Quick and dirty Python: nmap, (Mon, May 31st)

2 years ago 100
BOOK THIS SPACE FOR AD
ARTICLE AD

31. May 2021

This article has been indexed from SANS Internet Storm Center, InfoCON: green

Continuing on from the “Quick and dirty Python: masscan” diary, which implemented a simple port scanner in Python using masscan to detect web instances on TCP ports 80 or 443. Masscan is perfectly good as a blunt instrument to quickly find open TCP ports across large address spaces, but for fine details it is better to use a scanner like nmap that, while much slower, is able to probe the port to get a better idea of what is running.

Read the original article: Quick and dirty Python: nmap, (Mon, May 31st)

Related

Read Entire Article