C2 Covert Channels
Today we’re exploring the world of obscure C2 channels, specifically DNS covert channels. Attackers know that DNS is widely used and trusted. Furthermore, because DNS is not intended for data transfer, many organisations don’t monitor their DNS traffic for malicious activity. As a result, a number of types of DNS-based attacks can be effective if launched against company networks. DNS tunnelling is one such attack.
Continue reading DNSCat2 Using Azure & GoDaddy
I had an old OnePlus 3T kicking around and was bored one day and wanted to test out NetHunter. I was delighted to find that there was an official build of Nethunter for the OnePlus 3T. What I didn’t anticipate was the hell I would be facing with this project.
Continue reading Installing Nethunter on OnePlus 3T – 2020
is information attached to a file that may not be visible on the face of the
document; documents may also contain supporting elements such as graphic
images, photographs, tables and charts, each of which can have its own
metadata. Metadata summarises basic
information about data, which can make finding and working with particular
instances of data easier. Having the ability to filter through that metadata
makes it much easier for someone to locate a specific document or other data
asset in a variety of different ways.
Continue reading Metadata & Hidden Information Within Documents [FOCA] (Repost)