NMAP same destination ip, different scanner interface, different result

I am trying to check the port status of a external IP using NMAP, I am getting different result on different interface to same destination (destination is a public IP).
When NMAP tried from the internal interface 10.204.59.166
localhost2:/… Continue reading NMAP same destination ip, different scanner interface, different result

Nmap scan result "5353/udp open|filtered zeroconf". Can my device be hacked? [migrated]

I scanned my Android phone connected to the WiFi router from within the LAN, using nmap. It returned the following result.
PORT STATE SERVICE

5353/udp open|filtered zeroconf

Does this mean if a hacker can somehow get into my … Continue reading Nmap scan result "5353/udp open|filtered zeroconf". Can my device be hacked? [migrated]

How would you hide yourself whilst conducting a scan on a target network to identify open service ports?

I am working on this question which asks how you would conduct a scan of a target network to identify open service ports without revealing your IP address. It wants details such as IP address obfuscation, requirements to be met to receive … Continue reading How would you hide yourself whilst conducting a scan on a target network to identify open service ports?

Difference Between Exploit Kits Vs. Probing a Network for Vulnerabilities

I don’t understand exactly the difference between websites using exploit kits on visiting users vs. a website server probing a network for vulnerabilities and then exploiting them.
The scenario is where a Windows user visits a malicious we… Continue reading Difference Between Exploit Kits Vs. Probing a Network for Vulnerabilities