Metasploitable2 Notes/Walkthrough

This is really more of a post for me, here you can find my notes while following the metasploitable walkthrough found here: https://metasploit.help.rapid7.com/docs/metasploitable-2-exploitability-guide There are some definitions and summaries of some of the tools and vulnerabilities and than further down you can see the actual method of exploiting the vulnerabilities and using the tools. msfconsole Commands... Continue Reading →

Network Ports

Network Ports, a lovely topic to understand and memorize. Everyone has room in their brain to memorize thousands of integers and their corresponding functions. Seriously, if you memorize even a small fraction of the ports you are sickening. link to wiki:  https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers Firstly, it is important to understand what a port is: A network port... Continue Reading →

What is Nmap?

"Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service up time. Nmap uses raw IP packets in novel ways to determine what hosts... Continue Reading →

Create a website or blog at WordPress.com

Up ↑