Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Concepts, Types, and Phases of Hacking A hacker is someone who is intelligent enough to use various tools and techniques to gain unauthorized access to a system in order to steal information such as usernames, passwords, financial information, credit card information, business data, and personal information. Hackers are very skilled, capable of creating software, and exploring both hardware and software. Their motives can range from paying people to hack computers to engaging in unlawful activity for enjoyment. Black Hats Hacker with amazing talents who engages in malicious and destructive acts, often known as crackers White hats Security Analyst or individuals with hacking skills using them for defensive purpose Gray Hats Gray Hats are those work for both offensively and defensively Suicide hackers Suicide hackers are those who aim for destruction without worrying about punishment. Script Kiddies Unskilled hackers, hacking and compromising systems using tools are scrip...
Comments
Post a Comment