• host discovery

    In this article you will learn several active and stealth techniques used to discover even highly cloaked hosts. Read more.

    port scanning

    Discovering open ports on a networked system is an important reconnaissance step used to enumerate potentially vulnerable services. In this article you will learn a number of techniques used to perform fast and reliable port scans while bypassing many trivial defenses. Read more.