Articles in this series
The beginning of most security technologies was rooted in warfare. The Cyber Kill Chain that I will study today is no different. What is Cyber Kill...
Limitations of the Cyber Kill Chain While the Cyber Kill Chain is a useful framework for understanding and defending against cyberattacks, it does...
Reconnaissance 🔍 Goal: The attacker gathers information about the target. Techniques: Open-source intelligence (OSINT), network scanning, and...
Reconnaissance-Active Scanning→Port Scanning Types of Port Scanning Port Scanning plays a critical role in network security, allowing both security...
Nmap Nmap (Network Mapper) is an open-source tool widely used for network discovery and security auditing. Nmap is primarily used for port scanning...
Netcat (often abbreviated as nc) is a network utility used for reading from and writing to network connections using TCP or UDP protocols. It is often...