Fact: Nearly all internet connected devices will be port-scanned at some point in their lifespans. You want to know what most of the largest breaches of a decade or more have in common? Open, listening ports! Yes, you read that right. The bad guys scan for open, listening ports. Cybercriminals have relied on port scan … Continue reading Silence is golden. Close those ports, with SSHepherd.
Tag: cybersecurity
Cyber Security Learning Path.
Hey guys, I know it’s been a while and I’m really sorry about that. This year threw me off kilter and I was having difficulties finding my drive and energy but I seem to be getting it back. Thanks for being patient with me. Alright, so a lot of people have been reaching out to … Continue reading Cyber Security Learning Path.
Additional scanning tools.
Scanning with Masscan. Hey there, it's been a minute. I've been so busy with my internship and personal stuff + my laptop kinda gave up on me and I had to use some scrappy slow, old piece of junk but I'm back now and we're back to learning and having some fun. I thought I'd … Continue reading Additional scanning tools.
Packet Sniffer.
Alright guys. In the previous post, we built a program that allows us to run an ARP spoofing attack, redirecting the flow of packets in the network and places us in the middle of the connection. Meaning, every data sent or revived from our target machine goes through our own computer, allowing us to see … Continue reading Packet Sniffer.
Network Scanner.
Information gathering is one of the most important stage of hacking or penetration testing, you can't gain access to any system if you don't have enough information about the system. If you happen to be on a network and your target is also connected to that same network, you need to be able to discover … Continue reading Network Scanner.