Pen Testing reconnaissance 101 : Using NMap,Tor and ProxyChains

Learning objective : How can you perform reconnaissance on a remote target to check which ports are unsecured for possible exposure to network attacks? Step 1: Create or choose an off the shelf Network Port scanner. Based on my research and talking to more experienced peers in this space, I choose Nmap ( https://nmap.org/) , … Continue reading Pen Testing reconnaissance 101 : Using NMap,Tor and ProxyChains