I submitted a PR to update MacPorts' version of ZMap to version 3.0.0 which was officially released!

github.com/macports/macports-p

It's passed the build bot/CI checks.

However, since I do not have commit access, it is thanks to someone else to merge it.

Thanks to @zakir for merging one of my PRs in the upstream project before this release!

Thanks to Herby Gillot (not sure where Herby may be on the FediVerse) for giving me a heads up that 3.0.0 was officially out (I had previously been working on PRs for RC2).

#zmap #macports #opensource #networkscanning #security

Last updated 1 year ago

@zakir I submitted this PR which seems to have made the CI/build bots happy at least:

github.com/macports/macports-p

Though it would probably still be advisable to get the Assets and branch tags in closer alignment for whenever this progress beyond Release Candidates?

Regardless, it's up to someone else to merge that PR, but hopefully it improves things a little bit for MacPorts users!

#zmap #macports #opensource #networkscanning

Last updated 1 year ago

0xor0ne · @0xor0ne
453 followers · 70 posts · Server infosec.exchange

If you're interested in a minimal network port scanner, check out Qscan:

github.com/0xor0ne/qscan

and its companion command line tool qsc:

github.com/0xor0ne/qscan/tree/

#networkscanning #network #infosec #tool

Last updated 2 years ago

reimerex · @reimerex
4 followers · 18 posts · Server infosec.exchange

[ ] Day 4

In Day 4 Tasks, we learn on how to do

Scanning is procedure to identify living hosts, ports, and services running on specify target.

There are 2 types of scan based on their intrusiveness:
1.
Passive scan is scanning without touching/interacting directly with the target device. The scan usually done being capturing packages using . However, the information you can get are fairly limited.

2.
Active scan is scanning that interacting directly with the target service, usually by sending pocket to specific asset. The scanning will immediately do a deep scan to get a lot of information from the target.

Several techniques:
1.
The scan that aimed to map the entire network of the target. When an attacker has mapped the entire network of their target, they can launch through the weakness of enemy network.

2.
The scan that aimed to look for any open port that capable of sending and retrieving request/data.

3.
The scan that aimed to identify what kind of existed on the network that may threaten the system.

Tools to do scanning:
1.
NMAP is one of the most popular tool used for scanning a network. It can be used to scan open ports, open , open , running , etc.

2.
Nikto is a open source that can be used to identify for . It allows to search a for their subdomains, outdated servers, messages, and many more.

#adventofcyber2022 #tryhackme #scanning #passivescan #wireshark #activescanning #networkscanning #exploit #portscanning #vulnerabilityscanning #vulnerability #nmap #networkprotocols #services #operatingsystem #nikto #website #debug

Last updated 2 years ago