• Tools to detect nmap ‑O nmap-chronos Tools to detect and validate p0f JS to list brows­er char­ac­ter­is­tics which could send back to an attack­er via an AJAX request: /itsec/wp-content/uploads/2021/05/browser_detection.html Tools to impersonate Against browser/JS-based fin­ger­print­ing: Just tam­per with val­ues from the brows­er in about:config.

  • General notes NC / Netcat Try net­cat first on inter­est­ing ports or nar­row port ranges to be more silent Network scan Choose a port which is prob­a­bly open on sys­tems on this net­work. E.g. 445 for Win­dows hosts or 22 for Lin­ux hosts. for i in $(seq 1 254); do nc -zv -w 1 10.10.10.$i 445;…