Logo
RSS Feed

⚔️ Attacks DB

📚 Technical Reference

Network Topology

It’s a geometric arrangment of hosts and network devices. Can be physical (cables and PCs’ layout) or logical (informaiton transmission methods).

Bus

To avoid latency, 5 PC max. Thin 10BASE2 (black) or thick 10BASE5 (yellow). 1 failes - all fail.

img

This is how it looks like on a diagram.

bus

Hub

Options: UTP 10BASET (blue).

Low cost. 1 fails - net still on.

img

And this is a diagram so dear.

⛔️ Access Controls

DAC

I am the leader! I’m the one that says when we go.

img

A user, who’s the owner of the file or another object defines who can and who cannot view it. It’s not safe, but it is easier to implement.

MAC

ChatGPT dump and

A. Discretionary Access Control (DAC):

Discretionary Access Control is an access control model where the owner of a resource has full control over granting or restricting access permissions to that resource. In DAC, the owner can decide who can access the resource and what actions they can perform on it (e.g., read, write, or execute).

Gaining Initial Access

📚 Network Anonymity Techniques

Evasion techniques and what possible forensic footprints they are likely to leave?

VPN

Virtual private network. As an additional bonus - avoid bandwidth throttling (when ISP cuts your speed or bandwidth for certain resources like torrents). Also useful on public networks. VPN is like your representative in the Internet or your avatar.

Below are the two examples of using the Internet without a VPN or any other anonymising tool. The first connection (🥕 marked), is just a simple plaintext HTTP connection. The rest (🥒 and 🌽) show a very simplified HTTPS connection. Basically, ISP 🍋 won’t see the contents of the message with the SSL/TLS (HTTPS) in use, as well as a MiM, of course (both those that are within 👀🫐 and outside 👀🍆 your network).

Binary Attacks

Recent Activity

Application Attacks

Pipes

A named pipe is not exactly the same as a reverse shell, but it can be used in a similar way to establish a remote connection between two systems. A named pipe is a type of inter-process communication (IPC) mechanism that allows two or more processes to communicate with each other on a local computer or over a network. A named pipe has a name and is implemented as a file object. Processes can read from and write to the named pipe as if it were a regular file. Named pipes are commonly used in client-server applications, where a server process creates a named pipe and waits for client processes to connect to it. Once a client connects to the named pipe, the server can send and receive data to and from the client. ChatGPT

Persistence and Escalation Mechanisms

DoS Attacks and Mitigations

In this article, I will cover the main DoS techniques and how they look in the logs. I will also cover some main mitigation techniques.