ADMIN magazine · @adminmagazine
524 followers · 143 posts · Server hachyderm.io
Phil Smith · @ununseptimus
15 followers · 169 posts · Server retro.pizza

March of Robots 24: Gort (The Day the Earth Stood Still)

Still behind. Just want to have 31 out by March 31. That's the plan, anyway.

#marchofrobots2023 #marchofrobots #gort #thedaytheearthstoodstill #klaatubaradanikto #klaatu #barada #nikto

Last updated 1 year ago

A few popular ones from 2022-

Stealth SYN scan, detect version of services running on all open ports:
$ nmap -sS -sV -p- <target>

Show open connections and listening ports, with PID/name:
$ netstat -anp

Scan for vulnerabilities, output to file/metasploit:
$ nikto -h scanme.nmap.org -o scan.txt

$ nikto -h <target> -Format msf+

Enumerate databases on a target web server that is using SQL injection vulnerabilities:
$ sqlmap -u <target URL> --dbs

There’s many more intensive flags, but in the spirit of being quiet I posted these. Feel free to add good ones I missed.

#nmap #pentesting #sql #nikto

Last updated 2 years ago

reimerex · @reimerex
4 followers · 18 posts · Server infosec.exchange

[ ] Day 4

In Day 4 Tasks, we learn on how to do

Scanning is procedure to identify living hosts, ports, and services running on specify target.

There are 2 types of scan based on their intrusiveness:
1.
Passive scan is scanning without touching/interacting directly with the target device. The scan usually done being capturing packages using . However, the information you can get are fairly limited.

2.
Active scan is scanning that interacting directly with the target service, usually by sending pocket to specific asset. The scanning will immediately do a deep scan to get a lot of information from the target.

Several techniques:
1.
The scan that aimed to map the entire network of the target. When an attacker has mapped the entire network of their target, they can launch through the weakness of enemy network.

2.
The scan that aimed to look for any open port that capable of sending and retrieving request/data.

3.
The scan that aimed to identify what kind of existed on the network that may threaten the system.

Tools to do scanning:
1.
NMAP is one of the most popular tool used for scanning a network. It can be used to scan open ports, open , open , running , etc.

2.
Nikto is a open source that can be used to identify for . It allows to search a for their subdomains, outdated servers, messages, and many more.

#adventofcyber2022 #tryhackme #scanning #passivescan #wireshark #activescanning #networkscanning #exploit #portscanning #vulnerabilityscanning #vulnerability #nmap #networkprotocols #services #operatingsystem #nikto #website #debug

Last updated 2 years ago

💀​RRootT :verified: · @Dr4k3
13 followers · 79 posts · Server infosec.exchange

lol www.google.com

#nikto #chatgpt

Last updated 2 years ago

jmau111 · @jmau111
0 followers · 3 posts · Server infosec.exchange
jmau111 · @jmau111
0 followers · 4 posts · Server infosec.exchange
Patryk Krawaczyński · @agresor
32 followers · 75 posts · Server infosec.exchange

Fałszujemy rozpoznania skanerów #2 ( nfsec.pl/security/5774 )

#linux #nmap #nikto #twittermigration

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

[sorry folks, this one's in german]

Teil 3 der NetHack Videoreihe ist da! Heute schauen wir uns den Apache Webserver an, suchen mit Nikto nach versteckten Dateien und Ordnern und überprüfen Wordpress mit WPScan auf Schwachstellen und bekannte Benutzernamen.

youtube.com/watch?v=FCfoHEVP98

#ethical #hacking #nikto #wpscan #wordpress #apache #youtube

Last updated 6 years ago