Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don’t want us to know.
Possibly the most popular and well-known reconnaissance tool currently available in the hacking world, Nmap has been covered several times on Null Byte before. For example, we’ve shown how to detect CVEs, automate brute-force attacks, and perform advanced reconnaissance, to name just a few Nmap tutorials.
This article assumes readers have some experience with the Nmap basics. I’ll be… more