What are all the services that are shown in the output of nmap ? Are they safe? [closed]

I am trying to find out all the vulnerabilities associated with my application and data server (both on the same machine). So I’ve decided to run nmap to see all the ports and other information that an invader could gain to attack my serve… Continue reading What are all the services that are shown in the output of nmap ? Are they safe? [closed]

is the UDP or TCP protocol best suited for a so called stealth counter scan for open or closed ports [closed]

I’m working on a project where the program can detect when its being scanned for malicious purposes by checking how many ports are being scanned at the same time and scanning them back using the SYN method for TCP and the IMCP response for… Continue reading is the UDP or TCP protocol best suited for a so called stealth counter scan for open or closed ports [closed]