What are Open Ports?
From a red team’s point of view, port scanning is one of the most exciting tasks to handle whenever you’re collecting OSINT data about a remote target. However, open ports are not only important on the offensive side, but also on the defensive front.
Flan Scan - The New Vulnerability Scanner from Cloudflare
Port scanning is one of the most frequent activities performed by security researchers working as part of a red team. And in other scenarios, blue teams use it along with online vulnerability scanning tools to prevent a security breach in their apps and servers. Knowing that port and vulnerability scanners are pillars of the cybersecurity world, we’ll analyze one of the newest today, Flan Scan. How new is it? This vulnerability scanner was released only days ago.
Nmap Scripts (NSE): The Key To Enhance Your Network Scans
Nmap is, quite simply, the best port scanner around. We love it because it offers easy installation, simple usage syntax and great results, as we previously explored in our Nmap commands article. For those who aren’t familiar with it, Nmap isn’t just a common tool we all use for port scanning IP ranges from time to time—it offers much more than that. So if you really want to boost your Nmap scanning capabilities, keep reading. Today we’ll take a close look at the Nmap Scripting Engine, known as NSE.
Top 10 vulnerable websites for penetration testing and ethical hacking training
The infamous cybersecurity skills gap is rising, and more than ever, companies are in need of security professionals to protect their networks and systems. So whether you’re just starting out in cybersecurity or you’re established as an expert, you constantly need to work on practising and sharpening your hacking skills.
Banner Grabbing: Top Tools and Techniques Explained
We shared a few details about banner grabbing in our previous article about cybersecurity fingerprinting. Today, we’ll dig a little bit deeper, to define what it is, explore its different types, and examine some real-world examples showing how you can grab banners from different services on the Internet with both command-line tools and web-based interfaces.
How to Detect and Prevent a Security Breach
Every day, a vast number of famous websites and apps suffer network breaches in one way or another. And the incidents you hear about on the news are only a tiny portion of what’s really happening under the Internet’s surface, where thousands of websites are getting hacked by malicious automated and manual attacks as you read this.
How to Detect CVEs Using Nmap Vulnerability Scan Scripts
Nmap is widely known for its famous port mapping capabilities — we love it, and even included it in our best port scanners article a few months ago. Still, it would be quite unfair to reduce Nmap to nothing more than a “network mapper” or “port scanner.”
Introducing ASR | The #1 Tool to Reduce your Attack Surface Area
From the very beginning, vulnerabilities, open ports and exposed critical applications have been the most easily detected components of your attack surface area, making them the most easily exploited by malicious actors.
Best Honeypots for Detecting Network Threats
Usually on this blog we write about red-team tools for penetration testing, such as vulnerability scanning tools, port scanning utilities, top ethical hacking Linux distributions, and much more regarding the OSINT world. However, this time we’re switching to the defensive side: let’s talk about honeypots!
Top Linux Distros for Ethical Hacking and Penetration Testing
Every superhero needs the right weapons and tools, and security professionals are no different. The right toolkit is one of the most important things you’ll need to help you perform cyber investigations, digital forensics and penetration testing more efficiently and quickly.