eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

211
active users

#nmap

0 posts0 participants0 posts today
ricardo :mastodon:<p>24 <a href="https://fosstodon.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> Commands for Network Security and Scanning</p><p><a href="https://www.tecmint.com/nmap-command-examples/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tecmint.com/nmap-command-examp</span><span class="invisible">les/</span></a></p>
:mastodon: decio<p>On parlait la semaine passée des faux Keepass poussés via publicité Google malveillante (malvertising)...</p><p>Voici un autre exemple tout chaud, spotté par BleepingComputer : une fausse version de l'outil open-source Zenmap (Nmap), ainsi qu’un faux WinMTR, sont utilisés pour livrer le malware Bumblebee.<br>⬇️ <br>Cette fois via "SEO poisoning" sur Google &amp; Bing. (C’est une technique qui consiste à manipuler les résultats des moteurs de recherche pour faire apparaître en tête de page de faux sites — souvent très bien imités — afin de piéger les internautes)<br> Ici, les attaquants ont cloné les pages de téléchargement de Zenmap (l’interface graphique de Nmap) et WinMTR (outil de traceroute réseau), deux utilitaires très utilisés par les pros de l’IT.</p><p>Les sites en question (zenmap[.]pro, winmtr[.]org) semblaient parfaitement légitimes.<br>Mais les installeurs .msi proposés contiennent en réalité un loader du malware Bumblebee, furtif et non détecté par la majorité des antivirus (VirusTotal donne quasi tout vert).</p><p>Ce que fait Bumblebee :</p><ul><li><p>Installe l’outil promis… mais avec une DLL infectée.</p></li><li><p>Ouvre une backdoor : profilage de la victime, puis possible déploiement de ransomware, infostealers, ou d’autres malwares.</p></li><li><p>Idéal pour une attaque en deux temps (initial access + mouvement latéral).</p></li></ul><p>[Source]<br>⬇️ <br>📰 "Fake Zenmap. WinMRT sites target IT staff with Bumblebee malware — BleepingComputer"<br>👇 <br><a href="https://www.bleepingcomputer.com/news/security/fake-zenmap-winmrt-sites-target-it-staff-with-bumblebee-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-zenmap-winmrt-sites-target-it-staff-with-bumblebee-malware/</span></a></p><p><a href="https://infosec.exchange/tags/SEOpoisoning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SEOpoisoning</span></a> <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> <a href="https://infosec.exchange/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <a href="https://infosec.exchange/tags/cyberveille" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberveille</span></a></p>
Marek<p>Is the (partly free) nmap book also available as HTML version or EPUB version? I would find this very practical as I could then read it on my ebook reader.</p><p><a href="https://www.reddit.com/r/nmap/comments/1ibn79e/nmap_network_scanning_as_epubhtml/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reddit.com/r/nmap/comments/1ib</span><span class="invisible">n79e/nmap_network_scanning_as_epubhtml/</span></a></p><p><a href="https://layer8.space/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a></p>
Alexandre Dulaunoy<p>New nmap nse script for vulnerability-lookup</p><p><a href="https://github.com/nmap/nmap/pull/2995" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/nmap/nmap/pull/2995</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a> <a href="https://infosec.exchange/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a></p>
floyd aka floyd_ch<p>I need an <a href="https://chaos.social/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a> wizard. Can someone explain? This doesn't make any sense.</p><p>% sudo nmap -n -Pn -p80 192.168.183.32 <br>Starting Nmap 7.94 ( <a href="https://nmap.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nmap.org</span><span class="invisible"></span></a> ) at 2024-11-28 11:29 CET<br>Nmap done: 1 IP address (0 hosts up) scanned in 1.46 seconds</p><p>% sudo nc 192.168.183.32 80 <br>GET / HTTP/1.0</p><p>HTTP/1.1 301 Moved Permanently<br>Cache-Control: no-cache</p>
JuanPC<p>Con <a href="https://mastodon.online/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a> veo :<br>Nmap scan report for 192.168.1.10<br>……<br>PORT STATE SERVICE<br>8008/tcp open http<br>8009/tcp open ajp13<br>8443/tcp open https-alt<br>9000/tcp open cslistener<br>10001/tcp open scp-config<br>10010/tcp open rxapi<br>MAC Address: AC:67xxxxxxx (Google)<br>No exact OS …….<br>2/4 🧵</p>
SnoopGod Linux<p>Essential Cybersecurity Tools for Hacking and Ethical Hacking<br><a href="https://infosec.exchange/tags/BurpSuite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BurpSuite</span></a> <a href="https://infosec.exchange/tags/Hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashcat</span></a> <a href="https://infosec.exchange/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a><br><a href="https://infosec.exchange/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <a href="https://infosec.exchange/tags/OWASPZAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASPZAP</span></a> <a href="https://infosec.exchange/tags/SQLmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLmap</span></a> <a href="https://infosec.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a> <a href="https://infosec.exchange/tags/SnoopGod" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SnoopGod</span></a> <a href="https://infosec.exchange/tags/SnoopGodLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SnoopGodLinux</span></a> <a href="https://snoopgod.com/2024/05/30/essential-cybersecurity-tools-for-hacking-and-ethical-hacking/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">snoopgod.com/2024/05/30/essent</span><span class="invisible">ial-cybersecurity-tools-for-hacking-and-ethical-hacking/</span></a></p>
adingbatponder<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@ceresbzns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ceresbzns</span></a></span> Ah. Of course. I should have said I ssh into the machine and manage files on it using ftp via my other linux computer. So those ports are perhaps needed. When run <a href="https://fosstodon.org/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a> on the dns resolved address www.xxxx.xxxx it shows ALL tcp ports open !?!?!?! <a href="https://fosstodon.org/tags/tcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcp</span></a> <a href="https://fosstodon.org/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://fosstodon.org/tags/ftp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ftp</span></a></p>
adingbatponder<p><a href="https://fosstodon.org/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a> I have a rasperry pi server on my cable internet router running Ubuntu 20.04.5 LTS. It hosts a website. That is its only purpose. When I run nmap I get the result shown. Is this OK? Is this a safe configuration? <a href="https://fosstodon.org/tags/ports" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ports</span></a> Any other commands I can run to see if there is a security issue? <a href="https://fosstodon.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://fosstodon.org/tags/hosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hosting</span></a> <a href="https://fosstodon.org/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a></p>
Soldier of FORTRAN :ReBoot:​<p><a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a> </p><p>Hi all, I've read its good etiquette to make an about me post. I've been a tinkerer of things for a long while, been a cybersercurity enthusiast since my teens where I was having fun on lots of BBS' and Datapac. </p><p>I'm a big believer in <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a>, FOSS and fostering communities. I've been messing with Linux since the 90s. Huge fan of the movie Hackers. </p><p>Today I hack <a href="https://infosec.exchange/tags/gibsons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gibsons</span></a> for a living! I focus a lot of my work on making tools and giving talks on hacking and pentesting IBM z/OS mainframes. I've published updates for metasploit and <a href="https://infosec.exchange/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> adding support for z/OS. I also have many more tools on my github. </p><p>In my spare time I also maintain my own mainframe distro MVS/CE which I use to teach workshops about mainframe buffer overflows and hacking CICS applications. </p><p>I'm also a huge fan of <a href="https://infosec.exchange/tags/retrogaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrogaming</span></a> and retrocomputing especially retro hacks.</p>
vgan<p>I discovered my first hidden camera at an AirBnB last week in Yerevan, Armenia. Always scan the wifi when you get to a new place!! <a href="https://mastodon.social/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://mastodon.social/tags/nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmap</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/dystopia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dystopia</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/badposture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>badposture</span></a></p>