Home
secybr | penetration testing, red teaming and hack tricks.
Cancel

DHCP Pentesting Best Practices

DHCP DHCP usually uses ports 67, 68 What is DHCP? The answer to “What is DHCP?” is that it’s the standard mechanism to dynamically assign IP addresses within a network. It stands for Dynamic...

SSH Pentesting Best Practices

SSH SSH usually uses port 22 What is SSH? SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which ...

DNS Pentesting Best Practices

DNS DNS usually uses port 53 What is DNS? DNS working logic DNS is a domain name system that allows users to connect to websites using domain names instead of IP addresses. DNS, it is a sy...

VNC Pentesting Best Practices

VNC VNC usually uses ports 5800 or 5801 or 5900 or 5901. What is VNC? It is a cross-platform screen sharing system that was created to remotely control another computer. This means that a co...

Finger Pentesting Best Practices

Finger Finger usually uses port 79 What is Finger? Finger is a program you can use to find information about computer users. It usually lists the login name, the full name, and possibly othe...

Telnet Pentesting Best Practices

Telnet Telnet usually uses port 23,992 What is Telnet? Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication c...

FTP Pentesting Best Practices

FTP FTP usually uses port 21 What is FTP? FTP (File Transfer Protocol) is used to communicate and transfer files between computers on a TCP/IP (Transmission Control Protocol/Internet Protoco...

Powered by 0xhav0c © 2022