1. x32x01

    NMAP CheatSheet v.1 Part1

  2. x32x01

    Comprehensive Guide to AutoRecon

    The AutoRecon tool is designed as a network reconnaissance tool. It is a multi-threaded tool that performs automated enumeration of services. The purpose of this tool is to save time while cracking CTFs and other penetration testing environments or exams. It is useful in real-world engagements...
  3. x32x01

    Metasploit for Pentester: Windows Hidden Bind Shell

    In this article, we are going to cover the tactics of Hidden BIND TCP shellcode. Every organization has multiple scanning tools to scan their network and to identify the new or unidentified open ports. In this type of environment, it’s very difficult to hide the suspicious bind shellcode and...
  4. x32x01

    MSSQL for Pentester: Nmap

    To obtain basic information such as database names, usernames, names of tables, etc from the SQL servers on the Windows operating system, we will execute penetration testing using Nmap scripts. MSSQL is Microsoft SQL Server for database management in the network. By default, it runs on port...
  5. x32x01

    How To Install WireShark In Termux

    Hey, what's up, Guys? , In this post, I am gonna show you how you can Install Wireshark in termux, Wireshark is an Advance tool. Your Phone does not have to be rooted, Yes this will work in Non-Rooted Termux But you will need to install the VNC Viewer for android to use the WireShark. What is...
  6. x32x01

    How to Install and Use Nmap In Termux

    In this post, You are gonna learn how you can install and use Nmap Tool In termux, And I am also gonna give you some Exmaple commands so you can try it your self. Overall it's Gonna be a serious posts and if you wanna be a good hacker then you must know how to use Nmap. What is Nmap in termux...
  7. x32x01

    Find Vulnerabilities using NMAP Scripts (NSE)

    Nmap comes pre-installed with Kali Linux. Not just Kali Linux Nmap comes pre-installed with every security focused operating system. But cybersecurity experts don't just use Nmap for scanning ports and services running on the target system, Nmap also can be used for vulnerability assessment and...
  8. x32x01

    Scan Open Ports Using Ss, Netstat, Lsof And Nmap

    A network is compromised of systems with addresses and on those systems you have services. That address is called an “IP Address” and the Service could be many things but is basically software that is running on the system and accessible over the network on a port number. Here are some common...
  9. x32x01

    Nmap Cheat Sheet

  10. x32x01

    How to Ping Specific Port Number in Linux and Windows

    Introduction The ping command is a network tool for checking whether a remote system is up and running. In other words, the command determines if a certain IP address or a host are accessible. Ping uses a network layer protocol called Internet Control Message Protocol (ICMP) and is available on...
  11. x32x01

    Masscan - 1000 Times Faster Than NMAP

    Masscan is the fastest network port scanner. It can scan the whole internet under 6 minutes with 25 millions per second data transmitting speed. Is it faster than flash? This fastest port scanner gives the output like nmap but masscan works like unicornscann, Zenmap internally(asynchronous...
  12. x32x01

    NMAP - The Network Mapper

    Network Mapper (Nmap) is the most popular cyber security scanner . This is used for finding hosts and services in a network. It was written by Gordon Lyon and published in September 1997. This tool have lot of features and can do lots of tests like finding the OS, services version, , it also...
  13. x32x01

    Using Scripts In NMAP

    NMAP has a Nmap Scripting Engine or NSE it allows us to create our custom scripts to perform different tasks automatically. These custom scripts are executed side by side when a scan is running. We can be use to perform more effective version detection, exploitation of the vulnerability, and so...
  14. x32x01

    Bypassing Firewalls in Nmap

    Now days almost every systems are protected by firewalls or Intrusion Detection Systems (IDS). Nmap provides various ways to bypass these firewalls or IDS to perform port scan on a system. In this post we will learn some path that we can scan ports bypassing firewalls. TCP ACK Scan...
  15. x32x01

    Zenmap - Easy GUI version of Nmap

    Zenmap is Graphical User Interface (GUI) version of Nmap. Zenmap is also very powerful tool like nmap. For it's graphical interface and easy menus makes it very easy to use. Previously Zenmap comes pre-installed on Kali Linux but newer version (from 2019.4) doesn't comes with Zenmap. So in...
  16. x32x01

    19 Useful NMAP Commands You Should Know

    Network Mapper (Nmap) is one of the most effective and functional tools in Kali Linux. Nmap can be used to perform a large range of different scanning techniques and is highly customizable. Nmap is by far the most popular information-gathering tool. It is a powerful tool that is used to scan a...
  17. x32x01

    Testing Methods for HTTPS with OpenSSL, Curl and Nmap

    If you’re using the HTTP protocol for surfing Internet, you usually use only using two of its methods i.e. GET and POST. However HTTP has a number of other methods like OPTIONS, TRACE, CONNECT, PUT and DELETE which are very risky if all these HTTP Methods are open in your web server. According...
  18. x32x01

    TCP & SYN Scanning with Metasploit Framework without NMAP

    Port Scan is Often done by hackers and penetration testers to identifying and discovering internal services of target host. Port Scanning is an important action for gathering more information of the target host. Today, We will see how to use Metasploit to scan port. As we all knows Metasploit...
  19. x32x01

    Detection and Exploitation of OpenSSL Heartbleed Vulnerability using NMAP and METASPLOIT

    in this post we will discuss how to detect and exploit systems that are vulnerable to the OpenSSL-Heartbleed vulnerability using Nmap and Metasploit on Kali Linux. Around 200000+ servers are still vulnerable to Heartbleed which is a serious vulnerability in the most popular OpenSSL...