I recently found myself in a situation where I had access to an internal network (10.0.0.0/8), but had no additional information about the network’s topology, defenses, firewalls, or hardware. Scratching my head, I started putting together tactics to enumerate the network given the following constraints: Short amount of time available… Continue Reading Blind Box Hunting on Internal Networks – Part 1