Purple Team
Published in

Purple Team

Network scanning and enumeration

As a security professional, you must accumulate as much information as possible and attempt to stay undetected.

By Lynda.com

Enumeration is characterized as the way of extracting client names, device names, network assets, and services from a framework. In this stage, the aggressor makes an active association with the target framework and performs directed queries to acquire data about the objective by which an attacker…




Help cybersecurity professionals to enhance their knowledge.

Recommended from Medium

Telegram Gating: NFTYConnect’s Newest Integration!

Why you should reconsider your Wyze security camera.

Wyze Logo

WS-2016-7107: CSRF tokens in Spring and the BREACH attack

It’s time to mint the Meelon!

Understanding Decentralized Storage

SifChain ( Rowan )On Ascendex Exchange

Article on Iranian Nuclear Plant Attack

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Artykov

David Artykov

Cybersecurity Professional

More from Medium

Testing EDRs for Linux — Things I wish I knew before getting started

Tools for internet anonymity and in case of internet blockage (Part 2).

Bash Tricks for File Exfiltration over HTTP/S using Flask

Raspberry Pi Network Vulnerability Scanner OpenVas