I will break down the options for each command. Command 1: sudo nmap -sn 10.0.0.* -oG – | awk ‘/Up$/{print $2}’ –discovery-ignore-rst Summary: This command is used to build a list of “up” machines on a specific subnet (in this case, 10.0.0.*). Breakdown: sudo nmap -sn 10.0.0.*: Performs a simple ping scan (-sn) on the Read More …
Tag: hacker talk
Cloud Penetration Testing for Traditional Hackers | Nick Frichette
An introduction to cloud penetration testing on AWS, tailored for those familiar with traditional web and network penetration testing. It highlights critical areas and potential pitfalls in AWS security, using practical attack scenarios to illustrate key concepts. The discussion covers common vulnerabilities like leaky S3 buckets and misconfigured resource-based policies, emphasizing the importance of securing Read More …
Conference Video – A deep look into a Chinese advanced attack
These are the videos from Derbycon 2015: