Tagged articles
31 articles
Page 1 of 1
Black & White Path
Black & White Path
May 9, 2026 · Information Security

AutoPentestX: An Automated Linux Penetration Testing Toolkit for Faster Red‑Team Assessments

AutoPentestX is an open‑source, Linux‑focused automated penetration testing framework that integrates tools like Nmap, Nikto, SQLMap and Metasploit into a single command workflow, stores results in SQLite, generates detailed PDF reports, and includes installation, usage instructions, legal compliance notes, and future development plans.

LinuxMetasploitautomation
0 likes · 7 min read
AutoPentestX: An Automated Linux Penetration Testing Toolkit for Faster Red‑Team Assessments
Linux Tech Enthusiast
Linux Tech Enthusiast
Mar 26, 2026 · Operations

9 Essential Linux Network Commands Every Admin Should Know

This guide walks Linux administrators through nine core networking utilities—ip, netstat, nmap, traceroute, tcpdump, ssh, wget, netplan, and nmtui—explaining their purpose, key options, and example commands to configure interfaces, inspect routes, capture packets, and manage remote connections.

Linuxcommandsip
0 likes · 8 min read
9 Essential Linux Network Commands Every Admin Should Know
Black & White Path
Black & White Path
Feb 23, 2026 · Information Security

PentAGI: AI‑Powered Penetration Testing Platform Integrates 20+ Tools to Redefine Security Assessments

PentAGI is an open‑source, AI‑driven penetration testing platform released by VXControl in early 2025 that automatically orchestrates over twenty security tools—including Nmap, Metasploit, sqlmap—and generates comprehensive reports within isolated Docker environments, offering advanced agent architecture, real‑time intelligence gathering, and scalable deployment options.

AI penetration testingDockerLLM
0 likes · 5 min read
PentAGI: AI‑Powered Penetration Testing Platform Integrates 20+ Tools to Redefine Security Assessments
Raymond Ops
Raymond Ops
Oct 30, 2025 · Information Security

Master Linux System Security: Account Hardening, Boot Controls, and Vulnerability Scanning

This guide walks through essential Linux security practices, covering account cleanup and password policies, BIOS and GRUB boot protections, command‑history sanitization, automatic logout settings, weak‑password detection with John the Ripper, and network scanning using Nmap to help harden servers against common threats.

Account HardeningGRUBJohn the Ripper
0 likes · 18 min read
Master Linux System Security: Account Hardening, Boot Controls, and Vulnerability Scanning
Raymond Ops
Raymond Ops
May 19, 2025 · Operations

Master Network Connectivity Checks: From ethtool to nmap

This guide explains how to verify physical links, test ping latency, trace routes, check HTTP/HTTPS availability with wget and curl, assess TCP/UDP ports using netcat, telnet, and nmap, inspect local connections via netstat/ss, understand TCP states, and validate DNS resolution, providing practical command examples for each step.

Linuxconnectivity toolsethtool
0 likes · 12 min read
Master Network Connectivity Checks: From ethtool to nmap
MaGe Linux Operations
MaGe Linux Operations
May 4, 2025 · Information Security

Essential Linux System Security: Account Hardening, Password Policies, and Vulnerability Scanning

This guide covers Linux system security fundamentals, including account cleanup, password aging and locking, command‑history protection, BIOS/GRUB boot hardening, login restrictions, weak‑password detection with John the Ripper, and network port scanning using Nmap, providing practical commands and configuration steps for each topic.

Account ManagementJohn the RipperPassword Policies
0 likes · 18 min read
Essential Linux System Security: Account Hardening, Password Policies, and Vulnerability Scanning
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2024 · Information Security

Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms

This guide explains how to use nmap scripts to discover SNMP weak passwords, demonstrates various exploitation commands, and provides step‑by‑step hardening procedures for Windows, Linux, AIX, Solaris, and Cisco devices, including community string changes, whitelist configuration, and service management.

SNMPnetwork securitynmap
0 likes · 6 min read
Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Master Nmap: Essential Commands and Scanning Techniques Explained

This guide walks through common Nmap commands, explains key options such as -A, -T4, and -sn, demonstrates host discovery, port and service detection, OS fingerprinting, and provides practical examples with output screenshots to help readers efficiently assess network security.

Network ScanningOS detectionhost discovery
0 likes · 15 min read
Master Nmap: Essential Commands and Scanning Techniques Explained
MaGe Linux Operations
MaGe Linux Operations
Sep 23, 2024 · Operations

Master Network Connectivity Checks: Essential Linux Tools & Commands

Learn how to verify physical link status, test network reachability, trace routes, and diagnose TCP/UDP ports using Linux utilities such as ethtool, ping, tracepath, wget, curl, netcat, telnet, nmap, netstat, and ss, with practical command examples and interpretation tips.

connectivity testingethtoollinux-commands
0 likes · 15 min read
Master Network Connectivity Checks: Essential Linux Tools & Commands
Open Source Linux
Open Source Linux
Aug 14, 2024 · Information Security

Master Nmap: Step-by-Step Guide to Scanning Linux Ports

This guide explains how to use Nmap on Linux to perform simple, single‑port, full‑range, and custom port scans, interpret common port states, and understand typical service ports for effective network security testing.

Linuxnetwork securitynmap
0 likes · 7 min read
Master Nmap: Step-by-Step Guide to Scanning Linux Ports
DevOps Operations Practice
DevOps Operations Practice
Jul 11, 2024 · Information Security

Top 7 Penetration Testing Tools and Their Key Features

This article introduces seven leading penetration testing tools—including Kali Linux, Metasploit, Wireshark, Nmap, Burp Suite, Acunetix, and Nessus—detailing their primary features and how they help security professionals identify and mitigate vulnerabilities effectively.

Burp SuiteKali LinuxMetasploit
0 likes · 9 min read
Top 7 Penetration Testing Tools and Their Key Features
Java Architect Essentials
Java Architect Essentials
May 26, 2023 · Information Security

Step‑by‑Step WordPress Site Penetration Testing Tutorial

This tutorial walks beginners through the entire process of compromising a WordPress website, from initial information gathering and DNS enumeration to vulnerability scanning, exploitation with tools like sqlmap and nmap, privilege escalation, and establishing persistent backdoors.

SQLMapWebshellWordPress
0 likes · 10 min read
Step‑by‑Step WordPress Site Penetration Testing Tutorial
MaGe Linux Operations
MaGe Linux Operations
Sep 20, 2022 · Information Security

Top 10 Essential Tools Every Ethical Hacker Must Use

Discover the ten most widely used security tools—from Nmap and Nessus to Metasploit—that ethical hackers rely on for network mapping, vulnerability scanning, wireless analysis, and automated exploitation, each with key features, platform support, and practical applications for strengthening defenses.

Metasploitethical hackingnessus
0 likes · 7 min read
Top 10 Essential Tools Every Ethical Hacker Must Use
Open Source Linux
Open Source Linux
Nov 24, 2021 · Information Security

Mastering Port Penetration: From Scanning to Exploitation

This comprehensive guide explains how to improve penetration testing efficiency by focusing on port enumeration, banner grabbing, service identification, default port knowledge, and a variety of attack techniques—including brute‑force, exploitation of known vulnerabilities, and protocol‑specific tricks—across common network services and applications.

brute forcenmappenetration testing
0 likes · 19 min read
Mastering Port Penetration: From Scanning to Exploitation
Liangxu Linux
Liangxu Linux
Oct 15, 2020 · Operations

Top 16 Essential Tools Every Network Engineer Should Master

A comprehensive guide lists sixteen indispensable network troubleshooting utilities—from classic commands like Ping and Traceroute to advanced platforms such as Nmap, Wireshark, and OpenVAS—explaining their core functions, typical use cases, and how they help engineers quickly pinpoint and resolve connectivity issues.

OperationsWiresharknetwork troubleshooting
0 likes · 9 min read
Top 16 Essential Tools Every Network Engineer Should Master
MaGe Linux Operations
MaGe Linux Operations
Jul 31, 2020 · Information Security

Build a Python TCP Port Scanner with Multithreading and Nmap

This article demonstrates how to build a Python TCP port scanner using raw sockets, adds service fingerprinting by sending probes, speeds up scans with multithreading, and shows an alternative approach using the nmap library, complete with example code and sample output.

multithreadingnmapport scanning
0 likes · 5 min read
Build a Python TCP Port Scanner with Multithreading and Nmap
ITPUB
ITPUB
Mar 26, 2020 · Information Security

How to Quickly Identify Open Ports on Linux Using Nmap, Netcat, and Bash

This guide explains multiple practical methods for discovering which ports are open on a Linux system, covering Nmap scans, Netcat probing, and Bash pseudo‑device checks, complete with command examples, option details, and output interpretation.

BashLinuxnetcat
0 likes · 8 min read
How to Quickly Identify Open Ports on Linux Using Nmap, Netcat, and Bash
Meituan Technology Team
Meituan Technology Team
Oct 26, 2017 · Information Security

External Network Port Monitoring: Evolution, Methods, and Best Practices

The article chronicles Meituan‑Dianping’s external network port monitoring evolution—from slow Python‑driven Nmap scans to a fast Masscan‑Nmap pipeline and real‑time traffic‑driven DPDK module—explaining black‑box scanning, white‑box analysis, best‑practice recommendations, and the critical role of continuous port visibility for security.

Security OperationsTCP SYNmasscan
0 likes · 13 min read
External Network Port Monitoring: Evolution, Methods, and Best Practices
Architects Research Society
Architects Research Society
Mar 30, 2017 · Information Security

Industrial Control System (ICS) Protocols and Security Overview

This article provides a comprehensive overview of industrial control system terminology, common SCADA‑related protocols such as Modbus, PROFIBUS, DNP3, OPC, BACnet, and Siemens S7, their security weaknesses, detection scripts, and vulnerability analysis resources.

Protocol SecuritySCADAindustrial control
0 likes · 9 min read
Industrial Control System (ICS) Protocols and Security Overview