Hi everyone, recently I've read about how most black hats don't actually search for specific targets but rather just set up an automatic scan of lots of random IP addresses, go to bed and come back in the morning to see the result.
How do they do that? Do they simply use nmap? Which commands do they use?
[link] [comments]
from hacking: security in practice https://ift.tt/32Adexj
Comments
Post a Comment