David E Lares SNmap byte size series: Host discovery and service/OS detectionFor effective scans, you’ll need to create some filtering to avoid doing some extra work and being the most effective possible. So, you may…4d ago4d ago
David E Lares SNmap byte size series: the TCP and Port scanning relationshipIf you aren’t familiar with computer ports, you’ll need some computer science or any tech-related background to continue, still, computer…Sep 3Sep 3
David E Lares SNmap byte size series: A general introductory approachThere’s no debate on this and I’m pretty sure that most tech people and the infosec community will agree on this: Nmap is considered the…Aug 29Aug 29
David E Lares SinNerd For TechPractical Forensic-Response Concepts 101The forensic applied to computers (informatics) references any kind of scientific and research method that can be used for digital evidence…May 14May 14
David E Lares SinNerd For TechForensic response for smartphones 101Let’s start with a quick network background.Apr 25Apr 25
David E Lares SinNerd For TechFirewall filtering overviewTo introduce firewalls, we need to start this post by discussing networks, the backbone component of them all.Apr 12Apr 12
David E Lares SinNerd For TechA brief overview of Ctypes in Python for WindowsAre you familiar with Python and C language? Check this resource.Apr 4Apr 4
David E Lares SinFAUN — Developer Community 🐾GeoIP lookups with NginxAssuming you already had a fresh installation of a Linux OS and the Nginx server (if not, check this post), we can perform server-side…Mar 26Mar 26
David E Lares SinNerd For TechDMZ networks in a nutshellIt’s pretty much common to have enterprise networks that require some time to expose services on the Internet, not only to expose them but…Mar 21Mar 21
David E Lares SinSystem WeaknessAndroid Malware Analysis OverviewThe smartphone world is huge and this carries a lot of benefits but also vulnerabilities and risks. To achieve effective testing, we can…Mar 4Mar 4