I am doing a security training for some folks next week and while putting together the presentation I did some 'movies' of different security/'hacker' tools in use: NMAP Example: (Attacker running NMAP on TOP, Target host with TCPDUMP running on BOTTOM) Nessus Example: (Attacker running nessus on TOP, Target host with TCPDUMP running on BOTTOM) Medusa Example: (Running Medusa against a Server running SSH) Backtrack - Metasploit Example
0 Comments
Leave a Reply. |
AuthorSecurity Researcher with about 20 years in the Computer Security Field. Going to talk even if no one is listening.. Archives
January 2022
Categories
All
|