In the first post in Netcat series, I have discussed a few basic features this amazing tool has. This time, I will elaborate more on
Despite released 25 years ago, Netcat remains as the fundamental network penetration testing tool. In simple words, Netcat is utility which reads and writes data
In most cases, you will probably use SYN scan, however there are circumstances where other types of scanning may be needed. Unfortunately, modern firewalls detect different port
In this series I am going to delve in some theory of port scanning, which is essential of service identification within a TCP\IP network. The most popular
Communication between devices on packet-switched networks is based on items most generically called messages. These pieces of information also go by other names such as
In the real world, protocol often refers to a code of conduct or a form of etiquette. People follow certain rules of behaviour, ceremony etc.
Networks are everywhere, especially in the form of Internet. The Internet has revolutionized our lives to an extent people could not imagine several years ago.