I was watching an episode of Astrid et Raphaëlle (Madmans Sacrifice).
In the episode, someone is using a watch to transmit information to a player in a chess tournament. One of the characters, a former insurance investigator who acts as the tech person of the team, uses a hotel computer to identify what device is sending the information to the watch.
To do this, she runs a few different commands, including nmap.
Sorry for the big pause button and the blur.

She does hacking in other episodes. Some of it is pretty ridiculous, but I have not analyzed it and don't have screenshots.

#nmap #astrid #astridEtRaphaëlle

Today's #FreeSoftwareAdvent surprise is #nmap !

https://nmap.org/

Scan a network to see what's running out there. Get a list of the live hosts, their open ports, and a pretty good guess at what operating system they're running.

You can even poke at the hosts in various ways using nmap's scripting engine. It's a foundational network administration and troubleshooting tool.

Nmap: the Network Mapper - Free Security Scanner

Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.

Как защищать данные, когда денег на ИБ мало: топ-5 Open Source сканеров для поиска уязвимостей

Привет, Хабр! Меня зовут Виктор Иевлев, руководитель отдела информационной безопасности группы компаний «Гарда» . Сегодня хочу поговорить о поиске и управлении уязвимостями. Стоит начать с того, что процесс управления уязвимостями – это непрерывный цикл, включающий в себя поиск, оценку, мониторинг и устранение уязвимостей в программном обеспечении и инфраструктуре. Зачастую крупные организации используют сразу несколько коммерческих сканеров. Но что делать небольшим компаниям или стартапам, у которых нет бюджета на дорогостоящие инструменты информационной безопасности? К счастью, на помощь кибербезу приходит Open Source. В статье приведу примеры конкретных Open Source инструментов, а также расскажу, для решения каких задач они подходят.

https://habr.com/ru/companies/garda/articles/978582/

#owasp_zap #Nikto #Nuclei #Wazuh #Nmap #поиск_уязвимостей #сканер_уязвимостей #open_source #сканер

Как защищать данные, когда денег на ИБ мало: топ-5 Open Source сканеров для поиска уязвимостей

Привет, Хабр! Меня зовут Виктор Иевлев, я руководитель отдела информационной безопасности группы компаний «Гарда» . Сегодня хочу поговорить о поиске уязвимостей. Стоит начать с того, что процесс...

Хабр

🧿 Nmap Basic to Advanced – Your Complete Scanning Guide

Nmap is one of the most essential tools for network exploration, security auditing, and vulnerability discovery. From quick host scanning to advanced enumeration, it gives defenders valuable insight into what exists inside a network and how it behaves. Learning Nmap step-by-step helps you move from simple port checks to full fingerprinting, service identification, and script-based analysis using NSE modules.

At the basic level, you’ll work with ping scans, port discovery, and OS detection to understand what devices are active and how they communicate. As you progress, you’ll start using advanced flags, stealth scanning techniques, firewall evasion, and Nmap Scripting Engine scans to uncover misconfigurations and weak services on a network. The more comfortable you get with options and timing controls, the more accurate and efficient your assessments become.

Whether you're securing your own systems or practicing ethical testing in a controlled environment, mastering Nmap helps you build strong fundamentals for reconnaissance, penetration testing, and network defense.

#Nmap #CyberSecurity #Networking #InfoSec #EthicalHacking

New Learning Tool Nmap Timing Visualizer

In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguments fun and interactive.

chickenpwny.github.io/NmapTimingTe...

#Nmap #PenetrationTesting #NetworkScanning

New tool: Interactive Nmap Timing Template Visualizer

In the spirit of helping others master Nmap, i made this widget for you to play with. Enjoy and i hope it makes learning about Nmap's timing arguements fun and interactive.

https://chickenpwny.github.io/NmapTimingTemplateVisualizer/

#Nmap #PenetrationTesting #NetworkScanning

Nmap Timing Template Visualizer

Solved: rootless kit startete erst mit Login

Frage zu #Raspberry
Ich habe einen #Pi im LAN, der ist per SSH erreichbar. Port ist dauerhaft verfügbar, sagt zumindest #nmap. Andere Ports nicht.
Logge ich mich via SSH ein, sind dann auch alle anderen erwarteten Ports von außen verfügbar.

Über #Docker läuft ein #PiHole
Weder der #DNS Port 53 ist ohne SSH Login erreichbar, noch die Weboberfläche.

Woran liegt das? 🤔
Mir fehlt gerade die Idee, was ich falsch eingestellt habe.

#Linux #SysAdmin

OSINT Tools in C/C++: Used by Intelligence and Security Services
Modern intelligence and cyber-reconnaissance units increasingly rely on **C and C++ tools** when **speed, resource control, and minimal digital footprint** are critical. Below is an overview of key tools and why these languages are preferred.
Classic OSINT Tools in C/C++
1. **Nmap (C/C++)**
The cornerstone network scanner for most OSINT tasks.
**Function:** Active and passive host discovery, service detection, OS fingerprinting.
**Feature:** Supports NSE scripts for automated reconnaissance.
2. **ZMap (C)**
Mass IPv4 scanning (e.g., one port across the entire IPv4 space in ~5 minutes).
Used for large-scale SIGINT/OSINT operations.
3. **Masscan (C)**
U.S. counterpart to ZMap, optimized for maximum speed.
Ideal for instant “network snapshots.”
4. **Tcpdump / libpcap (C)**
Passive packet capture.
Forms the backbone for packet analysis in intelligence systems.
5. **Bro/Zeek (C++)**
Network event analysis framework.
Detects anomalies and covert channels.
6. **YARA / YARA Rules Engine (C/C++)**
Signature-based detection of malware, documents, and archives.
Widely used in cyber intelligence.
7. **OpenSSL Toolkit (C)**
Certificate and TLS channel analysis.
Used to examine cryptographic infrastructure.
8. **ExifTool (C++)**
Metadata analysis for images and documents: device, timestamp, GPS.
9. **Tshark (C)**
CLI version of Wireshark for covert traffic analysis.
10. **Osquery (C++)**
Live-forensics system turning the host into a SQL-queryable database.
Why C/C++ Matters in Intelligence
**Maximum speed**
Native code is crucial for mass network scanning, data streams, and crypto operations.
**Resource control**
Direct management of memory, threads, and network buffers without overhead.
**Low-level access**
Raw sockets, system calls, filesystem, network interfaces.
**Deterministic behavior**
Predictable response times, no garbage collection delays.
**Minimal dependencies & portability**
Statically compilable binaries for Linux, Windows, BSD, or embedded systems.
**Integration with high-performance libraries**
OpenSSL, libpcap, Boost, ZLib for crypto, networking, and compression.
**Hardware-level optimization**
SIMD, vectorization, inline functions, assembly inserts.
Performance: C/C++ vs Interpreted Languages
Example: scanning 100,000 IPs for open ports.
Language Execution Time Reason C 3–5 sec Native code, minimal overhead C++ + Boost.Asio 4–6 sec Asynchronous, thread control Go 10–15 sec Runtime overhead, garbage collection Python 180–300 sec Interpretation, GIL, extra wrappers
**Conclusion:** Porting Python → C/C++ can give **50–100× speedup** for CPU- and I/O-intensive tasks.
Summary
C/C++ are the languages of choice for professional OSINT and intelligence tools where **speed, control, and low-level system/network operations** are required.
**Hashtags**
#OSINT #CPlusPlus #CProgramming #CyberIntelligence #SIGINT #NetworkAnalysis #Maltego #Nmap #ZMap #CyberSecurity #Forensics #MetadataAnalysis #OpenSourceIntelligence #Recon
**Bibliography / Must-Have References**
Gordon UA. *Preparations for war against Poland underway – Polish Chief of Staff*. 2025.
Eurointegration. *Polish Army Chief warns about pre-war threats*. 2025.
TVN24. *Polish Army Chief: Prepare forces for full-scale conflict*. 2025.
Nmap Official Documentation. https://nmap.org
ZMap Project. https://zmap.io
ExifTool Documentation. https://exiftool.org
YARA Rules Engine. https://virustotal.github.io/yara
Osquery Documentation. https://osquery.io

#nmap: My personal favorite network-security port-scanning tool.
Stable, consistent and highly reliable - for over 20 years now. 💌

If you have anything to do with computer-networks, you'll want to know it. 🥳

nmap's website has a page "where nmap appears in movies", as /the coolest hacker tool ever/ 😆 😎

https://nmap.org/movies/

Kali Linux Nedir? Etik Hacker’ların Tercih Ettiği Güvenlik Odaklı İşletim Sistemi

Siber güvenlik dünyasında adını sıkça duyduğumuz bir sistem var: Kali Linux.Pentest (sızma testi), adli bilişim analizi ve güvenlik araştırmaları denildiğinde akla gelen ilk işletim sistemlerinden biri olan Kali Linux, etik hacker’ların vazgeçilmez aracıdır.Peki, Kali Linux nedir, ne işe yarar ve neden bu kadar popülerdir? 💡 Kali Linux Nedir? Kali Linux, Debian tabanlı, açık kaynaklı ve