enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Nmap - Wikipedia

    en.wikipedia.org/wiki/Nmap

    Nmap is a tool that can be used to discover services running on Internet connected systems. Like any tool, it could potentially be used for black hat hacking , [ 37 ] as a precursor to attempts to gain unauthorized access to computer systems.

  3. ZMap (software) - Wikipedia

    en.wikipedia.org/wiki/ZMap_(software)

    ZMap (software) ZMap is a free and open-source security scanner that was developed as a faster alternative to Nmap. ZMap was designed for information security research and can be used for both white hat and black hat purposes. The tool is able to discover vulnerabilities and their impact, and detect affected IoT devices.

  4. hping - Wikipedia

    en.wikipedia.org/wiki/Hping

    hping is an open-source packet generator and analyzer for the TCP/IP protocol created by Salvatore Sanfilippo (also known as Antirez). It is one of the common tools used for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner.

  5. netcat - Wikipedia

    en.wikipedia.org/wiki/Netcat

    netcat. netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation ...

  6. TCP/IP stack fingerprinting - Wikipedia

    en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting

    TCP/IP stack fingerprinting. Passive OS Fingerprinting method and diagram. TCP/IP stack fingerprinting is the remote detection of the characteristics of a TCP/IP stack implementation. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.

  7. Metasploit - Wikipedia

    en.wikipedia.org/wiki/Metasploit

    Metasploit. The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company, Rapid7. Its best-known sub-project is the open-source [3] Metasploit Framework, a tool for ...

  8. Network mapping - Wikipedia

    en.wikipedia.org/wiki/Network_mapping

    Network mapping. A visual representation of a part of the Internet. Network mapping is the study of the physical connectivity of networks e.g. the Internet. Network mapping discovers the devices on the network and their connectivity. It is not to be confused with network discovery or network enumeration which discovers devices on the network ...

  9. Port scanner - Wikipedia

    en.wikipedia.org/wiki/Port_scanner

    Port scanner. A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scan or portscan is a process that sends client ...