Category Archives: Active scanning

Active scanning


DIS10.2 Penetration Testing & Security Analyst Certification

DIS10.2 : Penetration Testing and Security Analyst Certification include In-depth Penetration Testing Process used in current industry to counter various network and web based attack. Penetration Testing process includes type of penetration testing and vulnerability Assessments which are done by Read more…


  Bytecode Cyber Security is Now Authorized Training Partner of  DIS Consultant,India   Online and Classroom Trainings Bytecode cyber security is India’s Best institute to learn DIS10( Diploma in information Security). DIS10 is one certification program which has benefits of Read more…


dnsmap 0.30 – DNS Network Mapper by pagvac (gnucitizen.org)   usage: dnsmap <target-domain> [options] options: -w <wordlist-file> -r <regular-results-file> -c <csv-results-file> -d <delay-millisecs> -i <ips-to-ignore> (useful if you’re obtaining false positives)   e.g.: dnsmap target-domain.foo dnsmap target-domain.foo -w yourwordlist.txt -r Read more…


10 nmap Commands   #1 Scan a single host or an IP address (IPv4)   nmap 192.168.1.1 Or nmap secinside.in   Output         #2 Nmap Syn Stelth Scan    nmap -v -A secinside.in   Output     Read more…


Network Sniffing A packet sniffer is a utility that has been used since the original release of Ethernet. Packet sniffing allows individuals to capture data as it is transmitted over a network. Packet sniffer programs are commonly used by network Read more…


Hackers Types Hackers are three types:- 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker White Hat and Grey Hat Hacker & What is the Real Difference? What is worse, the public is not able to understand Read more…


Port Scanning Techniques As a novice performing automotive repair, I can struggle for hours trying to fit my rudimentary tools (hammer, duct tape, wrench, etc.) to the task at hand. When I fail miserably and tow my jalopy to a Read more…


Basic Scanning Techniques Scan a single target —> nmap [target] Scan multiple targets —> nmap [target1,target2,etc] Scan a list of targets —-> nmap -iL [list.txt] Scan a range of hosts —-> nmap [range of IP addresses] Scan an entire subnet Read more…