THE

SPRAWL

  •  
  •  
  •  
  • sprawlsimilar

    port scanning

    Discovering open ports on a networked system is an important reconnaissance step used to enumerate potentially vulnerable services. In this article you will learn a number of techniques used to perform fast and reliable port scans while bypassing many trivial defenses. Read more.

    host discovery

    In this article you will learn several active and stealth techniques used to discover even highly cloaked hosts. Read more.

    nmap

    nmap (Network MAPper) is a network port scanner with service version and operating system detection engines. The tool was originally developed by Fyodor and published in Phrack Issue 51 in 1997. The tool is command line although a number of GUIs exist. nmap runs on a variety of platforms including Linux, *BSD, Windows, and others. Read more.

    hping

    hping is a TCP/IP packet forging tool with embedded Tcl scripting functionality. Developed by antirez in 1998, it is now in its 3rd release. The tool runs on all major operatings systems including Linux, *BSD, and Windows. Read more.

    airoscapy

    Download airoscapy.py
    Size 2.1 KB
    DateAugust 28th, 2011
    Version0.2

    Airoscapy is a passive wireless access point scanner. Using this tool you can monitor Access Point's SSID, BSSID, Channel and Encryption support. Read more.

    syn flooder

    Download synflood.pl
    Size 476 bytes
    DateJuly 4th, 2008
    Version0.1

    A proof of concept script to perform a SYN flood attack on a target host. Requires Net::RawIP module. Read more.

    denial of service

    A Denial of Service (DoS) attack is designed to prevent legitimate access to a target system. This article will cover techniques used to DoS a machine or service. Read more.

    08 dec
    2013
    baythreat 4 - day two

    After a great day of hanging out with old and new friends all while getting inspired to start breaking/researching anything ranging from 50 year old behemoths to Internet enabled light bulbs, I raced down peninsula to the epicenter of Bay Area's security community at Hacker Dojo. Baythreat Day Two has begun.

    In a terrible miscalculation of a sleeping schedule I have regretfully missed several morning talks; however, below are the writeups of another series of excellent presentations from the breaker track for the remainder of the day. Read more.



    π
    ///\oo/\\\