Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Juicy

Missing scripts in NMAP

Posted on April 7, 2016 by Juicy

I’ve just installed the latest Kali and updated everything. nmap is version 7.12.

I’ve noticed that smb-check-vulns.nse is not present. As far as I can tell, most other scripts I use are there but I’ve got an exam coming up and I don’t w… Continue reading Missing scripts in NMAP→

Posted in nmap

NMAP host discovery reporting discrepant results between NAT and Bridged mode

Posted on March 6, 2016 by Juicy

I figured this would be the most relevant place to ask this question. I’m using a Kali VM to run some network scans. The results are different depending on whether my network interface is bridged or NATed.

Running this scan nmap -sn 192.1… Continue reading NMAP host discovery reporting discrepant results between NAT and Bridged mode→

Posted in host-discovery, nmap

Exploiting through a filtered port

Posted on March 10, 2014 by Juicy

I’m doing some pentesting against a machine the lecturer set up in the lab. NMAP shows port 445 to be filtered and Nessus confirms the ms08_067 vulnerability is present on that machine.

I tried running Metasploit against it … Continue reading Exploiting through a filtered port→

Posted in Exploit, Metasploit, ports

Exploiting through a filtered port

Posted on March 10, 2014 by Juicy

I’m doing some pentesting against a machine the lecturer set up in the lab. NMAP shows port 445 to be filtered and Nessus confirms the ms08_067 vulnerability is present on that machine.

I tried running Metasploit against it … Continue reading Exploiting through a filtered port→

Posted in Exploit, Metasploit, ports

What patterns does a signature based anti-virus look for?

Posted on February 11, 2014 by Juicy

I’m working on a uni project where I will attempt to create a malware that uses some form of genetic algorithm to “evolve” itself out of being recognized by a signature based AV software.

For this I will need to code my own … Continue reading What patterns does a signature based anti-virus look for?→

Posted in antivirus, malware

What patterns does a signature based anti-virus look for?

Posted on February 11, 2014 by Juicy

I’m working on a uni project where I will attempt to create a malware that uses some form of genetic algorithm to “evolve” itself out of being recognized by a signature based AV software.

For this I will need to code my own … Continue reading What patterns does a signature based anti-virus look for?→

Posted in antivirus, malware

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • The Microsoft Surface Pro is nearly 40% off at Best Buy – and we highly recommend it April 24, 2026
  • In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device April 24, 2026
  • TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware April 24, 2026
  • I tried ChatGPT Images 2.0: A fun, huge leap – and surprisingly useful for real work April 24, 2026
  • Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents April 24, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up