Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

IT Vulnerability Databases

This post includes a list of  public resources (e.g., databases) for vulnerability research. It also features some well-known sites that are no longer available. CVE Common Vulnerabilities and Exposure (CVE) is managed by MITRE. CVE is funded by the USA…

LDAP Enumeration Tools

This post summarizes some enumeration tools for lightweight directory access protocol (LDAP). To read more about LDAP and Directory Services, please read this post. List of LDAP Enumeration Tools LDAP Enumeration Tools: Softerra LDAP Administrator LDAP Admin Tool LDAP…

SNMP Enumeration Tools

This post features SNMP enumeration tools. List of SNMP Enumeration Tools SNMPUTIL IP Network Browser SNScan Windows-based application. You might also be interested in…

nmap Syntax

This post summarizes common syntax and parameters used with command nmap. To understand the meaning of each parameter, you may read about network discovery scanning techniques, as in “CISPP Study Guide 9th Edition”, pp. 732-733. nmap Syntax Parameters Those scans…

TCP Communication Flags

There are six TCP communication flags: List of TCP Communication Flags SYN SYN, also known as synchronize, notifies the transmission. ACK ACK, also known as acknowledgment, confirms the receipt. FIN FIN, also known as finish, announces that it will not…