nullbyte.png

Nmap

Article cover image
Aug 22, 2013

Welcome back, my fledgling hackers!One of the first issues any hacker has to address is reconnaissance. Before we even begin to hack, we need to know quite a bit about the target systems. We should kn ...

Article cover image
Aug 6, 2013

Welcome back, my hacker novitiates!Finding vulnerabilities in systems can be one of the most time-consuming tasks for a hacker. There will be times, though, when you'll find yourself in a position tha ...

Article cover image
May 22, 2013

Welcome back, my nascent Hackers!In my last blog, we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it's totally undetectable, meaning ...

Article cover image
Feb 28, 2012

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that ...

Article cover image
Jan 15, 2012

The already robust and ingenious Nmap tool has received a whole slew of new scanning scripts that can be used to do all sorts of naughty endeavors. Notably, the SQLi module, since it is a necessary ev ...

Article cover image
Oct 18, 2011

Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve ...