Videos

Published on November 5th, 2019 📆 | 4273 Views ⚑

0

Reconnaissance Tool | NMAP – Using Masscan, ProxyChains & Techniques with NMAP


https://www.ispeech.org/text.to.speech



Offensive Security Online Courses: https://www.blackhatethicalhacking.com/courses/
Complete Metasploit Course on Vimeo: https://vimeo.com/blackhatethicalhacking

Hello Everyone & Welcome to another Episode by Black Hat Ethical Hacking.

In this NMAP Video Episode, we will discuss advanced combination of tools that can be used with NMAP, using a different mindset to extract information, create attacks, bypass measures using no ping techniques and learn to work with masscan which works different than NMAP. As it works like spraying syn packages without waiting for ack and that technique is used to check for example
for specific ports like port 445 which is the eternal blue zero day released by the NSA, showing you how many still did not patch, so you care only for syn packsand check if that port is open.

Cyber attacks from country to country, i.e attacks to china, russia and so on, hackers work using these techniques when they targets a specific segmentation of IP Addresses of a country, and launching mass attacks against billions of hosts, searching for specific ports, and assembling the large data collected from such large bandwidth into smaller ones, as speed, and tweaking the scans is a huge factor when it comes to dealing with hundreds of millions of IP Addresses. Sometimes working in large companies, that have 700K employees, these are the tools that you will be using, with a certain mindset, certain knowledge on how to work with NMAP, masscan & the extracted data, and how hackers analyze it, working their way into eventually launching
vulnerability scans, and eventually launching attacks against all the recon collected and exploit certain services for full access.

You can download it from:

GitHub Link: https://github.com/blackhatethicalhacking/nmap

If you would like to see a tool, you can contact us, leave a comment and we will let you know!

Disclaimer:

This video is performed for educational purpose only, it will help Cyber Security Researchers expand their knowledge as to how such attacks take place, everything is done on self-owned machines and do not support promotion for such techniques, we are not responsible for any damage done in reference to this training, Black Hat Ethical Hacking or any security research engineer performing this demo is not held responsible for the actions of others and do not influence such attacks to be done WITHOUT the consents of the other party or part of a penetration testing after an NDA agreement signed between both parties.





Soundtrack:

https://www.youtube.com/watch?v=t_z77ic5lmM

► Music Credit: LAKEY INSPIRED
Track Name: "Distant"
Music By: LAKEY INSPIRED @ https://soundcloud.com/lakeyinspired
Original upload HERE - https://soundcloud.com/lakeyinspired/...
Official "LAKEY INSPIRED" YouTube Channel HERE - https://www.youtube.com/channel/UCOmy...
License for commercial use: Creative Commons Attribution 3.0 Unported "Share Alike" (CC BY-SA 3.0) License.
Full License HERE - https://creativecommons.org/licenses/...
Music promoted by NCM https://goo.gl/fh3rEJ

Soundscape Ambient, Cyberpunk Music. Royalty Free

Support our work on Patreon:

https://www.patreon.com/blackhatethicalhacking

#nmap #reconnaissance #blackhatethicalhacking

source

Tagged with:



0 Responses to Reconnaissance Tool | NMAP – Using Masscan, ProxyChains & Techniques with NMAP