-
Tools to detect nmap ‑O nmap-chronos Tools to detect and validate p0f JS to list browser characteristics which could send back to an attacker via an AJAX request: /itsec/wp-content/uploads/2021/05/browser_detection.html Tools to impersonate Against browser/JS-based fingerprinting: Just tamper with values from the browser in about:config.
-
General notes NC / Netcat Try netcat first on interesting ports or narrow port ranges to be more silent Network scan Choose a port which is probably open on systems on this network. E.g. 445 for Windows hosts or 22 for Linux hosts. for i in $(seq 1 254); do nc -zv -w 1 10.10.10.$i 445;…