Category Archives: Tools
Common nmap commands during Pentest

1. Discover live hosts in a subnet nmap -n -sn -PE -oA live_hosts 192.168.1.0/24nmap -n -sn -PE -oA live_hosts 192.168.1.0/24…

Import Nmap results into Nessus

Download the Nmap XML Import plugin from http://tenablesecurity.com/documentation/nmapxml.nasl Copy the nmapxml.nasl file into the Nessus plugins directory C:\ProgramData\Tenable\Nessus\nessus\plugins Run a…

Social-Engineer Toolkit on Windows

To install the latest Social-Engineer Toolkit (SET) release follow these steps under Windows: 1. Download and install GitHub for Windows….

Scan the integrity of all protected Windows 7 system files

Open an elevated command prompt. To do this, click Start, click All Programs, click Accessories, right-click Command Prompt, and then…

Inspect cached DNS requests for any suspicious activity

You can dump the cached DNS requests and examine each entry for any strange or suspicious request. All you need…

Sniffing VoIP Network

You can sniff in VoIP traffic, like you would do with any other network protocol. We are going to use…

Top 5 Free Port Scanners

1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many…

Network Stealth Scans

Nmap offers the following options, which we can use them to remain stealthy while we are scanning our network. The…

Sniffing email passwords with Wireshark

> Open Wireshark.   > Select an interface and start capturing in promiscuous mode.   > To capture credentials from…

IP to Country

Open your Backtrack or any linux distro and execute: whois -h whois.arin.net x.y.z.q | grep Country:whois -h whois.arin.net x.y.z.q |…

Next Page