NMAP discovery options

I will break down the options for each command. Command 1: sudo nmap -sn 10.0.0.* -oG – | awk ‘/Up$/{print $2}’ –discovery-ignore-rst Summary: This command is used to build a list of “up” machines on a specific subnet (in this case, 10.0.0.*). Breakdown: sudo nmap -sn 10.0.0.*: Performs a simple ping scan (-sn) on the Read More …

Cloud Penetration Testing for Traditional Hackers | Nick Frichette

An introduction to cloud penetration testing on AWS, tailored for those familiar with traditional web and network penetration testing. It highlights critical areas and potential pitfalls in AWS security, using practical attack scenarios to illustrate key concepts. The discussion covers common vulnerabilities like leaky S3 buckets and misconfigured resource-based policies, emphasizing the importance of securing Read More …