User contributions for DCiklusic
Jump to navigation
Jump to search
- 16:50, 5 February 2023 diff hist +125 Penetration Testing →References
- 16:49, 5 February 2023 diff hist +5 Penetration Testing →Pre-engagement Interactions
- 16:49, 5 February 2023 diff hist 0 Penetration Testing →Pre-engagement Interactions
- 16:49, 5 February 2023 diff hist −1 Penetration Testing →Intelligence Gathering
- 16:48, 5 February 2023 diff hist −184 Penetration Testing
- 16:48, 5 February 2023 diff hist +7,157 N Penetration Testing Created page with "== Summary == The Penetration Testing Execution Standard (PTES) defines penetration testing in 7 phases. The PTES technical guidelines contain, in particular, practical suggestions for test procedures and recommendations for security tools. == Requirements == * Operating system: Ubuntu 18.04 bionic amd64 * Packages: git emacs In order to complete these steps, you must have followed Some Other Documentation before. == The seven Phases == === Pre-engagement Inte..."
- 19:35, 27 January 2023 diff hist −38 Nmap →References
- 18:00, 27 January 2023 diff hist −19 Nmap
- 18:00, 27 January 2023 diff hist +29 Nmap →Nmap Script Engine
- 17:59, 27 January 2023 diff hist 0 N File:Nmap script vulners.png current
- 17:59, 27 January 2023 diff hist +37 Nmap →Nmap Script Engine
- 17:56, 27 January 2023 diff hist −2 Nmap →Description
- 17:56, 27 January 2023 diff hist +45 Nmap →Description
- 17:55, 27 January 2023 diff hist 0 N File:Nmap output on specific host.png current
- 17:53, 27 January 2023 diff hist +968 Nmap →Nmap Script Engine
- 17:52, 27 January 2023 diff hist −264 m Nmap →Nmap Script Engine
- 17:50, 27 January 2023 diff hist +966 Nmap →Nmap Script Engine
- 17:49, 27 January 2023 diff hist −1 Nmap →Nmap Script Engine
- 17:48, 27 January 2023 diff hist −10 Nmap →• Brute-forcing: NSE scripts can be used to perform brute-force attacks on services such as SSH or Telnet.
- 17:48, 27 January 2023 diff hist −7 Nmap →• Information gathering: NSE scripts can gather additional information about a host or service, such as the type of web server running or the version of the operating system.
- 17:48, 27 January 2023 diff hist −9 Nmap →• Vulnerability detection: NSE scripts can be used to detect known vulnerabilities in a host or service.
- 17:48, 27 January 2023 diff hist −1 Nmap →Description
- 17:48, 27 January 2023 diff hist −5 Nmap →Description
- 17:47, 27 January 2023 diff hist +17 Nmap →Nmap Script Engine
- 17:47, 27 January 2023 diff hist +2,665 N Nmap Created page with "== Summary == Nmap (Network Mapper) is a free and open-source tool for network discovery and security auditing. Nmap can be used to identify hosts and services on a computer network, thus creating a “map” of the network. It can also be used to detect open ports and services, operating systems, and even live hosts on a network. == Description == Nmap uses various techniques such as IP address sweep, TCP and UDP port scans, and other methods to identify hosts and s..."
- 19:22, 8 January 2023 diff hist +174 Log4j →References
- 19:20, 8 January 2023 diff hist −3 Log4j
- 19:19, 8 January 2023 diff hist +1 Log4j →Execution
- 19:19, 8 January 2023 diff hist +3,621 N Log4j Created page with "== Summary == Log4Shell is a software vulnerability in Apache Log4j2, a popular Java library for logging error messages in applications. It was considered a zero-day vulnerability because malicious actors likely knew about and exploited it before any experts had the chance. The vulnerability enables a remote attacker to gain control over a string and trick the application into requesting and executing malicious code under the attacker's control. As a result, attackers..."
- 19:12, 8 January 2023 diff hist 0 N File:Log4j.jpg current