How to Detect and Prevent a Security Breach
Every day, a vast number of famous websites and apps suffer network breaches in one way or another. And the incidents you hear about on the news are only a tiny portion of what’s really happening under the Internet’s surface, where thousands of websites are getting hacked by malicious automated and manual attacks as you read this.
How to Detect CVEs Using Nmap Vulnerability Scan Scripts
Nmap is widely known for its famous port mapping capabilities — we love it, and even included it in our best port scanners article a few months ago. Still, it would be quite unfair to reduce Nmap to nothing more than a “network mapper” or “port scanner.”
Introducing ASR | The #1 Tool to Reduce your Attack Surface Area
From the very beginning, vulnerabilities, open ports and exposed critical applications have been the most easily detected components of your attack surface area, making them the most easily exploited by malicious actors.
Best Honeypots for Detecting Network Threats
Usually on this blog we write about red-team tools for penetration testing, such as vulnerability scanning tools, port scanning utilities, top ethical hacking Linux distributions, and much more regarding the OSINT world. However, this time we’re switching to the defensive side: let’s talk about honeypots!
Top Linux Distros for Ethical Hacking and Penetration Testing
Every superhero needs the right weapons and tools, and security professionals are no different. The right toolkit is one of the most important things you’ll need to help you perform cyber investigations, digital forensics and penetration testing more efficiently and quickly.
How to Find IP Ranges a Company Owns
Whether you’re an infosec beginner, an intermediate user, or one of the Internet’s most famous hackers, sooner or later you’ll get curious about how to identify a company’s public network address range.
DNS Enumeration: Top DNS Recon Tools and Techniques
DNS servers are the heart and soul of the Internet. Without them we couldn’t resolve hostnames and domain names into IP addresses.
CMS Detector: What CMS a Website is Using and the Best Tools to Find Out
Whether you’re an online marketer doing market research, a developer, a security researcher or an SEO specialist, you must have asked yourself the question ‘what CMS is this website using?’ Or maybe you find yourself simply wanting to build a website—and you’re interested in knowing which technology works best for different types of projects.
ASN Lookup Tools, Strategies and Techniques
When we created SecurityTrails we did it because we couldn’t find an all-in-one cybersecurity tool that could integrate all the things we needed: IPs, domain names, DNS records, open ports, SSL certificates, network information, and the ability to pivot and cross-relate all that information in a single interface.
What is Reverse DNS? Top Tools for Performing a Reverse DNS Lookup
In our blog we’ve been writing a lot about IP and WHOIS lookup for both domains and subdomains, showing how easy it is to fetch data when it comes to IP addresses and domain names. But there was a missing link in this chain… and that is the reverse DNS.