ev0wpnz

  • Attackers typically compromise sites and use something called an exploit kit. These ‘kits’ allow the attackers to try a variety of different browser/flash/pdf exploits against the target to get it to download malicious software.

    Information about the current exploit packs can be found…[Read more]

  • Can you provided us with a screen shot of a copy and paste of the command ran and the output. I think this would be much more helpful in diagnosing this issue.

  • Just a couple more tidbits of information here.

    Scanning all 65k ports on 100 hosts is likely to cause some network congestion. Make sure this is not something you do during peak hours.

    Although the timing options for nmap are very configurable at the end of the day it’s not a fast scanner. (Not saying it’s a slow scanner) Make sure you are…[Read more]

  • scucci,
    FTP is an inherently insecure protocol due to the fact that it uses plain-text and allows anonymous logins. There are also a lot of the FTP applications that are vulnerable to remote exploitation. An example of one vulnerable application would be wu-ftpd. I think 3xban did a great good of answering your question an I mostly just…[Read more]

  • Yonas,
    I think the information provided you was great but maybe not what you are looking for. The question that you are asking is not an easy one to answer. Exploiting web applications or the web services that are hosting them is not an easy task for a beginner. It seems to me that you are targeting a single host and not an entire network. This…[Read more]

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?