71%
20.12.2012
S -O -oX mynet.xml 10.10.0.0/24
and the results have been saved in mynet.xml
, the XML file can be used to generate a valid Nagios/Icinga configuration:
./nmap2nagios-ng.pl -i -e -r mynet.xml -o
71%
05.02.2019
system1 (IP address 172.16.190.158, marked with the red circle). Then, you can see how system2 (172.16.190.159) begins the SMB protocol version negotiation and how NT LAN Manager 1.0 and 1.2 are being
71%
31.05.2012
.77
4.11
mandel
5.55
31.15
65.44
824.68
156.68
5.67
pi_sum
0.74
18.03
1.08
328.33
164.69
0.75
rand
71%
03.12.2015
:
sudo dpkg -i sdfs-2.0.11_amd64.deb
The Red Hat and CentOS counterpart is:
rpm -iv --force SDFS-2.0.11-2.x86_64.rpm
Users on other distributions need to go to the Linux (Intel 64bit)
section
71%
07.06.2019
frapsoft/nikto
$ docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
frapsoft/nikto latest e88e5f35b954 15 months ago 56.4MB
71%
05.02.2019
of a command-line tool written in Go. CST carries out all the intended tests and returns a test report when done. The source code is licensed under the Apache 2.0 license and is available from GitHub [1
71%
14.08.2018
ping scan and the nmap fast flag # nmap.attack:10
$ cd /root/gt
$ nmap -F -PS80,443 www.devsecops.cc -oX shiny.xml
When I launch an "nmap" attack with: # gauntlt-1.0.13/lib/gauntlt/attack_adapters/nmap.rb:8 ... 0 ... 0
71%
26.01.2025
a hands-on guide on how to get Kubeflow up and running quickly with a freshly created AWS account. The installation uses Cognito for user management but does not connect to external components
71%
01.08.2019
is the registry – the storage space for Docker images – which did not even have a mechanism for authentication. Later, the image format was changed and Registry 2.0 (a.k.a., "Docker Distribution") was released ... Running your own registry for Docker images is not difficult. We'll show you how to get started using the free docker_auth software.
71%
10.12.2012
?” The second is, “How do I create a W2G USB drive?” Once you have the USB drive in hand – or in pocket – many other questions arise about licensing, portability, and security. In this article, I’ll answer all