background preloader

Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples - Vimperator

Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples - Vimperator
Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other scanning tools, which could be better at evading firewalls & IDS (To a certain extent) and much more. In this first part, I have made my best to explain the basic scanning techniques, Host discovery options, port scanning options, techniques used in detecting Operating system & services running on the system. i also give Nmap as already installed on your system. Let’s start with one of the most basic and default scan, the one without using any parameters. Open up the terminal, in Ubuntu ctrl+alt +t This is a basic scan of the local IP address 192.168.1.34, we use sudo to gain administrator privileges, and then we give the target to Nmap. Discovery

http://linuxaria.com/article/understanding-nmap-commands-tutorial?lang=en

Related:  Ethical HackingDebian / Ubuntucommandlines

Linux and Open source PortSpoof – An interesting anti-snooping tool for Linux - Vimperator Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure. The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task I’ve found the concept behind this small program really interesting : instead of close all your ports with a firewall deceive the real ports, thus annoying the guys who are running portscan versus your server/computer.

Linux Shortcuts and Commands (Highly recommended) Next: About this document ... Up: Linux Newbie Administrator Guide Previous: Before Linux Installation Contents Subsections Maybe this should have come first. A practical selection of Linux shortcuts and commands in a concise form. Perhaps this is everything that a computer-literate newbie Linuxer really needs.

The OSWA-Assistant(tm) - a free standalone wireless auditing toolkit for both IT-professionals and End-Users alike MoocherHunter™ is a free mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers, hackers and users of wireless networks for objectionable purposes (e.g. paedophile activity, illegal file downloading, illegal music/video sharing, etc). (for MoocherHunter™ Law Enforcement Edition, please see below) 100% Made-In-Singapore with ThinkSECURE-proprietary code, MoocherHunter™ was first unveiled to Southeast-Asian law enforcement officials at the Singapore Police Force's invitation-only CyberCrime Investigation Workshop 2008 held in Singapore in April 2008. MoocherHunter™ is licensed under the MoocherHunter™ License as part of the OSWA-Assistant™ wireless auditing LiveCD toolkit (note: only on version 0.9.0.3b and above) which is free for end-user download at MoocherHunter™ identifies the location of an 802.11-based wireless moocher or hacker by the traffic they send across the network. Download MoocherHunter™ and the OSWA-Assistant™ here.

reaver-wps - Brute force attack against Wifi Protected Setup Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. Intimidated by the command-line? Running Windows, OS X, or just don't want to run Linux, download, and compile the open source Reaver?

The TCP/IP Guide The TCP/IP Guide Welcome to the free online version of The TCP/IP Guide! My name is Charles and I am the author and publisher. I hope you will find the material here useful to you in your studies of computing, networking, and programming. Here are a few tips, links and reminders to help you out: Introduction: Newcomers to The TCP/IP Guide may wish to read the Introduction and Guide to the Guide, which will explain what the Guide is about and provide you with useful information about how to use it. GRUB Manual 1.99 Table of Contents This is the documentation of GNU GRUB, the GRand Unified Bootloader, a flexible and powerful boot loader program for a wide range of architectures. This edition documents version 2.00. Linux dd Command Show Progress Copy Bar With Status byVivek GiteonOctober 20, 2012 last updated December 31, 2014 I'm using dd command for block level copy and just found out that there's no built in way to check the progress. How do I use the Linux or Unix dd command while coping /dev/sda to /deb/sdb and display a progress bar when data goes through a pipe? You need to use the pv command which allows you to see the progress of data through a pipeline.

Chris P.C. srl - ChrisPC Free Anonymous Proxy Software FREE Download - Enjoy your privacy and surf anonymously online and watch TV abroad USA, UK, Hulu, TV.com, iPlayer ChrisPC Anonymous Proxy Pro is the privacy tool that anybody would need to use to protect their online experience. Browsing, buying online, watching online TV channels or reading online newspapers are part of our daily life. What is important to know is that when we connect to the Internet we are exposed, our buying/browsing habits and our confidential data are at risk. John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's.

Metasploit Metasploit From Wikibooks, open books for an open world Jump to: navigation, search The Metasploit Book This project is an attempt to document the tools and research created by the Metasploit Project. Style Guide

Related: