Skip to content

Hacking Lethani

  • Blog
  • Highlighted
  • About
  • Contact

Infraestructure Hacking

Infrastructure Hacking: IRC Protocol

May 15, 2021May 15, 2021 by Lethani
Infrastructure Hacking: IRC Protocol

Today we are going to talk about one of the great protocols of the past: Internet Relay Chat, the prototype for instant messaging. Although those of you of a certain age will be familiar with this protocol, I didn’t use it until I had to make my own IRC server for an exercise at university, … Read more

Categories Infraestructure Hacking, IRC 2 Comments

Infrastructure Hacking: BGP Protocol II

April 24, 2021April 24, 2021 by Lethani
Infrastructure Hacking: BGP Protocol II

BGP Hijacking This article is a continuation of the last post on the BGP protocol. If you haven’t read it yet, do so before you start. Let’s remember where we left off in the previous post. What we think is happening is that a user who will be on AS-200 is connecting to FTP, and we … Read more

Categories BGP, Infraestructure Hacking Leave a comment

Infrastructure Hacking: BGP Protocol I

April 2, 2021April 2, 2021 by Lethani
Infrastructure Hacking: BGP Protocol I

BGP Hijacking

Categories BGP, Infraestructure Hacking 1 Comment

Infrastructure Hacking: SNMP Protocol

April 2, 2021March 26, 2021 by Lethani
Infrastructure Hacking: SNMP Protocol

Today we are going to talk about everything related to SNMP (Simple Network Management Protocol) security. This is a network management service that runs on port 161 (UDP). The default version of SNMP is v2c. It has some complexity, so before moving on to vulnerabilities, let’s make a brief summary of how this protocol works. … Read more

Categories Infraestructure Hacking, SNMP Leave a comment

Infrastructure Hacking: RPC Protocol

April 2, 2021March 19, 2021 by Lethani
Infrastructure Hacking: RPC Protocol

On this post we are going to talk about how to get the most out of Remote Procedure Call, a protocol that is integrated in many applications. The “Remote Procedure Call” occurs when a computer requests a service that is on another computer and that goes over a network, without needing to know the details … Read more

Categories Infraestructure Hacking, RPC Leave a comment

Infrastructure Hacking: DNS Protocol II

February 24, 2021 by Lethani
Infrastructure Hacking: DNS Protocol II

This is the second part of the post about the DNS protocol and its vulnerabilities. If you have not yet read the first part, I recommend you to do so through this link. In this post I will focus on two advanced hacking techniques related to the DNS protocol: firstly, the well-known DNS Spoofing, with … Read more

Categories Infraestructure Hacking, DNS, Null-category Leave a comment

Infraestructure Hacking: DNS Protocol I

February 5, 2021 by Lethani
Infraestructure Hacking: DNS Protocol I

Do you know what happens from the moment you enter a URL in your browser until you get the results? Learn about the weaknesses of the DNS protocol and find out how to exploit them.

Categories Infraestructure Hacking, DNS Leave a comment

Infrastructure Hacking: WHOIS Protocol

November 20, 2020November 20, 2020 by Lethani
Infrastructure Hacking: WHOIS Protocol

Have you ever used the whois command? In this post I’ll talk about how to use this command to get information, as well as give you details about the whois protocol and explain some of the vulnerabilities I’ve found in this protocol.

Categories Infraestructure Hacking, WHOIS 8 Comments

Infrastructure Hacking: Telnet Protocol

November 14, 2020 by Lethani
Infrastructure Hacking: Telnet Protocol

In this post I bring you one of the first protocols in the history of the Internet: the Telnet protocol. This will be a short post as this protocol is not very complex, but I needed to include it in this section as the client is very useful during a pentesting. In general telnet (RFC854) … Read more

Categories Infraestructure Hacking, TELNET 6 Comments

Infraestructure Hacking: SSH Protocol – Part II

November 6, 2020 by Lethani
Infraestructure Hacking: SSH Protocol - Part II

This is the continuation of last week’s post, which you can find here. I recommend that you take a look at it before continuing reading if you haven’t seen it yet. In this post I’ll show you different methods that can be useful when it comes to vulnerating a server where the SSH protocol is … Read more

Categories Infraestructure Hacking, SSH 7 Comments
Older posts
Page1 Page2 Next →
© 2023 Hacking Lethani • Built with GeneratePress