-
Common NMAP Scans
There are several useful scan types for NMAP, here are the usages.
-
Scanning Networks
Section Overview Once an overall picture (footprint) of a network has been established, the next step is to take that information and probe for useful information about what’s in the network. Questions What are the objectives of a network scan? What is the difference between TCP and UDP? What are the flags used by TCP? […]
-
Footprinting and Recon
Section Overview When profiling a target it’s important to know what you’re up against. There are several methods to gain information – most of which is available publicly. The information posted are quite often valuable for job seekers and people looking to do business with the target, however these same sources of information can be […]
-
Introduction to Ethical Hacking
Section Overview There needs to be a solid grounding in basic terms and ideas that used in Penetration Testing as a whole and by extension Ethical Hacking. An Ethical Hacker needs to understand systems and why they are built the way they are, as well they need to understand things such as legal and regulator […]
-
Going for my CEH v11
I’ve decided to go after the Certified Ethical Hacker certification v11. Why do it? For a long time, I always wanted to be a hacker, even though I had no idea what it actually meant. Now that I’ve been involved in the security space, I understand that a hacker (at least in the definition I […]