Pentest – POFTUT

Category: Pentest

0

What Is A Firewall and How Its Work?

Today Firewall is depicted as the main component of the security and networks. Firewalls provide a lot of different operations and features. In the old days, the firewall was simply used to block or allow some ports and management of the NAT. In these days there are a lot of different threats where the firewall is used to detect and stop these threats. Firewall Features Today modern firewall’s provides a...

0

What is Zenmap and How To Download, Install and Use In Windows, Linux?

Zenmap is an free and open source GUI designed to be used with nmap . Zenmap is multiplatform tool which supports Linux, Ubuntu, Mint, Kali, Fedora, CentOS,.. , Windows, Mac OS X, BSD etc. . nmap is very powerful tool for network scanning and vulnerability discovery but it is completely command line based. Zenmap can be used by novice users to scan network and discover vulnerabilities. Download Windows Windows version can be downloaded...

0

How To Scan Top Ports with Masscan?

masscan is an alternative tool to the popular nmap . Actually masscan provides very less of the nmap but provides some huge adventages. masscan is designed to be fast and performative. nmap have popular feautre named top ports which option is –top-ports to scan specified number of most popular ports. masscan also provides this options too. Nmap Top Ports We will start with scanning top ports in nmap . As stated previously we will use —top-ports option...

0

How To Run and Use Simple HTTP Server In Python2 and Python3?

Python provides different HTTP and related modules in builtin and 3rd party modules. Python also provides some basic HTTP server modules native. In this tutorial we will learn how to run HTTP server in Python2 and Python3. SimpleHTTPServer In Python2 From Commandline We will use SimpleHTTPServer module for Python2. We will just provide the module name the port number we want to run HTTP server from commandline. In this example...

0

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to authenticate. Message is checked against it authenticity with given key by hashing them. Key Key is used to known by...

0

What Is Base64 and How To Encode and Decode Text?

Base64 is an encoding and decoding algorithm. We need encoding of some data in order to prevent storing and transmission problems. For example If we try to transfer binary data it may create and affect some network devices because of its data structures. Base64 is generally used different applications like email and MIME, XML, JSON, URL and HTTP etc. Data Presentation Base64 uses aphabet, numbers and = for encoded data. For...

How To Download and Install Nmap For Windows Operating Systems? 0

How To Download and Install Nmap For Windows Operating Systems?

nmap  is a very popular network scanning tool. Windows operating systems like 7, 10, Server are most used operating systems too. But we know that these two popular things do not meet together in most of the time. nmap  is by default provided by most of the Linux distributions like Fedora, Ubuntu, Kali, Mint, Debian, CentOs, RHEL, etc. Installing it in Windows is a bit harder. In this tutorial, we...

4

How To Scan All TCP and UDP Ports with Nmap?

Nmap is very useful and popular tool used to scan ports. Nmap by default scans most popular 1000 ports. We may need to change the port range and protocol type to all while scanning with nmap. Scan All TCP Ports with Range We can specify the port range with the -p option. As we know TCP port numbers are between 0 and 65535  . We will use -p0-65535 as option in order to...

0

How To Use OpenSSL s_client To Check and Verify SSL/TLS Of HTTPS Webserver?

OpenSSL provides different features and tools for SSL/TLS related operations. s_lient is a tool used to connect, check, list HTTPS, TLS/SSL related information. Simply we can check remote TLS/SSL connection with s_client . In this tutorials we will look different use cases of s_client . Check TLS/SSL Of Website The basic and most popular use case for s_client is just connecting remote TLS/SSL website. We will provide the web site with the HTTPS port...

0

Display, Add and Remove Arp Information with Windows Arp Command

Arp is a protocol used to determine host IP addresses from their physical MAC or Ethernet address. Windows operating systems provides arp command in order to manage arp related information. With arp command we can display, add and remove arp entries in ARP cache. ARP Cache ARP and IP entries are hold  in ARP cache every time we want to communicate over network and need IP address we look to the ARP...

Enjoy this blog? Please spread the word :)