Tag: recon
-
Nmap, Python & Go Network Pentesting
In the realm of cybersecurity, the quest for securing internal networks has led to the integration of powerful tools and programming languages. Nmap, a stalwart in network reconnaissance, takes center stage in this exploration. We will delve into the intricacies of utilizing Nmap in conjunction with Python and Go for internal network pentesting. As organizations…
-
Montreal Cybersecurity & Global GDPR
This article delves into Montréal’s unique cybersecurity landscape, exploring its legislative framework, notably the Act Respecting the Protection of Personal Information in the Private Sector, and comparing it with the General Data Protection Regulation (GDPR) and cybersecurity regulations in 17 other countries. Additionally, we’ll shed light on the role of network pentests in fortifying Montréal’s…
-
Pentesting Recon: Navigating Footprints
Tool Name URL Description Nmap https://nmap.org/ Network scanning and host discovery tool. Recon-ng https://github.com/lanmaster53/recon-ng Full-featured reconnaissance framework. Shodan https://www.shodan.io/ Search engine for internet-connected devices. TheHarvester https://github.com/laramies/theHarvester Email and subdomain harvesting tool. Maltego https://www.maltego.com/ Interactive data mining and link analysis tool. SpiderFoot https://www.spiderfoot.net/ Open-source footprinting tool. OSINT Framework https://osintframework.com/ Collection of various OSINT tools. EyeWitness https://github.com/FortyNorthSecurity/EyeWitness…
-
Mastering Subdomain Enumeration & Goroutines
In cybersecurity, subdomain enumeration emerges as a pivotal activity for identifying potential vulnerabilities. Among the myriad programming languages, Go’s unique concurrency model, centered around the powerhouse called goroutines, has become a beacon for efficient and scalable concurrent execution. This expansive article takes a deep dive into the intricacies of goroutines, unraveling their design principles, real-world…
-
In the Cyber Arena: Golang vs Python – A Deep Dive into Networking Security
Introduction:As the cyber landscape expands, the choice of programming language becomes critical in fortifying the defenses of networking applications. In this article, we embark on a journey to dissect the security nuances of Golang and Python, two stalwarts in the coding realm. Our exploration is grounded in research studies, shedding light on the strengths and…