How to Detect CVEs Using Nmap Vulnerability Scan Scripts
Nmap is widely known for its famous port mapping capabilities — we love it, and even included it in our best port scanners article a few months ago. Still, it would be quite unfair to reduce Nmap to nothing more than a “network mapper” or “port scanner.”
Top 10 Hacker Movies of all Time
Hollywood has a knack for influencing public opinion on many different topics. It’s been doing just that for over a century, and hackers have been no exception.
Introducing ASR | The #1 Tool to Reduce your Attack Surface Area
From the very beginning, vulnerabilities, open ports and exposed critical applications have been the most easily detected components of your attack surface area, making them the most easily exploited by malicious actors.
List of All Cybersecurity Conferences to Attend in 2020
The coronavirus pandemic is significantly changing our daily routines and how we live our lives. Consequently, it has led to many events and, with that, industry conferences we were all so excited to attend, to be cancelled, postponed or rescheduled. This is why we have updated our list of the best cybersecurity conferences in 2020 to reflect whether the events will take place, have been postponed or moved online. Additionally, our spreadsheet has also been updated with details about whether, and when, the events will take place. You can download the updated list here. Conferences are an important part of any industry: they allow you to meet with your peers in a less formal environment, expand your professional network and stay on top of all the latest trends and concepts in your industry.
Best Honeypots for Detecting Network Threats
Usually on this blog we write about red-team tools for penetration testing, such as vulnerability scanning tools, port scanning utilities, top ethical hacking Linux distributions, and much more regarding the OSINT world. However, this time we’re switching to the defensive side: let’s talk about honeypots!
Top Linux Distros for Ethical Hacking and Penetration Testing
Every superhero needs the right weapons and tools, and security professionals are no different. The right toolkit is one of the most important things you’ll need to help you perform cyber investigations, digital forensics and penetration testing more efficiently and quickly.
How to Find IP Ranges a Company Owns
Whether you’re an infosec beginner, an intermediate user, or one of the Internet’s most famous hackers, sooner or later you’ll get curious about how to identify a company’s public network address range.
DNS Enumeration: Top DNS Recon Tools and Techniques
DNS servers are the heart and soul of the Internet. Without them we couldn’t resolve hostnames and domain names into IP addresses.
5 Subdomain Takeover #ProTips
We at SecurityTrails are happy to introduce a new blog series where we’ll be sharing tips and step-by-step research processes from the best security researchers around. You’ll get a glimpse into their methodology, the tools they use and much more, with ProTips!