79/tcp finger – Enumeration

Finger is primarily used to enumerate user information on the target system. It can also find out detailed information (if exists) such as full name, email address, phone number etc. of all its users. Nmap result finger-user-enum finger-user-enum is a script used to enumerate users https://github.com/pentestmonkey/finger-user-enum Username guessing tool primarily Read more…

Linux Interesting Files

Here you have a list of Linux Interesting files. They can be used to extract sensitive information leading to further exploitation. It is always important to read the Administrator Guide of any application and appli the best security practices to configiguration file. Any misconfiguration is a potential vector of attack. Read more…

Windows Interesting Files

Here you have a list of Windows Interesting files. They can be used to extract sensitive information leading to further exploitation. It is always important to read the Administrator Guide of any application and appli the best security practices to configiguration file. Any misconfiguration is a potential vector of attack. Read more…

53/tcp DNS – Enumeration

DNS is a naming system for computers that converts human readable domain names e.g. (infosecinstitute.com) into computer readable IP-addresses. However, some security vulnerabilities exist due to misconfigured DNS name servers that can lead to information disclosure about the domain. This forms an important step of the Information Gathering stage during Read more…