Know How

[Know How][bsummary]



Tools and Techniques

[Tools and Techniques][twocolumns]
latest posts

Drawing Network Diagrams

An attacker can more easily determine the topology or architecture of a target network by creating a network diagram. The attacke...

IP Spoofing Countermeasures

IP address spoofing is a hijacking technique in which an attacker obtains a computer's IP address, alters the packet headers...

IDS and Firewall Evasion Techniques

Firewalls and intrusion detection systems (IDS) are examples of security measures designed to keep hackers out of a network. Even...

OS Discovery and Countermeasures

Banner Grabbing or OS fingerprinting is a method to determine the OS running on a remote target system. An attacker uses banner g...

Nmap - Scan Time Reduction Techniques

Nmap, short for Network Mapper is a free and open-source command-line (CLI) tool for network discovery and security assessment. M...

Port Scanning Countermeasures

Administrators often use port scanning techniques to verify the security policies of their networks, whereas attackers use them to identify ...