Tagged articles
18 articles
Page 1 of 1
Black & White Path
Black & White Path
May 13, 2026 · Information Security

Comprehensive Red Team Information‑Gathering Guide

This article presents a step‑by‑step red‑team information‑gathering methodology covering domain CDN detection, real‑IP extraction, subdomain enumeration, DNS history analysis, SSL certificate probing, host‑IP collision, company‑level queries, and a curated list of open‑source tools and command‑line examples for each phase.

CDN BypassInformation GatheringNetwork Scanning
0 likes · 19 min read
Comprehensive Red Team Information‑Gathering Guide
Selected Java Interview Questions
Selected Java Interview Questions
Apr 9, 2025 · Information Security

Using nmap4j in Java to Scan Services and Retrieve Database Version Information

This article explains how to integrate the nmap4j library into a Java SpringBoot project to perform Nmap scans for service and version detection, retrieve database details, handle both Windows and Linux environments, and process the XML results with Dom4j, providing complete code examples and parameter guidance.

Network Scanningnmap4jservice detection
0 likes · 11 min read
Using nmap4j in Java to Scan Services and Retrieve Database Version Information
Raymond Ops
Raymond Ops
Mar 5, 2025 · Information Security

Essential Kali Linux Penetration Testing Tools and How to Use Them

Explore the most common Kali Linux penetration testing utilities—including Nmap, Metasploit, Hydra, Wireshark, and more—organized by categories such as information gathering, vulnerability exploitation, password cracking, and network monitoring, with brief usage commands and guidance for each tool.

Kali LinuxNetwork Scanningmalware analysis
0 likes · 11 min read
Essential Kali Linux Penetration Testing Tools and How to Use Them
MaGe Linux Operations
MaGe Linux Operations
Jan 30, 2025 · Information Security

Master Linux Account Security: PAM, sudo, GRUB Hardening & Weak Password Detection

This guide details comprehensive Linux security measures, including system account cleanup, password policies, command history limits, terminal auto‑logout, controlled use of the su command via PAM wheel module, PAM authentication fundamentals, sudo configuration, GRUB boot‑parameter protection, weak‑password detection with John the Ripper, and network port scanning techniques.

GRUBNetwork ScanningSudo
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, GRUB Hardening & Weak Password Detection
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Master Nmap: Essential Commands and Scanning Techniques Explained

This guide walks through common Nmap commands, explains key options such as -A, -T4, and -sn, demonstrates host discovery, port and service detection, OS fingerprinting, and provides practical examples with output screenshots to help readers efficiently assess network security.

Network ScanningOS detectionSecurity
0 likes · 15 min read
Master Nmap: Essential Commands and Scanning Techniques Explained
Python Programming Learning Circle
Python Programming Learning Circle
Apr 29, 2024 · Information Security

Why Python Is Ideal for the Cybersecurity Industry and Its Common Applications

The article explains how Python's simplicity, extensive ecosystem, versatility, and strong automation capabilities make it a preferred language for cybersecurity professionals, outlining five key reasons and showcasing typical use cases such as network scanning, penetration testing, malware analysis, security auditing, and tool development.

Network Scanningcybersecurityinformation security
0 likes · 6 min read
Why Python Is Ideal for the Cybersecurity Industry and Its Common Applications
Python Programming Learning Circle
Python Programming Learning Circle
Jun 26, 2021 · Information Security

Security Analysis and Exploitation of a QQ Phishing Website

The article documents a step‑by‑step security investigation of a QQ phishing site, detailing its fake login page, POST endpoint, Python‑based credential flooding, network reconnaissance, port scanning, vulnerability scanning, and discovery of the backend control panel, while discussing the challenges of XSS and brute‑force attacks.

Network ScanningWeb Securityinformation security
0 likes · 7 min read
Security Analysis and Exploitation of a QQ Phishing Website
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2021 · Information Security

Step‑by‑Step Analysis and Exploitation of a QQ Phishing Site

An in‑depth walkthrough demonstrates how to identify, analyze, and attack a QQ phishing website—revealing its URL, POST parameters, using Python to flood it with fake credentials, performing WHOIS, ping, nmap, and w3af scans, uncovering backend details, and discussing mitigation strategies.

Network ScanningPythonWeb Security
0 likes · 7 min read
Step‑by‑Step Analysis and Exploitation of a QQ Phishing Site
Python Crawling & Data Mining
Python Crawling & Data Mining
Feb 1, 2020 · Information Security

How to Detect Hidden Hotel Cameras with Python and Scapy

This guide shows how to use Python's scapy library to send ARP broadcast packets, collect MAC addresses of devices on a hotel Wi‑Fi network, query their manufacturers, and identify potential hidden cameras, providing a practical method for ensuring hotel security.

ARPNetwork ScanningScapy
0 likes · 5 min read
How to Detect Hidden Hotel Cameras with Python and Scapy
Beike Product & Technology
Beike Product & Technology
Aug 15, 2018 · Information Security

Malware Incident Response: Analyzing and Removing a Persistent Windows Trojan

This article details a step‑by‑step incident‑response case study of a Windows internal‑network Trojan that exploited SMB port 445, describing how alerts were identified, malicious processes were traced, terminated, and fully removed using tools such as netstat, PChunter, and process monitoring utilities.

Network ScanningWindows securityincident response
0 likes · 6 min read
Malware Incident Response: Analyzing and Removing a Persistent Windows Trojan
MaGe Linux Operations
MaGe Linux Operations
Jun 28, 2017 · Information Security

Build a Python Wi‑Fi Scanner to Test Weak Passwords

This guide walks through setting up Python 2.7 with the pywifi module, preparing a dictionary of common Wi‑Fi passwords, configuring a scanner, scanning nearby hotspots, testing each network, and recording results to identify vulnerable access points.

Network ScanningWiFiinformation security
0 likes · 3 min read
Build a Python Wi‑Fi Scanner to Test Weak Passwords
MaGe Linux Operations
MaGe Linux Operations
May 12, 2015 · Information Security

Master ZMap: Fast Network Scanning, Installation, Commands, and Advanced Uses

ZMap is a high‑speed network scanner developed at the University of Michigan, and this guide covers its installation on various Linux distributions, core command‑line options, configuration files, advanced extensions like banner grabbing and UDP probes, and discusses its underlying SYN‑RST scanning mechanism and security considerations.

LinuxNetwork ScanningSecurity
0 likes · 16 min read
Master ZMap: Fast Network Scanning, Installation, Commands, and Advanced Uses