In this nmap tutorial, we will see how to use nmap and its visual companion, zenmap. Even if you don’t want to do penetration testing, you should know how to use this tool. Several tools allow you to perform reconnaissance, but the most famous is nmap. This aims to understand how the system works, and what are possible vulnerabilities. Yet, all the attacks starts from the same point: reconnaissance. Preparing attacks to systems and networks is complex.
0 Comments
Leave a Reply. |