Zoning Out: An Introduction to DNS Zone Transfers

Estimated difficulty:  πŸ’œπŸ’œπŸ€πŸ€πŸ€ DNS (Domain Name System) zone transfers are used to help replicate databases across different domain servers, allowing administrators to modify or edit records easily by implementing the changes on one server and copying the changes to the others. Zone transfers are completed using the AXFR protocol, and Continue Reading

What’s that coming over the hill? Is it a MOBster, is it a MOBster!?

Estimated difficulty: πŸ’œπŸ’œπŸ’œπŸ’œπŸ€ Welcome back to the MOBster series! The last post I published, covered the different aspects of an APK file – otherwise known as an app. This post I want to take some of these principles a step further and look at the possible effects of a misconfigured Continue Reading

They See Me Scannin’, They Hatin’: A Beginner’s Guide to Nmap

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ€πŸ€ Recon, Recon, Recon One of the most important phases of an attack, is the reconnaissance phase. Often abbreviated to recon, this phase usually consists of a variety of process and techniques to collect information about a target system. This phase may also be known as “Information Gathering” Continue Reading

Bop to the Top: A Linux Priv Esc. Checklist

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ’œπŸ€ Congratulations, you’ve got a foothold!Now what? Bop to the Top and get yourself some Root! The following blog will detail my own personal checklist that I run through when attempting to privilege escalate in a Linux environment. From my personal experience, it has a fairly good success Continue Reading