My Tools
-
Port Full Scan
Effective Service Enumeration In this post we will address one of the tasks that haunts every pentester or red team operator, service enumeration. Its challenging task for every red team operator / pentester, specially when confronted with a Class A network address range for the first time. A typical service enumeration technique is comprised of: Host discovery: Create a list of live hosts (as close to 100%) as possible. Port Scanning: Find the exposed services...… (Read More)
-
Wordlist Prosessor
Happy new year. ( yeah.i know i been busy ) The last year end up been a cool year with a great end, i was speaker at two events with something i been working on for while now password cracking. Every thing started some time ago after googling around about password cracking, that i first shared with my colleagues after a small poc, and since to me everything less then 100% isn’t worth spending time...… (Read More)