Find Vulnerability Of Any Target To Hack With An Open Source Tool
Có thể bạn quan tâm
- Telegram
Scanning is the initial phase of pentesting. Security researchers/ pentesters are very well aware of this phase. This is the phase where pentester spend most of the time. As this phase gives many information to pentester to prepare for further pentesting phases. There are many automated and manual tools which are used in pentesting. But pentester always start with manual scanning as it makes more things clear, as per experience of ethical hacking experts. Today we will show you how pentester/ security researcher can use nmap scripts to search vulnerability.
Nmap is an open source tool design to scan/ check open ports of web/ mobile applications. Nmap uses raw IP packets to scan given URL/ host. Nmap gathers services, open ports, application server, operating system OS version. All type of services which are associated with web server. Nmap do give many options like using scripts to scan for the target. Nmap scripting uses whois to scan for the target. According to ethical hacking experts of International Institute of Cyber Security, you can also write or share your own nmap script. We will show you how to use an external script. This nmap sripts has tested on Kali Linux 2018.4
- Clone script, type git clone https://github.com/OCSAF/freevulnsearch.git
- Then type cd freevulnsearch
- Type ls
- cp freevulnsearch.nse to scripting location. For that type cp freevulnsearch.nse /usr/share/nmap/scripts
- Then type locate *.nse
- This query will list all the scripts that are available in nmap scritpting engine.
- Then type nmap -sV –script freevulnsearch certified.com
- -sV, s will spoof the IP address and V will scan the target in verbosely.
- –freevulnsearch is the script used to scan the target.
- certified.com is the target.
- After executing above query, nmap script has found vulnerabilities that can be used in further attacks.
- This query shows the CVE list which are most common vulnerabilities and can be used in creating flaws in the web application.
- Type nmap -sV –script broadcast-dhcp-discover certified.com
- -sV s will spoof the IP address and V will scan the target in verbosely.
- –script broadcast-dhcp-discover will obtain local parameters without allocating new address.
- certified.com is the target.
- The above query has obtained rDNS record which shows the open ports and services. This information can be used in further hacking activities.
- The above query shows listed version with each ports.
- Type nmap –script http-security-headers certified.com
- –script http-security-headers is used to check http response security header.
- certified.com is the target URL.
- After executing above query, https security header has shown that hosts is not configured in https server.
- HSTS is the strict transport authority that helps websites from protocol downgrade attacks. The above information can also be used in further hacking activities.
- Use can also use nmap dos script to launch dos attacks
- Telegram
Forget Metasploit: Inside Predator’s Zero-Click Advertising-Driven Phone Hacking System
How Hackers Intercept Mobile OTP and Calls Without ‘Hacking’ — The Shocking Power of SIM Boxes
13 Insanely Easy Techniques to Hack & Exploit Agentic AI Browsers
How to Use Google’s OSS Rebuild: A New Open Source Software Supply Chain Security Tool
Phishing 2.0: AI Tools Now Build Fake Login Pages That Fool Even Experts
How TokenBreak Technique Hacks OpenAI, Anthropic, and Gemini AI Filters — Step-by-Step Tutorial
Comparing Top 8 AI Code Assistants: Productivity Miracle or Security Nightmare. Can You Patent AI Code Based App?
No Login Required: How Hackers Hijack Your System with Just One Keystroke: utilman.exe Exploit Explained
Jim GillCyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator. He is a cyber-security researcher with over 25 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked with Google and Citrix in development of cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.
2019-02-13Latest Videos
How Hackers Intercept Mobile OTP and Calls Without ‘Hacking’ — The Shocking Power of SIM Boxes
TunnelCrack: Two serious vulnerabilities in VPNs discovered, had been dormant since 1996
How to easily hack TP-Link Archer AX21 Wi-Fi router
US Govt wants new label on secure IoT devices or wants to discourage use of Chinese IoT gadgets
24,649,096,027 (24.65 billion) account usernames and passwords have been leaked by cyber criminals till now in 2022
View AllVulnerabilities
This Hidden Comet/Atlas AI Browser Flaw That Hackers Are Exploiting
How to Use Google’s OSS Rebuild: A New Open Source Software Supply Chain Security Tool
MFA? Irrelevant. CitrixBleed 2 Lets Hackers Take Over Without Logging In
MotW Bypassed: Zero Warning, Full Control – New WinRAR Flaw Silently Bypasses Windows Security
New Vulnerability in GCP Cloud Run Shows Why Least Privilege Isn’t Enough
View AllTutorials
Forget Metasploit: Inside Predator’s Zero-Click Advertising-Driven Phone Hacking System
How Hackers Intercept Mobile OTP and Calls Without ‘Hacking’ — The Shocking Power of SIM Boxes
13 Insanely Easy Techniques to Hack & Exploit Agentic AI Browsers
How to Use Google’s OSS Rebuild: A New Open Source Software Supply Chain Security Tool
Phishing 2.0: AI Tools Now Build Fake Login Pages That Fool Even Experts
How TokenBreak Technique Hacks OpenAI, Anthropic, and Gemini AI Filters — Step-by-Step Tutorial
Comparing Top 8 AI Code Assistants: Productivity Miracle or Security Nightmare. Can You Patent AI Code Based App?
No Login Required: How Hackers Hijack Your System with Just One Keystroke: utilman.exe Exploit Explained
How to Send DKIM-Signed, 100% Legit Phishing Emails — Straight from Google That Bypass Everything
A Malware That EDR Can’t See?If You Rely on Antivirus for Protection, Read This Before It’s Too Late!
View AllMalware
Live Malware Code Mutation: How AI Generates Evasive Malware
Backdooring ATMs via Bootloader? These Hackers Showed It’s Still Possible in 2025”
How Lynx Ransomware Extorts Millions from U.S. Companies
A Malware That EDR Can’t See?If You Rely on Antivirus for Protection, Read This Before It’s Too Late!
Top 2 Malicious Python Packages You Must Avoid! Zebo-0.1.0 & Cometlogger-0.1
View AllCyber Security Channel
How to easily hack TP-Link Archer AX21 Wi-Fi router
US Govt wants new label on secure IoT devices or wants to discourage use of Chinese IoT gadgets
24,649,096,027 (24.65 billion) account usernames and passwords have been leaked by cyber criminals till now in 2022
- YouTube
- Telegram
- Foursquare
Từ khóa » Http-alt 8000 Exploit
-
Port 8000 (tcp/udp) :: SpeedGuide
-
All That Port 8000 Traffic This Week! Yeah, That's Satori Looking For ...
-
HackTheBox – Luke | InfoSec @ Rm-it
-
Enumerate Applications On Webserver - OWASP Foundation
-
RFC 7838 - HTTP Alternative Services
-
TCP Port 8000 Activity To The Internet | SIEM Guide [7.8] - Elastic
-
Alt-N WebAdmin USER Buffer Overflow - Rapid7
-
Scanner HTTP Auxiliary Modules - Metasploit Unleashed
-
Common Ports/services And How To Use Them · CTF
-
HTB: Devzat - 0xdf Hacks Stuff - GitLab
-
HTTP Alternate Services - IETF Tools
-
RFC 7838 - HTTP Alternative Services - IETF Tools
-
Remote