Taylor Jolin

Hacker | Musician | Innovator | Dreamer

Month: February 2024

25Feb

New Born A Ghost Song Released

We have been hard at work on the follow up to Stairway To An Empty Room. Unfortunately, I had COVID19 for awhile and was unable to complete the vocal tracks in time. So I am taking my time with this one and relearning how to sing and scream. In the mean time we have released the new albums name, Loose Ends. Additionally we have released the upcoming album artwork and a new track called Dirge.

23Feb

Pentesting Methodology – Host & Asset Discovery

Please note before reading… this is my personal way of doing things and again; like the last post, this is more of a brain dump for those interested. Anyways…

Once inside the target, you will want to conduct host or asset discovery. This process should be pretty self explanatory. It can take a while so be patient. If you are doing an on-site pentest, time is not on your side. If you are doing a remote pentest, again… be patient.

With that, there are two types of asset discovery tests that can be ran, an internal or external test. An internal test would look for hosts on the internal network whereas an external test would look for assets on the perimeter of the network. One of the tricks that can be used for this is port scanning and ping sweeps.

With the right port scanning tool, you can learn all sorts of information about the network and about host devices. I prefer to use NMAP but there are a wealth of others. You can even call NMAP from Metasploit and run it. Once we have a target thoroughly mapped out and we have found all of the information we can, we can then move on to looking for vulnerabilities or known exploits.

In the event that you find multiple hosts on the network, try to do an OS discovery to see what is what and if it may be of any interest later on. One could usually assume that Linux, Mac, and Windows servers have some sort of misconfiguration somewhere. This goes the same for networking appliances such as firewalls, switches, routers, etc…

15Feb

Pentesting Methodology – Recon

This is probably my favorite part of a pentest. Doing the physical recon. As a U.S. Army Combat Veteran, I have learned a lot about physical reconnaissance and how to apply it outside of the battle field.

When doing physical recon, you should look for physical ways to penetrate the target. Look for ways to get in to the building, the network closets, the network/server racks, etc… Try a door, if it’s unlocked that’s one step closer to the end goal.

Another thing I like to do, since I have a background in networking, is carry a RS232 console cable and if I am able to get entry into an IDF/MDF, I will plug into the closest switch or router to the door and see if the engineer left the console logged in. If so I can do a ton of different things.

When you do conduct physical recon, and enter a target… make DAMN sure that you have a way out and a Get Out of Jail Free Card… or your Letter of Authorization.