There are basically two types of Scans -
1. Passive Scan: The attacker cannot be recognized by the target,
it is just like a Smelling.
To monitor the Network Traffic we can use Tcpdump and Wireshark
2. Active Scan: In active scan attacker or pentester can be recognized by the target because it leaves traces that are likely to alert the target or produce evidence against him, it is just like Tasting.
To send packets we can use Nmap, Hping, Scapy , Ping, tracert, etc..
Nmap is (Network Mapper) is a free and open-source powerful utility for network…
Google is clearly the best general-purpose search engine on the Web. But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best?
That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.
But Google is a remarkably powerful tool that can ease and enhance your Internet exploration. Google’s search options go beyond simple keywords, the Web, and even its own programmers. …
Cross-Site Scripting (XSS) is a Code Injection attack executed on the client-side of a Web Application.
HOW DOES IT WORK?
A hacker can inject a malicious code on the website which is then sent either to the victim or to the webserver depending on what kind of cross-site scripting you’re using and when this happens the malicious script is executed either when…