Scan Type
There are basically two types of Scans -
1. Passive Scan: The attacker cannot be recognized by the target,
it is just like a Smelling.
To monitor the Network Traffic we can use Tcpdump and Wireshark

2. Active Scan: In active scan attacker or pentester can be recognized by the target because it leaves traces that are likely to alert the target or produce evidence against him, it is just like Tasting.
To send packets we can use Nmap, Hping, Scapy , Ping, tracert, etc..

Nmap
Nmap is (Network Mapper) is a free and open-source powerful utility for network…


Google is clearly the best general-purpose search engine on the Web. But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best?
That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.

But Google is a remarkably powerful tool that can ease and enhance your Internet exploration. Google’s search options go beyond simple keywords, the Web, and even its own programmers. …


Cross-Site Scripting (XSS) is a Code Injection attack executed on the client-side of a Web Application.

  • The attacker injects malicious scripts through the web browser.
  • The malicious script is executed when the victim visits the web page or web server.
  • Steals Cookies, Session tokens, and other sensitive information.
  • Modify the contents of the Website.

HOW DOES IT WORK?

A hacker can inject a malicious code on the website which is then sent either to the victim or to the webserver depending on what kind of cross-site scripting you’re using and when this happens the malicious script is executed either when…

DEVASHISH NAAGAR

Cyber Security Enthusiast

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store