Is it possible to scan the top X UDP ports and the top Y (X!=Y) TCP ports in Nmap using a single command?

Given X!=Y, is there any way to scan the top (–top-ports) X TCP ports and the top Y UDP ports using a simple Nmap command?

The –top-ports parameter affects both the TCP and UDP scans (e.g., when -sSU is used).

If exists, … Continue reading Is it possible to scan the top X UDP ports and the top Y (X!=Y) TCP ports in Nmap using a single command?

Is it possible to successfully send a spoofed UDP header with a completely unrelated source IP?

I’ve read that many networks use ingress/egress filtering to eliminate the number of spoofed UDP packets sent and received by their network.

Given that network provides have been much more diligent in restricting the amount … Continue reading Is it possible to successfully send a spoofed UDP header with a completely unrelated source IP?

icmpsh – Simple ICMP Reverse Shell

icmpsh is a simple ICMP reverse shell with a win32 slave and a POSIX-compatible master in C, Perl or Python. The main advantage over the other similar open source tools is that it does not require administrative privileges to run onto the target machine. The tool is clean, easy and portable. The slave (client) runs […]

The post icmpsh…

Read the full post at darknet.org.uk

Continue reading icmpsh – Simple ICMP Reverse Shell

icmpsh – Simple ICMP Reverse Shell

icmpsh is a simple ICMP reverse shell with a win32 slave and a POSIX-compatible master in C, Perl or Python. The main advantage over the other similar open source tools is that it does not require administrative privileges to run onto the target machine. The tool is clean, easy and portable. The slave (client) runs […]

The post icmpsh…

Read the full post at darknet.org.uk

Continue reading icmpsh – Simple ICMP Reverse Shell