Introduction Greetings peeps. Today I want to talk about something mundane. The scenario is, you have the permission to scan a friend’s/client’s web app, you are running Kali and want to do some essential tests before going full akimbo. I can’t stress enough the part where you got your permission. Remember kids, applying cybsec tools on a machine you don’t have permission to is icky, bad and totally not recommended. And what I am going to discuss here - however harmless they are - should be taken in this context. With that out of the way let’s begin Nmap I love nmap, network mapper if we want to be verbose.
Posts with the tag Cybersecurity: