Is there a tool that scan a network for a specifc keyword on the devices within that network? [closed]
Is there such tool that can do this? Can it scan all devices to find a certain keyword and let me know on which device it is?
Collaborate Disseminate
Is there such tool that can do this? Can it scan all devices to find a certain keyword and let me know on which device it is?
I’m currently performing a full system scan with clamscan and found the following message:
/usr/lib/pinta/Clipper.dll: Win.Trojan.Clipper-9942182-0 FOUND
I went online and couldn’t find any reference to this type of detection, so I’m star… Continue reading Clamscan: Infected files found in Pinta
I’m currently performing a full system scan with clamscan and found the following message:
/usr/lib/pinta/Clipper.dll: Win.Trojan.Clipper-9942182-0 FOUND
I went online and couldn’t find any reference to this type of detection, so I’m star… Continue reading Clamscan: Infected files found in Pinta
I am a university student currently trying to demonstrate exploitation of the SMBGhost Vulnerability on Windows 10 (Version: 1903, Build Number: 18362.356). I need to provide evidence that the vulnerability exists. However when using Nessu… Continue reading Scanning for SMBGhost vulnerability
I did some port scanning of the local network, as a bit of security due diligence, expecting the first 1000 to be stealthed. However, the results are mixed, when running the scan with different scanning tools.
ShieldsUP!
https://www.grc.co… Continue reading Mixed results from different port scanners – stealth vs closed
I’m using Tor for so long that I can’t remember! The main reasons to use it are to access some websites while preserving my anonymity (after all that’s the main purpose of Tor) but also to access dangerous resources like command & control servers or sites delivering malicious content. The
The post Tor IP Renewal For The Win appeared first on /dev/random.
How reliable is a mathematical model of a human fingerprint for identification?
I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require storing actual biometric data. Storing the … Continue reading How reliable is a mathematical model of a human fingerprint for identification?
From time to time, my router starts to scan ports on all the connected devices. I have an internal RPi server which I restricted its access to the internet from the router. I checked the "/var/log/auth.log" on the RPi and many ss… Continue reading Router scanning ports on all connected devices
We need to find port on a server and read info from this port. If we will try to use nmap here – we will be banned. Because iptables config, that blocks scans. What nmap flags can we use for finding this port and not be banned?
first port … Continue reading Scan nmap through iptables restrictions [closed]
I have a vulnerable test site up that runs PHP.
How can an attacker identify that PHP is used?
if I type …/add.php the site gives back an error message, although the file is add.php.
If I type …/add the site runs.
Maybe I can inject co… Continue reading How can an attacker identify if a website is using PHP? How about the PHP version?