Network Basics for Hackers, Part 5: Simple Mail Transport Protocol (SMTP)

Welcome back, my aspiring cyberwarriors! In this series, Network Basics for Hackers, we explore the structure, operation and vulnerabilities of the major network protocols. In this way, the aspiring hacker/pentester/cyberwarrior will hopefully gain insight into not only it’s operation but also its vulnerabilities. In this segment of this series, we will examine the Simple Mail […]

Continue Reading

Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks

Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round. Without it, we would need to remember innumerable IP addresses just to navigate to our favorite web sites. Imagine trying to remember the IPv4 (32-bit) addresses of Facebook, Amazon and Hackers-Arise, […]

Continue Reading

Network Basics for Hackers, Part 5: Simple Mail Transport Protocol (SMTP)

Welcome back, my aspiring cyberwarriors! In this series, Network Basics for Hackers, we explore the structure, operation and vulnerabilities of the major network protocols. In this way, the aspiring hacker/pentester/cyberwarrior will hopefully gain insight into not only it’s operation but also its vulnerabilities. In this segment of this series, we will examine the Simple Mail […]

Continue Reading

Network Basics for Hackers: Simple Network Management Protocol (SNMP) Theory, Reconnaissance and Exp

Welcome back my aspiring cyber warriors! The Simple Network Management Protocol or SNMP is among the least understood protocols, yet so vitally important to the successful operation of your network. If an attacker can breach the SNMP, they may be able to unmask your encrypted VPN communication (see NSA’s ExtraBacon exploit here) as well as […]

Continue Reading