NMap – A Basic Security Audit of Exposed Ports and Services
Learn how to use NMap to do basic scans for open ports. Use additional NMap vulnerability scanning scripts for important security audits.
Brute Force Attacks – Pen Testing Using Hydra and RSMangler
How to use Hyrdra and RSMangler to launch a brute force attack. Penetration testing professionals use these tools for cybersecurity evaluation of a system.
Sort Command – Sort Text / Output on the Linux Command Line
From sorting log file entries to viewing directories ordered by size, the sort command is certainly among the GNU Core Utilities most versatile members. For professional admins and home users alike, sort is a daily tool. This article will examine some common options and use-cases…