Protocols Search Results

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...

News: Lightweight Programs You Should Use for a Faster Linux

Some people are what is labeled a power user. I am one of these people. No matter how fast I get my system, or how quick of programs I have, it is never good enough. There is always at least one program that I could swap out for a more advanced, text-based counterpart that increases performance just a bit. Luckily, you don't have to use text-based programs without graphical user interfaces to get blazing fast speeds on Linux. There are tons of open source alternatives to the mainstream progra...

News: "The Intervention"

This is a great trick to play on your least-bad-ass pal. Pick a friend who doesn’t smoke, and barely drinks (spends Fridays at home watching Lifetime) and take them out for a beer. A couple days later, take them out for another beer. A couple days after that, do it again, only this time, after they order a beer, order yourself a Coke or a glass of water. Say something in passing, like “You totally love beer, huh?” or “I’m just not feeling it today.” Make sure it’s something that makes them fe...

Next Page