⚠️ Note: For drives that won’t format, use DiskPart:
Open Command Prompt as admin and type these commands.
diskpartlist disk select disk X (replace X with your drive number) clean create partition primaryformat fs=ntfs quick assignThere are many open-source databases out there like, AbuseIPDB and Cisco Talos Intelligence.
SIEM is short for Security Information and Event Management. It is the software solutions used to monitor a network for unusual or suspicious activity.
An IP address (or Internet Protocol) address can be used as a way of identifying a host on a network for a period of time, where that IP address can then be associated with another device without the IP address changing.
A Media Access Control or (MAC) address is a unique identifiable number given to every device, by it's manufacturer. This acts as an identifier for that specific device itself.
Every device on a network has two (2) identifiers, a IP Address and a Media Access (MAC) Address -- think of this as being similar to a serial number.
pwd (print working directory) to find out exactly where you are in the directly system.
Using Linx cat which is short for concatenate, you can output the contents of files. cat can be used to sometimes retrieve sensitive information like usernames and passwords.
Nmap is short for Network Mapper. It is an open-source Linux command-line tool that scans IP addresses and ports in a network and detects installed applications, services, and OS versions.
Nmap is the most famous scanning tool used by penetration testers. In this article, we will look at some core features of Nmap along with a few useful commands.
Nmap is short for Network Mapper. It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications.
Nmap allows network admins to find which devices are running on their network, discover open ports and services, and detect vulnerabilities.
Gordon Lyon (pseudonym Fyodor) wrote Nmap as a tool to help map an entire network easily and to find its open ports and services.
Nmap has become hugely popular, being featured in movies like The Matrix and the popular series Mr. Robot.
There are a number of reasons why security pros prefer Nmap over other scanning tools.
First, Nmap helps you to quickly map out a network without sophisticated commands or configurations. It also supports simple commands (for example, to check if a host is up) and complex scripting through the Nmap scripting engine.
Other features of Nmap include:
Ability to quickly recognize all the devices including servers, routers, switches, mobile devices, etc on single or multiple networks.
Helps identify services running on a system including web servers, DNS servers, and other common applications. Nmap can also detect application versions with reasonable accuracy to help detect existing vulnerabilities.
Nmap can find information about the operating system running on devices. It can provide detailed information like OS versions, making it easier to plan additional approaches during penetration testing.
During security auditing and vulnerability scanning, you can use Nmap to attack systems using existing scripts from the Nmap Scripting Engine.
Nmap has a graphical user interface called Zenmap. It helps you develop visual mappings of a network for better usability and reporting.