Thursday , January 24 2019
Home / IT Security (page 19)

IT Security

PORT SCANNING WRAP UP

PORT SCANNING WRAP UP

Port Scanning Wrap Up: Now that we have covered the basics of port scanning, there are a few additional switches that need to be covered. These switches provide extended functionality that may be useful to you as you progress in your penetration testing career. PORT SCANNING WRAP UP As mentioned …

Read More »

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS: After running a port scan and discovering a service running on port 80 on port 443, one of the first tools that should be used to evaluate the service is Nikto. Nikto is a web server vulnerability scanner. This tool was written by Chris Sullo and …

Read More »

USING NMAP TO PERFORM AN SYN SCAN

USING NMAP TO PERFORM AN SYN SCAN: The SYN Scan is arguably the most popular Nmap port scan. There are many reasons for its popularity, including the fact that it happens to be the default Nmap scan. If you run the Nmap command without specifying a scan type (using the …

Read More »

USING NMAP TO PERFORM A TCP CONNECT SCAN

USING NMAP TO PERFORM A TCP CONNECT SCAN USING NMAP TO PERFORM A TCP CONNECT SCAN: The first scan we will look at is called the TCP connect scan. This scan is often considered the most basic and stable of all the port scans because Nmap attempts to complete the …

Read More »

GOOGLE DIRECTIVES: PRACTICING YOUR GOOLGE-FU

Luckily for us, Google provides “directives” that are easy to user and help us get the most out of every search. These directives are keywords that enable us to more accurately extract information from the Google index. Consider the following example: assume you are looking for information on (TechyTalk) website …

Read More »

Linux Operating System

Linux Operating System: Enter our open source favorite, Linux, which is not a completely foolproof operating system but one with a reputation for being a much more secure player in the OS category than Windows or Apple. As we saw with firewalls, the equipment—or in this case the operating system—is …

Read More »

Tracing the Evolution Cryptography

Tracing the Evolution: As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is …

Read More »