whois, nslookup, recon-ng are Active or Passive recon? [closed]
Is whois, nslookup, recon-ng a form of Active reconnaissance or Passive reconnaissance?
Continue reading whois, nslookup, recon-ng are Active or Passive recon? [closed]
Collaborate Disseminate
Is whois, nslookup, recon-ng a form of Active reconnaissance or Passive reconnaissance?
Continue reading whois, nslookup, recon-ng are Active or Passive recon? [closed]
Is this output from nmap ok? Or not secure and exploitable?
21/tcp open ftp ProFTPD (requires SSL)
22/tcp open ssh (protocol 2.0)
25/tcp open smtp
80/tcp open http Apache httpd
110/tcp open pop3 Courier po… Continue reading Need Feedback for NMAP Scan output
I am new to ethical hacking and I often find myself really confused when evaluating and determining the danger level of information that can be found regarding a domain when performing OSINT. I’m not sure what information an ethical hacker… Continue reading Determining threat when performing OSINT
Port scanning is very popular in beginners. That’s because it is quite easy. All you need to do is run one Nmap command and you get some info and all the open ports. But what can we make of them and how? That’s a question which either has … Continue reading What can be done with open ports [duplicate]
I am using python to create a security testbed program. There is a recorded audio file and in it attacking is happening. I am able to read the audio file and got a result in digital. The audio file is stereotyped and it has two channels le… Continue reading how to detect a threat in a signal processing?
My child just obtained their driver’s license last week and while they still had their permit, I added them to my insurance policy. I forgot to update them as having a real license after they passed the test, but fear not, my insurance co… Continue reading How does a car insurance company obtain license information [closed]
I was reading through Facebook’s data policy which also encompasses instagram, messenger, etc. It looked like the usual all encompassing breach of privacy I have come to expect from the company but one section in particular jumped out at m… Continue reading Does the device attributes section of Facebook’s data policy entitle it to private files on my device?
I was reading through Facebook’s data policy which also encompasses instagram, messenger, etc. It looked like the usual all encompassing breach of privacy I have come to expect from the company but one section in particular jumped out at m… Continue reading Does the device attributes section of Facebook’s data policy entitle it to private files on my device?
I read somewhere that Truecaller had its database open. Is it still open to the public, or can someone with enough time get access to it and see who I have on my contact list?
Continue reading Can someone see my contact list because of Truecaller? [closed]
I am trying to onboard CTI feed for our SIEM. As part of the procurement process, I need to make sure that there are certain SLA`s which should be included in the contract terms for accountability of the managedĀ service. Any thoughts whic… Continue reading SLA for Managed Services (CTI)