Nmap Penetration Testing

# See the network route #This will show you the Kernel IP routing table ifconfig #To find your IP address nmap -PR -sn 10.0.2.0/24 #PR: Ping all hosts before scanning. This ensures that only hosts that are responding to ping requests are scanned. #-sn: Scan for live hosts only. This skips the port scan and […]

Cybersecurity tools and techniques

Cybersecurity is a vast and complex field that calls on many tools and techniques to protect systems and data against cyberthreats. One of the main tools used in cybersecurity is the playbook, which is a set of predefined procedures and steps for responding to specific types of incidents or vulnerabilities. A playbook can help security […]