In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack.
Step 0: Pre-Engagement
Step 1: Passive Recon
Step 2: Active Recon
Now the run really begins.
In this blog post, you’ll learn how to put all the knowledge you gained during the planning and reconnaissance steps into action. Let’s walk through the next steps:
Step 3: Service Enumeration
Step 4: Access Exploitation
Step 5: Privilege Escalation
For each step, I’ll cover the goals, strategies, and resources I use in an ethical hacking exercise. Then, I’ll share recommendations for endpoint security activities to block attackers and mitigate your risk.
Step 3: Service Enumeration
At this point in the hacking process, I know roughly what is running on the Windows system; now I want to confirm and see if anything provides an initial foothold. So, I build a detailed blueprint of the target and environment.
The first port to check is port 80 the IIS web server. To do this I run curl against the IP address:
-i = include the protocol response in the header

The response shows the version is IIS/10.0, which confirms this is a Windows 10 endpoint. The response is also
Source…

Did you just get a B&N Nook? Here is everything you need to know – Goodereader
Did you just get a B&N Nook? Here is everything you need to know – Goodereader

Greg Vigna, Doctor-Lawyer: Comments on the failures of Penumbra Inc. Jet 7 – EIN News
Greg Vigna, Doctor-Lawyer: Comments on the failures of Penumbra Inc. Jet 7 – EIN News

5 priorities for CIOs in 2021 – The Enterprisers Project
5 priorities for CIOs in 2021 – The Enterprisers Project

The top 10 business ebooks and audiobooks checked out from public libraries in 2020 – Fortune
The top 10 business ebooks and audiobooks checked out from public libraries in 2020 – Fortune

Aging in Place eBook Highlights Industry Trends for Contractors – Yahoo Finance
Aging in Place eBook Highlights Industry Trends for Contractors – Yahoo Finance