Search the Community
Showing results for tags 'information gathering'.
-
Found an old md81s Wi-Fi p2p camera but the I'd tag has faded enough where the scanner can't scan it or visually read faded codes of camera, stressful aggravation HELPPPPPPPP.
-
I looked for threads on here for help reducing or semi-eliminating my digital footprint - to no avail. So i am posting this to ask how to reduce my digital footprint when i have many different accounts over the years, remembered and forgotten. I know i need to go back and try and individually remove them but i wanted to know if there was an easier way to do this. is there? or how do you 'measure' your digital footprint to know how public or private you are to the internet? if anyone can give me some tips or advice outside of 'go back and individually delete everything' - it would be very helpful. And perhaps it would help others with this also.
-
Hi all, im undergoing a project to determine which penetration testing tools are better suited for information gathering when using Kali to attack a Metapsloitable 2 machine and a Windows XP SP3 machine. All of this research and testing is focusing on users with limited knowledge who may be just starting out in terms of testing tools. The three tools that were chosen to compare were Nmap, Unicornscan and Dmitry and the returned results were as follows: Metasploitable 2 Windows XP Nmap 23 3 Dmitry 8 2 Unicornscan 20 3 The results above showed the open ports that were found by scanning the IP address of the target machine as well as services that are running and also the version. So in my mind Nmap looks to be the better option but with the limited knowledge that i have would i be wrong to say Nmap is the better tool for the job or do the others offer other benefits which i am not seeing? Any feedback would be most welcome.
- 1 reply
-
- penetration
- testing
-
(and 6 more)
Tagged with: