Common ports and protocols
Here are a list of common ports and protocols you will see when scanning networks.
Hello, and welcome to my website! My name is Mark. I write about various topics, including software engineering, leadership, and cybersecurity.
You can subscribe to future posts using the feed.
Here are a list of common ports and protocols you will see when scanning networks.
Deauthentication attacks allow you to disconnect any device from any network, even if you are not connected to the network.
Learn how to use airodump-ng to sniff all Wi-Fi packets within range of your wireless adapter, even if you are not connected to the target's network.
If you want to be able to capture all packets within the range of your wireless device, you need to enable 'Monitor' mode. Here's a quick guide on how to do that.
You've probably heard the term 'MAC address' used a lot, but what is it, and what is it used for?