It is certainly well known that “hacker tools” can be used for many legitimate purposes. Nmap, the Network Mapper and security scanner is no exception. These days, it is used routinely to identify the ...
You may have heard horror stories about how easy it is for evil system crackers to probe potential victims' systems for vulnerabilities using software tools readily available on the Internet. The bad ...
Another good nmap flag for beginners is –v which gives additional, verbose, output. With this set nmap will provide extra text explaining its actions and results. Flags can be combined to perform more ...
So far, in my previous articles on Nmap, we've looked at how the scanner can be used to map and audit a network, as well as track down noncompliant devices and services. But hackers can also use Nmap ...
Linux systems provide a lot of useful commands for reviewing network configuration and connections. Here's a look at a few, including ifquery, ifup, ifdown and ifconfig. There are a lot of commands ...
How can you be sure your network is secure? Before you can patch vulnerabilities you need to discover them. You need to think like a cracker might. You need to hack your own system. This is known as ...