objective is to ensure the security and supporting information processing facilities of the information in a network. A.13.1.1  Network Controls Control- To protect information in systems and applications, networks should be managed and monitored. Implementation Guidance – The monitoring of network information security …

ISO 27001 Annex : A.13 Communications Security Read More »

What-is-Pyramid-of-Pain-?-&-It’s-types

What is Pyramid of Pain ? & It’s types

Pyramid of Pain & It’s types is all loCs are not created with the same value as some hold much more importance in comparison to other loCs. Pyramid of pain represents the types of indicators that the analyst must look out to detect the activities of an adversary as well as the amount of pain that the adversary needs to adapt to pivot and continue with the attack even when the indicators at each level …

What is Pyramid of Pain ? & It’s types Read More »

Top-DNS-Interrogation-Tools

Top DNS Interrogation Tools

The DNS lookup tools retrieve the DNS records for a specific domain or host name. These too s retrieve data like domains and IP addresses, domain Whois records, DNS records, and network Whois record. Professional Toolset Professional Toolset assists IT professionals with troubleshooting, managing, and configuring the domain and email. Professional Toolset includes Domain/WWW tools, IP tools, Networking tools, and Email tools that assist with:• DNS troubleshooting, management and watching• Network administration and troubleshooting• Email …

Top DNS Interrogation Tools Read More »