Exploitation Risks and Considerations specific to running internal DNS servers

I have heard of larger companies are utilizing their own internal DNS servers to route through internal resources. And was wondering if there is any specific exploitation risks and considerations for these, especially related to loss of av… Continue reading Exploitation Risks and Considerations specific to running internal DNS servers

Is Reading Windows Reserved Filenames Through a URL Valid for OS Enumeration?

I’m aware that writing a file with a reserved name such as CON.txt or CON.mp3, aux.txt, lpt1.html, etc. is not allowed by Windows and can be leveraged for enumeration.
However, what about reading a file with a reserved name?
For example, i… Continue reading Is Reading Windows Reserved Filenames Through a URL Valid for OS Enumeration?

What does a probe packet look like and how does it interact with a server to determine services [closed]

I have recently begun studying NMap. It offers a variety of options, each having clear advantages and disadvantages as to what information is disclosed and chance of being detected by possible layers of defense.
One of the options seems ra… Continue reading What does a probe packet look like and how does it interact with a server to determine services [closed]

Is it possible to prevent Kerbrute from unauthenticated user enumation Active Directory?

Currently looking for a way to prevent unauthenticated user enumeration on a Domain Controller. This is a security precaution I’d like to implement, next to the existing measures taken prevent unauthorized DC access.
Kerbrute states the fo… Continue reading Is it possible to prevent Kerbrute from unauthenticated user enumation Active Directory?