Articles Blog | G5 Cyber Security

Research – enemy2.html

The follow-up article to “Know Your Enemy: The Attack of the Script Kiddie”, “Know your Enemy II” focuses on intelligence gathering, specifically how to determine what the enemy is doing by analyzing your system log files. Includes examples based on two of the most commonly used scanning tools on the Internet, sscan and nmap.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/13826/enemy2.html

Source: https://packetstormsecurity.com/files/13826/enemy2.html.html

Exit mobile version