med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

359
active users

#nmap

0 posts0 participants0 posts today
Bellingcat<p># Фактчекинг легенды: Nmap и предполагаемый доступ к админке gov.kz<br>## Введение<br>В IT-сообществе гуляет захватывающая история: якобы в 2021 году кто-то с помощью одной команды в Nmap случайно наткнулся на уязвимость сайта Министерства образования Казахстана (gov.kz) и получил доступ к админке без пароля! Такие байки — почти легенды для айтишников, особенно новичков, вдохновляя копаться в кибербезопасности. Но стоп: правда ли это? С точки зрения фактчекинга, история вызывает вопросы. Этот пост, основанный на OSINT-методологии (анализе открытых источников), разбирает инцидент по косточкам, отделяя факты от вымысла. Мы исследуем технические детали, контекст и уроки — всё в духе профессионального, но живого подхода, подходящего для Google Blogger! <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://qoto.org/tags/TechLegend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechLegend</span></a><br>---<br>## Ключевые слова<br>- Nmap: Мощный инструмент для сканирования сети — ищет хосты, порты, уязвимости. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> <br>- Gov.kz: Домен госресурсов Казахстана, включая сайт Минобразования. <a href="https://qoto.org/tags/GovTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GovTech</span></a> <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kazakhstan</span></a> <br>- Кибербезопасность: Защита систем от атак и несанкционированного доступа. <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <br>- Уязвимость: Слабое звено, открывающее дверь хакерам. <br>- Админка: Панель управления сайтом — святая святых веб-ресурса. <br>- Фактчекинг: Проверка историй на правду через открытые данные. <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FactCheck</span></a> <br>- OSINT: Разведка по открытым источникам — от СМИ до соцсетей. <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <br>- Халатность: Небрежность админов, из-за которой системы становятся уязвимы. <br>- Информационная безопасность: Меры для защиты данных и серверов. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <br>- Легенда IT: Поучительные байки, мотивирующие IT-сообщество. <a href="https://qoto.org/tags/TechLegend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechLegend</span></a><br>---<br>## Целевая аудитория<br>- Студенты и новички в IT <br> Молодые айтишники, горящие желанием изучать кибербезопасность. Эта история может вдохновить, но вам нужен критический взгляд! <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <br>- Исследователи кибербезопасности <br> Профи, анализирующие уязвимости госсайтов и методы их обнаружения. <a href="https://qoto.org/tags/GovTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GovTech</span></a> <br>- Специалисты по инфобезу <br> Эксперты, которые борются с рисками и учатся на случаях халатности. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <br>- Журналисты и фактчекеры <br> Медийщики, проверяющие IT-истории для точных и честных публикаций. <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FactCheck</span></a> <br>- Госструктуры Казахстана <br> Ответственные за цифровую безопасность, чтобы извлечь уроки и закрыть бреши. <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kazakhstan</span></a><br>---<br>## Факты под микроскопом<br>1. Нет следов инцидента в 2021 году <br> Ни казахстанские СМИ, ни международные источники (Wired, ZDNet) не упоминают, чтобы через nmap <a href="http://gov.kz" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">http://</span><span class="">gov.kz</span><span class="invisible"></span></a> кто-то ворвался в админку Минобразования. Такой громкий случай точно попал бы в новости или отчёты KZ-CERT. Где доказательства? <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FactCheck</span></a> <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kazakhstan</span></a><br>2. Синтаксис nmap — фейл <br> Команда nmap <a href="http://gov.kz" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">http://</span><span class="">gov.kz</span><span class="invisible"></span></a> — технический ляп. Nmap работает с доменами (nmap gov.kz) или IP, а не с URL. Это намёк: история писалась для вау-эффекта, а не для правды. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a><br>3. Админка без пароля? Сомнительно <br> Да, халатность случается, но боевой сервер госструктуры на .gov.kz без авторизации — это редкость. Даже в странах с несовершенной кибергигиеной базовая защита обычно есть. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://qoto.org/tags/GovTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GovTech</span></a><br>4. Реакция властей — нестыковка <br> Исследователи порой находят баги и получают ответы или награды от госструктур Казахстана. Полное игнорирование доступа к базе данных? Звучит неправдоподобно. <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kazakhstan</span></a> <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a><br>---<br>## Вывод<br>Скорее всего, это анекдотическая байка, созданная, чтобы зажечь интерес новичков к инфобезу. Такие легенды — вроде «взлома Пентагона через Excel» — популярны в IT, но факты тут шатки. Мораль хороша, а реальность под вопросом. <a href="https://qoto.org/tags/TechLegend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechLegend</span></a> <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FactCheck</span></a><br>---<br>## Уроки на миллион<br>- Халатность — частая причина дыр в безопасности. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <br>- Linux и nmap — мощные инструменты в умелых руках. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> <a href="https://qoto.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <br>- Факты проверяйте ссылками и данными, а не верьте на слово! <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FactCheck</span></a> <br>Хотите реальные кейсы уязвимостей госресурсов? Можем копнуть глубже! <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a><br>---<br>## Библиография и источники<br>- Nmap Official Documentation <br> <a href="https://nmap.org/book/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">nmap.org/book/</span><span class="invisible"></span></a> <br> Подтверждает: Nmap не дружит с http://, только домены и IP. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> <br>- OWASP: Common Web Vulnerabilities <br> <a href="https://owasp.org/www-project-top-ten/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">owasp.org/www-project-top-ten/</span><span class="invisible"></span></a> <br> Почему админка без пароля — серьёзный баг. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <br>- MITRE CVE Database <br> <a href="https://cve.mitre.org/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">cve.mitre.org/</span><span class="invisible"></span></a> <br> База уязвимостей, включая госсектор. <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <br>- Казахстанский CERT — KZ-CERT <br> <a href="https://cert.gov.kz/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">cert.gov.kz/</span><span class="invisible"></span></a> <br> Новости и отчёты о киберинцидентах в Казахстане. <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kazakhstan</span></a> <br>- Hacking News — Wired, ZDNet <br> <a href="https://www.wired.com/tag/hacking/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">wired.com/tag/hacking/</span><span class="invisible"></span></a> <br> <a href="https://www.zdnet.com/topic/security/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">zdnet.com/topic/security/</span><span class="invisible"></span></a> <br> Реальные кейсы взломов. <a href="https://qoto.org/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <br>- Bug Bounty Platforms <br> <a href="https://www.hackerone.com/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">hackerone.com/</span><span class="invisible"></span></a> <br> Примеры уязвимостей, найденных исследователями. <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <br>- Книга: "The Art of Exploitation" — Jon Erickson <br> Основа для изучения инструментов вроде Nmap. <a href="https://qoto.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p><p>⁂௹∞°</p><p>retroshare://channel?name=%D0%A4%D0%B0%D0%BA%D1%82%D1%87%D0%B5%D0%BA%D0%B8%D0%BD%D0%B3%20%D0%BB%D0%B5%D0%B3%D0%B5%D0%BD%D0%B4%D1%8B%3A%20Nmap%20%D0%B8%20%D0%BF%D1%80%D0%B5%D0%B4%D0%BF%D0%BE%D0%BB%D0%B0%D0%B3%D0%B0%D0%B5%D0%BC%D1%8B%D0%B9%20%D0%B4%D0%BE%D1%81%D1%82%D1%83%D0%BF%20%D0%BA%20%D0%B0%D0%B4%D0%BC%D0%B8%D0%BD%D0%BA%D0%B5%20gov.kz&amp;id=63472370d4139ee7ad355edb74012351&amp;msgid=3787fe92e95f60c2e6df08b32e8cac3fa24f4a41</p>
ricardo :mastodon:<p>24 <a href="https://fosstodon.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> Commands for Network Security and Scanning</p><p><a href="https://www.tecmint.com/nmap-command-examples/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tecmint.com/nmap-command-examp</span><span class="invisible">les/</span></a></p>
Ducky Fella<p><a href="https://cupoftea.social/tags/Fing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fing</span></a> used to be a decent app for doing quick network scans from a mobile device. I’ve watched them gradually enshittify over the past decade. They are now charging £7.99 a month for what is essentially just <a href="https://cupoftea.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a>. Disappointing but not surprising anymore.</p>
Cyberkid<p>🛡️ Nmap, Metasploit, Hydra, Mimikatz, Netcat: Overview &amp; Uses 🔍</p><p><a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> 🛡️ <a href="https://defcon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a> 🎯 <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> 💻 <a href="https://defcon.social/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> 🔍 <a href="https://defcon.social/tags/Metasploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Metasploit</span></a> <a href="https://defcon.social/tags/Hydra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hydra</span></a> 🔑 <a href="https://defcon.social/tags/Netcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netcat</span></a> 🌐</p>
utzer [Pleroma]Mag mir jemand helfen eine <a class="hashtag" href="https://soc.utzer.de/tag/sip" rel="nofollow noopener noreferrer" target="_blank">#SIP</a> Problem mit <a class="hashtag" href="https://soc.utzer.de/tag/fonial" rel="nofollow noopener noreferrer" target="_blank">#Fonial</a> im <a class="hashtag" href="https://soc.utzer.de/tag/mobilfunknetz" rel="nofollow noopener noreferrer" target="_blank">#Mobilfunknetz</a> der Deutschen <a class="hashtag" href="https://soc.utzer.de/tag/telekom" rel="nofollow noopener noreferrer" target="_blank">#Telekom</a> zu diagnostizieren. Es deutet vieles auf ein Problem im Netz der Telekom hin und die Telekom sagt natürlich "das kann nicht sein". <br>Das Problem tritt bei zwei APNs auf, bei einem dritten nicht, alles öffentliche APNs der Telekom. <br><br>Was ich brauche ist das generelle Verständnis des SIP Verbindungsaufbau, damit ich mit <a class="hashtag" href="https://soc.utzer.de/tag/nmap" rel="nofollow noopener noreferrer" target="_blank">#nmap</a> (oder so) mal nachvollziehen kann was da passiert, ich kann auch einen SIP Client auf Linux installieren und <a class="hashtag" href="https://soc.utzer.de/tag/wireshark" rel="nofollow noopener noreferrer" target="_blank">#Wireshark</a> mitlaufen lassen. <br><br>Also wenn jemand was beisteuern kann ich würde mich freuen.
Jan ☕🎼🎹☁️🏋️‍♂️<p>Whoo, submitted my first <a href="https://fedi.kcore.org/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://fedi.kcore.org/tags/fingerprint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fingerprint</span></a> ;)</p>
nickbearded<p>It’s 1 AM—what better time to test the new BashCore update? 😏🔥</p><p>🔹 Lightweight, fast, and minimal.<br>🔹 Even more stable and optimized.<br>🔹 Now with GPM for mouse support in the console! 🖱️<br>🔹 Coming very soon!</p><p>Meanwhile, a little totally legal test on scanme.nmap.org… why not? 🤣</p><p><a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BashCore</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a></p>
OSTechNix<p>How To Check And Secure Open Ports In Linux <a href="https://floss.social/tags/Linuxnetworking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxnetworking</span></a> <a href="https://floss.social/tags/Linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxsecurity</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxadmin</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxhowto</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a> <a href="https://floss.social/tags/ss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ss</span></a> <a href="https://floss.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> <a href="https://floss.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://floss.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://floss.social/tags/lsof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lsof</span></a> <br><a href="https://ostechnix.com/check-and-secure-open-ports-in-linux/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/check-and-secure</span><span class="invisible">-open-ports-in-linux/</span></a></p>
CX-7<p>🔍 What is Nmap?<br>Nmap (Network Mapper) is an open-source tool for scanning networks, finding devices, detecting open ports, and identifying services &amp; vulnerabilities.</p><p>🚀 Why use Nmap?<br>✅ Maps networks &amp; finds active devices<br>✅ Detects open ports &amp; running services<br>✅ Identifies OS &amp; app versions<br>✅ Helps in security audits &amp; pentesting<br>✅ Supports automation via Nmap Scripting Engine</p><p>💻 Bonus: It even has a GUI version called Zenmap!</p><p><a href="https://mastodon.social/tags/Nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nmap</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a></p>
jhx<p>New video out 👍 <br>Building and patching vsftpd on <a href="https://fosstodon.org/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> :debian: <br>We are altering the reported version number of vsftpd and generate a .deb package along the way for easy installation. 😎 </p><p>Enjoy everyone! 🙂 </p><p>Youtube:<br><a href="https://www.youtube.com/watch?v=XbEIrl6VZSw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=XbEIrl6VZS</span><span class="invisible">w</span></a></p><p>Odysee:<br><a href="https://odysee.com/@YetanotherSysAdmin:0/Compiling-and-patching-vsftpd-on-Debian:9" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">odysee.com/@YetanotherSysAdmin</span><span class="invisible">:0/Compiling-and-patching-vsftpd-on-Debian:9</span></a></p><p><a href="https://fosstodon.org/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <a href="https://fosstodon.org/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://fosstodon.org/tags/package" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>package</span></a> <a href="https://fosstodon.org/tags/compiling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compiling</span></a> <a href="https://fosstodon.org/tags/source" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>source</span></a> <a href="https://fosstodon.org/tags/vsftpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vsftpd</span></a> <a href="https://fosstodon.org/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a></p>
Alexandre Dulaunoy<p>New nmap nse script for vulnerability-lookup</p><p><a href="https://github.com/nmap/nmap/pull/2995" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/nmap/nmap/pull/2995</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://infosec.exchange/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a></p>
Odot of RVA<p>Tool 1: Nmap (Network Mapper)</p><p><a href="https://nmap.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nmap.org/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://paquita.masto.host/@microblogc" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>microblogc</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nixCraft</span></a></span> nowadays you just use <a href="https://infosec.space/tags/Shodan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shodan</span></a> for that...</p><ul><li>Or just <a href="https://infosec.space/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> the shit out of your network...</li></ul>
halil deniz<p>I just published Nmap: A Tool for Network Discovery and Security Auditing </p><p><a href="https://link.medium.com/bnXyDvD3pOb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">link.medium.com/bnXyDvD3pOb</span><span class="invisible"></span></a> </p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
🦠Toxic Flange (Gurjeet)🔬⚱️🌚<p>Well that was a bit of exercise of developing a crappy <a href="https://infosec.exchange/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> script. Still I've learned lots about <a href="https://infosec.exchange/tags/Lua" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lua</span></a> scripting and i could enjoy just doing this for fun. Its wholly unpractical but serves as a good learning platform. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Odot<p>New Blog on Nmap:</p><p><a href="https://www.buymeacoffee.com/odotthecreative/map-that-network-nmap-2983619" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">buymeacoffee.com/odotthecreati</span><span class="invisible">ve/map-that-network-nmap-2983619</span></a></p><p>Hope it helps</p><p><a href="https://mastodon.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://mastodon.social/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.social/tags/networkmapping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networkmapping</span></a> #</p>
Odot<p>Working on some Nmap scans via Termux. Quite interesting what you can do from the smartphone.</p><p>Scanme.nmap.org is the site in scanning by the way. Lol. Open season! Lol. Practice makes perfect over time. </p><p><a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a></p>
🦠Toxic Flange (Gurjeet)🔬⚱️🌚<p>Also if you think about it, the majority of <a href="https://infosec.exchange/tags/tenable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tenable</span></a> <a href="https://infosec.exchange/tags/nessus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nessus</span></a> functionality is based on its ability to log into a remote machine, use the tools on that host (windows: regsitry calls, execute cmd.exe scripts or posh, unix: ssh in run commands built into the host to retrive whatever info it has), and then generate a report. <a href="https://infosec.exchange/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> has the modules <code>libssh2-utility</code> to log you in (check out <code>ssh-run.nse</code>) and smb capabilities (<code>smb-psexec.nse</code>) that allow you to run services commands and the like on Windows. </p><p>Why are people paying thousands in subscription fees ???! </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> c</p>
🦠Toxic Flange (Gurjeet)🔬⚱️🌚<p>You know I never really took a close look at all the capabilities of <a href="https://infosec.exchange/tags/NMAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NMAP</span></a> 's scripting ability til recently and there's enough here to do all the functions of <a href="https://infosec.exchange/tags/tenable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tenable</span></a> <a href="https://infosec.exchange/tags/nessus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nessus</span></a> core. Some creative modules and one could easily duplicate the cli functionality. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
n0kovo 🇩🇰​:anarchy:​:comm:​:terminal:​:vegan:​:debian:​:python:​:tor:​:signal:<p><a href="https://infosec.exchange/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>