Hacknotes

Under Construction

In this section

  • Scanning
    Network Scanning
    • Host Discovery
      Techniques for identifying active systems.
    • Port Scanning
      Methods for discovering open ports
    • Service Enumeration
      Service enumeration gathers detailed information about running services, including versions and configurations, to identify weaknesses and viable attack paths.
    • Web Enumeration
      Identifying security weaknesses and CVEs
    • Vulnerability Scanning
      Vulnerability scanning identifies security weaknesses, misconfigurations, and known vulnerabilities in systems and services.