EU could shut misbehaving tech firms out of single market

According to the Financial Times, the European Commission is due to propose a new set of rules known as the Digital Services Act, which will seek to hold tech companies to higher standards. Under extreme circumstances, offending companies could be excluded from the EU.  In an interview with The Financial Times, Thierry Breton, the EU commissioner for international … Read more

The UK Government is prone to IT disasters. Here’s what it should do

Months ago, when the UK was in the midst of a nationwide lockdown brought on by the outbreak of Covid-19, Health Secretary Matt Hancock announced the release of an NHSX contact-tracing app that would be at the heart of the Government’s strategy to ease restrictions. Although the app was touted for a mid-May release, after … Read more

Facebook in legal battle over ban on transatlantic data transfer

Facebook is fighting demands from European data regulators to stop transferring user data from the EU to US servers. In a lawsuit filed in Dublin, the company warned that it would not be able to provide services to EU users if forced to comply with the order.  Earlier this month, the Wall Street Journal reported that Ireland’s … Read more

SMTP Enumeration

Gathering information from a target is through the use of SMTP. This protocol is designed to send messages between servers that send and receive e-mail. SMTP is the standard used by the majority of e-mail servers and clients today. So how is this protocol used to gather information from a server? The process is quite … Read more

Enumeration Using NTP

Another effective way to gather information about a network and the resources on it is through use of the Network Time Protocol (NTP). Before you look at how to exploit this protocol for information-gathering purposes, you need to understand what the protocol does and what purpose it serves. NTP is a protocol used to synchronize … Read more

Unix and Linux Enumeration

Linux and Unix systems are no different from Windows systems and can be enumerated as well. The difference lies in the tools and the approach. In this section you will take a look at a handful of the tools that have proven useful in exploring these systems. finger The finger command is designed to return … Read more

Enumeration with SNMP

Another useful mechanism for enumerating a target system is the Simple Network Manage- ment Protocol (SNMP). This protocol is used to assist in the management of devices such as routers, hubs, and switches, among others. SNMP comes in three versions: SNMPv1 This version of the protocol was introduced as a standardized mechanism for managing network … Read more

Windows Basics

The Microsoft Windows operating system is designed to be used as either a stand-alone or a networked environment; however, for this discussion you will assume a networked setup only. In the Windows world, securing access to resources, objects, and other components is handled through many mechanisms, but there are some things that are common to … Read more

What Is Enumeration?

Enumeration is the process of extracting information from a target system in an organized and methodical manner. During enumeration you should be able to extract information such as usernames, machine names, shares, and services from a system as well as other information depending on the operating environment. Unlike with previous phases, you are initiating active … Read more