Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Tag: network scanning

Archive for network scanning

You are browsing the archives of network scanning.

Patch and Vulnerability Management

NIST 800-40 “Creating a Patch and Vulnerability Management Program” describes the functions and processes that a patch and vulnerability management program should cover in order to maintain effective security. Importance of patch management As operating systems, applications and utility tools continue to manifest exploitable flaws, rapid application of security patches becomes critical to security. Attackers […]

Nmap to Nessus

This blog entry at Tenable by Paul Asadoorian describes how to most efficiently use both nmap and nessus together without duplicating effort. Using Nmap Results With Nessus Batch Scanning – [tenablesecurity.com] Conclusion If you have previously scanned your network with Nmap and saved the results in grepable Nmap output, you can save the step of […]


First released by Fyodor in a 1997 issue of Phrack magazine, nmap has become the de-facto standard for network scanning and port scanning tools. Nmap is free and open-source and is now available in versions for most major OS platforms and includes features for OS identification, service version detection, a scripting engine, multi-probe scanning, a […]


Zenmap is a GUI front end for nmap, the popular network and port scanning tool by fyodor. Introduction Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap […]

Network scanning recon

Network scanning usually begins with discovering ranges of IP addresses and then specific systems within those ranges. Once the live systems have been located, they are scanned for responding ports and an attempt is made to identify the services running on the ports and the versions of the services. Once this map is filled in, […]