enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. ZMap (software) - Wikipedia

    en.wikipedia.org/wiki/ZMap_(software)

    ZMap (software) ZMap is a free and open-source security scanner that was developed as a faster alternative to Nmap. ZMap was designed for information security research and can be used for both white hat and black hat purposes. The tool is able to discover vulnerabilities and their impact, and detect affected IoT devices.

  3. Nmap - Wikipedia

    en.wikipedia.org/wiki/Nmap

    License. NPSL [3] or modified GPLv2 [4] or proprietary. Website. nmap.org. Nmap (Network Mapper) is a network scanner created by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). [5] Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

  4. Port scanner - Wikipedia

    en.wikipedia.org/wiki/Port_scanner

    A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scan or portscan is a process that sends client requests to a ...

  5. Snort (software) - Wikipedia

    en.wikipedia.org/wiki/Snort_(software)

    Snort (software) Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) [ 4 ] created in 1998 by Martin Roesch, founder and former CTO of Sourcefire. [ 5 ][ 6 ] Snort is now developed by Cisco, which purchased Sourcefire in 2013. [ 7 ][ 8 ][ 9 ] In 2009, Snort entered InfoWorld 's Open Source ...

  6. Ettercap (software) - Wikipedia

    en.wikipedia.org/wiki/Ettercap_(software)

    Ettercap is a free and open source network security tool for man-in-the-middle attacks on a LAN. It can be used for computer network protocol analysis and security auditing. It runs on various Unix-like operating systems including Linux, Mac OS X, BSD and Solaris, and on Microsoft Windows. It is capable of intercepting traffic on a network ...

  7. Network mapping - Wikipedia

    en.wikipedia.org/wiki/Network_mapping

    Network mapping. A visual representation of a part of the Internet. Network mapping is the study of the physical connectivity of networks e.g. the Internet. Network mapping discovers the devices on the network and their connectivity. It is not to be confused with network discovery or network enumeration which discovers devices on the network ...

  8. Idle scan - Wikipedia

    en.wikipedia.org/wiki/Idle_scan

    An idle scan is a TCP port scan method for determining what services are open on a target computer [1] without leaving traces pointing back at oneself. This is accomplished by using packet spoofing to impersonate another computer (called a " zombie ") so that the target believes it's being accessed by the zombie.

  9. Nikto (vulnerability scanner) - Wikipedia

    en.wikipedia.org/wiki/Nikto_(vulnerability_scanner)

    Nikto is a free software command-line vulnerability scanner that scans web servers for dangerous files or CGIs, outdated server software and other problems. It performs generic and server type specific checks. It also captures and prints any cookies received. The Nikto code itself is free software, but the data files it uses to drive the ...