Fact: Nearly all internet connected devices will be port-scanned at some point in their lifespans. You want to know what most of the largest breaches of a decade or more have in common? Open, listening ports! Yes, you read that right. The bad guys scan for open, listening ports. Cybercriminals have relied on port scan … Continue reading Silence is golden. Close those ports, with SSHepherd.
Category: Scanning and Enumeration
Additional scanning tools.
Scanning with Masscan. Hey there, it's been a minute. I've been so busy with my internship and personal stuff + my laptop kinda gave up on me and I had to use some scrappy slow, old piece of junk but I'm back now and we're back to learning and having some fun. I thought I'd … Continue reading Additional scanning tools.
Scanning & Enumeration. (Part 2)
This continues, right off from the part one (1) of the scanning an enumeration section. Now we are going to use another new tool, called dirbuster, to do a little directory busting. There are other tools out there that do the same thing, like dirb, gobuster. You don't necessarily have to keep using dirbuster, I … Continue reading Scanning & Enumeration. (Part 2)
Scanning & Enumeration. (Part 1)
Installing Kioptrix Level 1. Hey guys. Welcome to the scanning and enumeration section of this course flow. To begin, we're going to install a vulnerable virtual machine, called Kioptrix. Load up your web browser, in your host machine, and search for kioptrix level 1. This is what you should look for: Vulnhub is a great … Continue reading Scanning & Enumeration. (Part 1)