Penetration Testing
The majority of the examples on this page are run from Linux (Kali Linux is recommended) but can target any OS.Â
Port Scanning
Port Scanning
nmap mytargetsystem
nmap -p 80 -A mytargetsystem
Bibliography
Bibliography
https://www.softwaretestinghelp.com/penetration-testing-tools/https://www.makeuseof.com/best-linux-distros-for-penetration-testing/
https://www.tenable.com/
https://en.wikipedia.org/wiki/Armitage_(computing)
https://www.redhat.com/sysadmin/using-nmap-harden-systemshttps://opensource.com/article/21/5/linux-security-tools
https://www.tenable.com/
https://en.wikipedia.org/wiki/Armitage_(computing)
https://www.redhat.com/sysadmin/using-nmap-harden-systemshttps://opensource.com/article/21/5/linux-security-tools