Member-only story
NMAP tutorial about gathering information of different servers
Hello, I hope everyone is well. You must have read my previous tutorial and article about how you can extract information about someone’s server from the network. Now we will go into a little more detail. And i will define what are the most important things in In Networks.
In this article we will see how we can extract server information and how we can detect hidden paths through which we can collect server information.
Before all these things keep one thing in mind none of my article is leading to harming anyone. Attacking someone’s personal property is a legal offense. Your state should take strict action against it. As a result of the attack, you can also pay a fine for heavy damages. The EU policy is very strict.
Before scanning Target , we will do this very carefully and also understand that if we start investigating on any server, there can be many kinds of problems, for example, firewalls. Or any mechanism that rejects your sent request.
The largest firewall used at the government level is called FortiGate FortiWiFi 40F Series Datasheet This firewall has many features. Most people use IBM’s firewall. Ping request sent by should be blocked.
Let’s examine some things and see what’s wrong with them.
We had a server, we ran a test on that server, and as a result, we found out how many more divisions were on that server. Any DNS is…