Understanding Nmap Commands: In depth Tutorial Part II

Understanding Nmap Commands: In depth Tutorial Part II

Article by James Hawkins This is the second part of our guide on Nmap, you can find the first part here, in this part of the tutorial we’ll see other configurations that you can use with Nmap to avoid firewalls or debug the information obtained.

Understanding Nmap Commands: In depth Tutorial with examples

Understanding Nmap Commands: In depth Tutorial with examples

Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other […]

Simple security by evaluating open ports

Article by Dominique Cimafranca first published on his blog regarding Ubuntu, and Linux in general. A simple but effective procedure for evaluating security on your computer is to check what sites it’s connecting to, or what sites are connecting to it. Most critical malware nowadays turn computers into zombies for botnets — typically zombified hosts will […]

3 network scanner for Linux

3 network scanner for Linux

Sometime it’s useful to do an assessment of what’s online on your network, probably you think to know every server and service running, but I had more than one surprise in the past, with “test server just plugged in for a short time”, “New test service” or worst, hacked machine that exposed “new service”. Network […]

Logcheck - Scan your logs and warns you.

Logcheck – Scan your logs and warns you.

On our server we have (or you should have) tons of logs generated, logs from various daemons (ssh, iptables, monit, fail2ban), services (apache. nginx, bind, ftp, etc.) and system logs (syslog, messages, kernel). So i’m sure that every day you check these logs and look if something bad has happened, right ? Well, perhaps i’m […]