Remote code execution is a method of attack whereby the attacker is able to send commands to the remote computer which then executes those commands. In most cases, these remote code executions are malicious in nature and are not authorized by the system owner. Remote code execution is generally the second attack on a systemContinue reading “Week Four – Remote Code Execution”
Category Archives: Uncategorized
Week 2 -DNS Sinkholes
While researching the use of honeypots, I came across the term sinkholes. One of the best ways to increase understanding of any subject is to examine various components with which they are associated. So, what are DNS sinkholes? How are they implemented and what are their uses? In order to answer this question, we mustContinue reading “Week 2 -DNS Sinkholes”