Hey there everyone! The series continues , here is part 2 of Information Gathering , if you have not read the Part-1 , see to it! This article will describe Nmap also called NetMapper , and it's use! In my opinion, Nmap is must-use tool for all Pen-testers/Hackers! It's over 20 years old tool! It have so many awesome utilities! FOLLOWING INFORMATION IS JUST FOR EDUCATIONAL PURPOSE, I'M NOT RESPONSIBLE FOR READER's ACTIONS AFTER READING THIS! Nmap uses raw IP packets to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X.
Hey There! I just thought about starting a Web Security Testing Series! So , here it is! I just started the Series with Information Gathering, so it's a part of Information Gathering that is- "Web Server Fingerprinting" If you are beginner , it could be good start, because the information gathering is one of most initial stages of Web Security Testing (aka Hacking). Objective of Information gathering is to get more and more info about victim, so we can select the perfect attack or exploit , that could easily Find a vulnerability and get your way into system! I'll perform fingerprinting using Netcat Tool, that is pre-installed in Kali Linux, but it's bright side is that you could use it on WINDOWS, It's compiled to Windows Executable File by a non-official authority, so go and get it here ! And If it's not installed on your Linux System, run following command in Terminal! sudo apt-get install netcat Netcat is called Swiss Army Knife of Hack