Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Tag Archives: nmap

You are here:
  1. Home
  2. Entries tagged with "nmap"

Information Security

genlist – Backtrack – Miscellaneous – Miscellaneous Network – genlist

SecurityBy alexJanuary 6, 2013Leave a comment

Clicking on the genlist menu item in Backtrack Linux opens a terminal window and outputs the genlist help menu at the top. Genlist is a Perl script written to provide an easy way to generate a list of live hosts on a network or set of networks so you can then begin analyzing those hosts.…

PBNJ - Tool to Monitor Network Changes Over Time

Backtrack 5 : Information Gathering : Network Analysis : Identify Live Hosts : pbnj

SecurityBy alexMarch 18, 2012Leave a comment

PBNJ is made ip of two commands which are scanpbnj and outputpbnj. The manpages for both scanpbnj and outputpbnj are located in collapsed tables at the bottom of this post in case you want more details. When you run scanpbnj it technically a script that runs nmap and dumps the results to a database. The…

Technology Errors

Nmap 5.51: Zenmap: Error Saving Snapshot: Surface.write_to_png takes one argument which must be a filename (str)

ErrorsBy alexFebruary 12, 20114 Comments

I upgraded to Nmap 5.51 early this afternoon because a friend asked me to take a look at creating a topology image of a network scan of around 3,000 hosts. After upgrading I opened his scan in Zenmap and attempted to export the topology of the scan as a PNG but I received an error…

Information Security

How To Count The Number Of Hosts In NMAP Network Scan Results With Zenmap

SecurityBy alexJanuary 30, 2011Leave a comment

Earlier today while working with a friend at our offices we were playing around with a large NMAP scan of the anoNet network. His computer would not open the network topology in Zenmap because of a lack of RAM so we were looking at it on another laptop with much more RAM. After discussing it…

Technology Insights

How to Install MacPorts on Snow Leopard 10.6

InsightsBy purehateOctober 24, 2010Leave a comment

I have recently gotten a macbook pro to play around with so my next few articles will most likely cover getting the tools and such the way I want them on the mac book pro. The first thing I discovered is that many of the command line tools which I use every day such as…

Technology Insights

How to Use db_autopwn in Metasploit using PostgreSQL

InsightsBy purehateOctober 22, 20101 Comment

Recently Lots of people ave been asking about using autopwn in Metasploit. It used to be that it used a Sqlite3 database however the folks over at Metasploit say it is unstable and we should use Postgress. This article will be using the Backtrack 4 Linux Operating System so it may be different on another…

Information Security

Backtrack 4: Information Gathering: Dradis – Effective Information Sharing

SecurityBy purehateJune 9, 20102 Comments

One of the biggest problems when conducting penetration tests and vulnerability assessments is the organization of all the information obtained on the test. I used to use a program called Leo to organize my information because it had a tree like interface and you well able to create a well mapped out report of all…

Technology Insights

Using Nmap to find Conficker Worm Infections

InsightsBy purehateOctober 22, 2009Leave a comment

The Conficker worm was first detected around November of 2008. Although Microsoft has long since released a patch for this vulnerability entitled MS-0687 there are still a astounding amount of computers that are getting infected with Conficker due to the MS-0687 vulnerability.

Technology Insights

How to Install nmap Security Scanner on Windows XP

InsightsBy alexJanuary 2, 200913 Comments

Installing nmap security scanner on Windows XP is fairly easy. The easiest way is to download and run the nmap stable release executable file currently located here. You can verify the latest release by visiting nmap’s download page here. Once the nmap.exe file is downloaded just double click it and choose a location to unpack…

12
Question Defense
© 2019 question-defense.com

>>> Brave Browser Tipping: Support us by downloading, installing and then tipping us with Brave! <<<
Amazon Associate Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Go to Top