Information Gathering: Concept, Techniques and Tools explained
“Information is power,” as the saying goes. And in most scenarios it’s true: having critical information, at the right time, and especially knowing how to use it, can be a great source of power.
Banner Grabbing: Top Tools and Techniques Explained
We shared a few details about banner grabbing in our previous article about cybersecurity fingerprinting. Today, we’ll dig a little bit deeper, to define what it is, explore its different types, and examine some real-world examples showing how you can grab banners from different services on the Internet with both command-line tools and web-based interfaces.
Cybersecurity Fingerprinting Techniques and OS-Network Fingerprint Tools
In the physical world, analyzing fingerprints is one of the most popular techniques used to identify people involved with all types of crimes, from robbery to kidnapping or even murder.
Top 20 and 200 most scanned ports in the cybersecurity industry
Port scanning is one of the most common activities in cybersecurity — and it’s performed by both sides, the red team and the blue team.
What Are Certificate Transparency Logs?
SecurityTrails has introduced to you our new Feeds page, SurfaceBrowser™, and the option of getting certificate transparency logs, all of them in unified format so you’re able to extract any information needed. And while Google has announced they’ll be requiring Certificate Transparency for all newly-issued publicly trusted certificates, highlighting transparency and accountability through Certificate Authorities, there are still people who don’t get the importance of Certificate Transparency logs and the value of the information within them.