microbytesecmicrobytesecurity.hashnode.dev·Jul 24, 2024TurboCharge Your Nmap Scan: Five Hacks 🧿🔍Overview: This post will explore five Nmap hacks and tips that security researchers and ethical hackers can use to optimize their scans, enhancing workflow and automation. Understanding Nmap Default Scan To grasp Nmap's scan timing, let's start with ...Discuss·40 reads#cybersecurity
Nexxsysnexxium.hashnode.dev·Jul 12, 2024Ping SweepSimple Ping Sweep (bash script) #!/bin/bash # Function to validate CIDR notation validate_cidr() { local cidr=$1 if [[ $cidr =~ ^([0-9]{1,3}\.){3}0\/(24)$ ]]; then return 0 else return 1 fi } if [ -z "$1" ]; then ...Discussbash script
PurnaChandrapurnadocs.hashnode.dev·Jul 8, 2024Nmap: The Essential Tool for Pentesting and Bug Bounty HuntingHello everyone. This is Purna here. Iam an aspiring CyberSecurity guy who started learning about it recently. So, i decided to make notes for my learnings and as well as share with the community. So, others can learn as well. And that's about my Intr...Discuss#cybersecurity
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jun 20, 2024OSCP Journey : TJ_Null - HTB/SearchI - Introduction : Gaining the initial foothold for this box was a bit challenging, but once the process began, it became incredibly engaging. This box is an excellent example of a comprehensive Active Directory challenge and is a must-try. It covers...Discuss#cybersecurity
ByteScrum TechnologiesforByteScrum Technologiesblog.bytescrum.com·Jun 13, 2024Python for Cybersecurity: Writing Scripts for Ethical HackingPython has become a go-to language for cybersecurity professionals and ethical hackers due to its simplicity, readability, and extensive libraries. This guide will introduce you to writing Python scripts for ethical hacking, demonstrating how to use ...Discuss·95 likes·162 readsPythonpassword cracking
Jubril Edunjubriledun.hashnode.dev·Apr 22, 2024Vulnerability Scanning (nmap, Nessus, Metasploitable 2)In this project, we will be practicising vulnerability management by scanning a vulnerable virtual machine (Metasploitable 2) using scanning tools (nmap and Nessus) Vulnerability Management is the process of identifying security flaws and vulnerabili...Discuss·204 readsnessus
Stefan Hudelmaiercheckson.hashnode.dev·Apr 4, 2024Using nmap for Continuous vulnerability MonitoringI don't have to tell you how important it is to make sure that your systems are not vulnerable to attacks. There are a number of complementary measures that you should implement. Here is an (incomplete) list: Keeping your software supply chain secur...Discuss·2 likesmonitoring
Esther Adwetsessadwets.hashnode.dev·Feb 24, 2024Nmap Live Host Discovery | TryHackMe (THM)As I have mentioned before, knowledge is power. This is especially true when you want to target a network. The more you know about the network you want to attack, the higher the chances of successful exploitation. Enumeration*: /ɪˌnjuːməˈreɪʃn/ noun ...Discussnmap
Ron Bhubandspoke.amastelek.com·Feb 2, 2024🔧Leveraging NMAP for Enhanced Cybersecurity in Business Operations ⚙️In today's digital landscape, businesses, especially non-enterprises, face the daunting challenge of safeguarding their networks against cyber threats. Amidst a plethora of cybersecurity tools, NMAP emerges as a robust and effective open-source solut...Discusscybersecurity
Awais Sajidblackdiamond.hashnode.dev·Jan 12, 2024Unveiling Webmin VulnerabilitiesIntroduction: Webmin, a powerful system administrator tool for Unix-like systems, is widely used by various companies for managing server configurations. However, its immense popularity has also attracted the attention of hackers looking to exploit p...Discussmetasploitable