Techie Talks
-
Web Hacking
FIERCE: WHAT TO DO WHEN ZONE TRANSFERS FAIL
Zone Transfers Fail: As we have previously discussed, most administrators are savvy enough to prevent random people from completing an…
Read More » -
Web Hacking
Extracting Information From DNS
Extracting Information from DNS: DNS servers are an excellent target for hackers and penetration testers. They usually contain information that…
Read More » -
Web Hacking
Brief Guide on HOST
Host: Oftentimes, our reconnaissance efforts will result in host names rather than IP address. When this occurs, we can use…
Read More » -
Web Hacking
The Basics of Web Hacking: Our Approach
Basics of Web Hacking: Our approach is made up of four phases that cover all the necessary tasks during an…
Read More » -
Web Hacking
Noteworthy HTTP Headers
Noteworthy HTTP Headers: Each HTTP cycle also includes headers in both the client request and the server response that transmit…
Read More » -
Security+
Noteworthy HTTP Status Codes
HTTP Status Codes: As web server responses are received by your browser, they will include a status code to signal…
Read More » -
Security+
The Early Days of Hacking
The Early Days of Hacking: The idea of hacking and hackers goes way back to the first technologies enthusiastic that…
Read More » -
Black Hat
Bluetooth Threats
Bluetooth Threats: Much like Wi-Fi, Bluetooth has a bevy of threats facing it that you must take into account. Bluetooth…
Read More » -
Black Hat
Hacking Bluetooth
Hacking Bluetooth: Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth…
Read More » -
Black Hat
Working with Email
Working with Email: Email is one of the tools that a business relies on today to get its mission done.…
Read More »