As a network security professional or system administrator, you know the importance of regular port scans to assess your network’s security posture.Read More »Visualize Your Nmap Scan Results with Nmap Peek for VSCode
Search Results for: nmap
XML format was probably the most commonly used, before JSON took its place. Like almost every programming language Go or Golang, supports the XML format. In case you are here, it means you were stuck in some of those possible ways to unmarshal your XML code into a nice object.Read More »Complete XML Parsing Guide with Golang
In case you are here you know already what WSL2 is and why to use it. For those who don’t know I will just say that it helps you run a Linux distribution inside your Windows operating system.
Most of the penetration tests that I did so far, are Web Applications, since even if it is a thick client application, the functionality of it is heavily based on HTTP communication, using API calls or some times, even just having the mobile view of the website inside a WebView.
Updated: 09/23 – I needed Metasploit Framework for an
msfvenom payload and I was using
Kali Linux as a Virtual Machine, mainly because all the tools are pre-installed there. Running a
Most of you know about about Metasploit, and how powerful this tool can be.I’m running Kali Linux 2.0, installed on a virtual machine.Read More »How to find the OS of a device on the network