Walkthrough for begginers: Step 1: Nmap Scan – First we will scan the machine with Nmap The command: Command explanation: sudo: Runs nmap with root privileges for more accurate scans. -sC: Enables default Nmap scripts to gather detailed info. -sV: Detects versions of services on open ports. -oA active: Saves output in three formats (normal, XML,…
Walkthrough for begginers: Step 1: Nmap Scan – First we will scan the machine with Nmap The command: Command explanation: sudo: Runs nmap with root privileges for more accurate scans. -sC: Enables default Nmap scripts to gather detailed info (e.g., vulnerabilities, configs). -sV: Detects versions of services on open ports (e.g., Apache 2.4.41). -oA soccer:…
This table lists common hash encryption formats, how to identify them, and the corresponding John the Ripper command for cracking them. Encryption Type Hash Start Example Hash How to Identify John the Ripper Command DES 2 chars (salt) Ep1t0mE9h68JI 13 chars, starts with 2-char salt (a-z, A-Z, 0-9, ./) john –format=des file.txt MD5 $1$ $1$Ep1234$abcde12345fghij67890 Starts with…
Search the blog for more articles