IT | Dec 9, 2017 | Master3395
DNS servers are an attractive target for attackers and penetration testers. They regularly include data that is considered highly important to attackers.
DNS is a core element of both our local networks and the Internet. Among other things, DNS is responsible for the process of translating domain names to IP addresses. For humans, it is much simpler for them to remember “google.com” rather than https://184.108.40.206. But, machines prefer the reverse. DNS serves as the middleman to make this translation process.
As penetration testers, it is necessary to concentrate on the DNS servers that belong to our target. The reason is simple. In order for DNS to function correctly, it needs to be aware of both the IP address and the corresponding domain name of each machine on its network.
In terms of reconnaissance, obtaining full access to an organization’s DNS server is like finding a pot of gold at the end of a rainbow. Or perhaps, more correctly, it is like finding a blueprint for the organization. But in this example, the blueprint includes a complete listing of private IP addresses that belong to our target. Remember one of the key components of data gathering is to collect IP addresses that belong to the target.
Keywords: dns, extract, information
Jan 17, 2019 | Category: Microsoft | Comments
Microsoft will stop free support by 2020.
It has been known for a long time that the official support for Windows 7 is nearing the end. January 14, 2020, is the date, then Microsoft will no longer provide free support to users of this OS and security updates will stop. You will still be able to use Windows 7, but in many ways, you will be left to yourself, at your own risk.read more…