Nmap byte size series: NSE examplesThis is a powerful and flexible feature that lets you write your scripts and share these scripts with other users for network and…Oct 9, 2024Oct 9, 2024
Nmap byte size series: basic firewall evasion techniquesIn almost all computer infrastructures the most common solution for protection is the Firewall and IDS systems, both are widely used for…Oct 7, 2024Oct 7, 2024
Nmap byte size series: Host discovery and service/OS detectionFor effective scans, you’ll need to create some filtering to avoid doing some extra work and being the most effective possible. So, you may…Oct 2, 2024Oct 2, 2024
Nmap byte size series: the TCP and Port scanning relationshipIf you aren’t familiar with computer ports, you’ll need some computer science or any tech-related background to continue, still, computer…Sep 3, 2024Sep 3, 2024
Nmap byte size series: A general introductory approachThere’s no debate on this and I’m pretty sure that most tech people and the infosec community will agree on this: Nmap is considered the…Aug 29, 2024Aug 29, 2024
Published inNerd For TechPractical Forensic-Response Concepts 101The forensic applied to computers (informatics) references any kind of scientific and research method that can be used for digital evidence…May 14, 2024May 14, 2024
Published inNerd For TechForensic response for smartphones 101Let’s start with a quick network background.Apr 25, 2024Apr 25, 2024
Published inNerd For TechFirewall filtering overviewTo introduce firewalls, we need to start this post by discussing networks, the backbone component of them all.Apr 12, 2024Apr 12, 2024
Published inNerd For TechA brief overview of Ctypes in Python for WindowsAre you familiar with Python and C language? Check this resource.Apr 4, 2024Apr 4, 2024
Published inFAUN — Developer Community 🐾GeoIP lookups with NginxAssuming you already had a fresh installation of a Linux OS and the Nginx server (if not, check this post), we can perform server-side…Mar 26, 2024Mar 26, 2024