The Ethical Hacking
Practitioner-written articles for analysts, defenders, and learners. Updated as the threat landscape changes.
The Art of OS Discovery: How Banner Grabbing Reveals System Vulnerabilities
Banner grabbing, or OS fingerprinting, identifies the operating system on a remote target, helping attackers exploit OS-specific vulnerabilities. There are two methods: observing banners when connecting to services (e…
Techniques Used for discovering Ports and Services
Checking the open ports and services in active systems is the next phase in the network scanning procedure. Numerous port scanning techniques can be used to find open ports and services.
What are the techniques used for discovering a host?
Gathering data on systems that are “alive” and responding on the network is the process of scanning. The first step in the network scanning procedure is host discovery.
Network scanning tools for PC and Mobile devices
The network scanning tools are commonly used for discovering and identifying live hosts, open ports, running services, on a target network, location info, net BIOS info, and information about all TCP/IP and UDP open p…
What are TCP/IP communication flags?
TCP transmission control protocols have communication flags in their header for controlling and managing the communication between two internet devices. The communication flags are embedded in the TCP headers for cont…
What is Network Scanning
Network scanning is the second phase in the ethical hacking methodology where we gather more detailed information about our target system for future attacks and exploitation. After the first phase of footprinting or r…
How to use OSINT Framework for Footprinting Target
OSINT is short for open-source intelligence framework that focuses on gathering information about the target available over the internet. This framework helps security researchers for performing automated footprinting…
How to Use BillCipher for footprinting target
BillCipher is an open-source command line tool for information gathering of any website, domain, and IP address. It is an Open-source intelligence information-gathering tool available for Linux OS.
How to use FOCA for footprinting a target
FOCA short for Fingerprinting Organizations with collected archives is a tool that disclose metadata and hidden information in scanned documents. These documents are may be available on web pages, and can be downloade…