hping3 Syntax
hping commands for scanning methods ICMP ping hping3 -1 10.0.0.25 Hping performs an ICMP ping scan by specifying the argument -1 on the command line. You may use –ICMP of -1 argument in the command line. By issuing the above…
hping commands for scanning methods ICMP ping hping3 -1 10.0.0.25 Hping performs an ICMP ping scan by specifying the argument -1 on the command line. You may use –ICMP of -1 argument in the command line. By issuing the above…
This post summarizes common syntax and parameters used with command nmap. To understand the meaning of each parameter, you may read about network discovery scanning techniques, as in “CISPP Study Guide 9th Edition”, pp. 732-733. nmap Syntax Parameters Those scans…
Smurf attack, also known as ICMP Echo Request, is a distributed reflection denial of service (DRDoS). Othe examples of DRDoS are DNS poisoning and fraggle attack. Description of smurf attack Smurf attack is performed as follows: How to prevent smurf…
There are six TCP communication flags: List of TCP Communication Flags SYN SYN, also known as synchronize, notifies the transmission. ACK ACK, also known as acknowledgment, confirms the receipt. FIN FIN, also known as finish, announces that it will not…
Netcraft Sublist3r Python script Example of use: sublist3r -d example.com -p 80 External references CEH v10: Module 2 Footprinting
This post features different types of clouds. This post is part of the introduction to cloud computing. Virtual Private Cloud (VPC) Featured Cloud Deployment Models Cloud Deployment Models: Private Cloud: A private cloud, also known as internal or corporate cloud,…
Security Testing Methodologies: List of Security Testing Methodologies Open Web Application Security Project (OWASP) Open Web Application Security Project (OWASP) is the Open Web Application Security Project, which is an open-source application security project that assists the organizations to purchase,…
Types of Security Controls: Preventive: Prevent security violations and enforce various access control mechanisms. Detective: Detect security violations. Corrective or recovery: Used to restore systems. Deterrent: Used to discourage. Compensating: Used as an alternative control when the intended controls failed.…
There are some system properties that can be obtained from Java code. Some of these examples are: Code example: System.getProperty(“os.name”) List of possible os values This is not a complete list. os.name values: Windows NT Windows 98 Windows XP…
A class file contains Java bytecode, it means, the code of a Java application that can be executed by a Java Virtual Machine (JVM). Class files have a .class extension, and are generated from source code files from Java files,…