Nmap
Best Practices for Securing Open Ports Identified by Nmap
While open ports are necessary for communication, they can serve as entry points for cyber threats if not properly secured. Essentially, open ports are not security threats in themselves, but unsecured open ...
OpenSSH regreSSHion Vulnerability
…and…How AI Can Revolutionize Code and Regression Testing Introduction Artificial Intelligence (AI) is transforming numerous industries, and software development is no exception. One of the critical areas where AI can make a ...
Asset Discovery with Chris Kirsch Co-Founder at Rumble
Chris Kirsch co-founder and chief revenue officer at Rumble joins us in our June monthly show to talk about how Rumble is solving the problem of asset discovery. You also get to ...

Converting NMAP XML Files to HTML with xsltproc
NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit. This enables the scan data to be parsed by other tools ...

Converting NMAP XML Files to HTML with xsltproc
NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit. This enables the scan data to be parsed by other tools ...

Thinking of a Cybersecurity Career? Read This
Thousand of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills. Here's a look ...

Nmap for Beginners – Part 2
The first parameter to add is the type of scan, and there are many. The most common are -sS for Syn scan and -sT for a Connect scan. A syn scan is ...
Video: Burp-less Hacking – Learning Web Application Pentesting on a Budget
See FOSS Tools for WebApp Pentests! Video and Slide Deck from EH-Net Live! December 2019 Web Application Penetration Testing, or webapp pentesting, to put it simply is poking at the code behind ...
Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget
Register Now to See a Full WebApp Pentest w/ FOSS! If there is one tool that a professional performing a web application penetration test or bug bounty hunting should buy, it’s Burp ...
Scanning for Responsive Nodes
I want to check which nodes are responding to pings (which is allowed), and if they will also respond to snmp (which they shouldn’t). First I need to see all the nodes ...