Tag Archives: hacking

Active Information Gathering with Metasploit-Framework
Using Nmap to perform port scanning Using -sT scanning mode is the default scanning mode of Nmap. The status of the target port is accurately judged through the TCP three-way handshake packet. Since three connections are established, it is extremely easy to be captured by the target firewall. msf> nmap -sT 127.0.0.1 The -sS scan […]

THREAT MODELING TODAY
What Is Threat Modeling? Threat modeling is a proactive approach to identifying entry points to enumerate threats and building security measures to prevent security breaches in applications and computer and network systems. It’s an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application and systems. […]