In this video, we looked at how to use nmap ping or port scan command to discover targets. We used the "pipe", "grep", "cut" commands to remove everything around the IPs and save just the IPs in a text file that can be uploaded onto scanning tools like Nessus or Nexpose etc. We also reviewed some basic nmap options and switches like -O, -sV, --traceroute, -A, -v, -vv, -p and -T1,2,3,4,5 to slow or speed the scanning process using the default nmap scan switch (-sS) or the TCP connect scan switch (-sT). Authorized site to use to practice your nmap skills: http://scanme.nmap.org/ The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?sub_confirmation=1 Patreon Support: https://www.patreon.com/kamilSec?fan_landing=true ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! Connect: Twitter: https://twitter.com/Kamilzak_1 Instagram: @Kamilzak1

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)
333 views

AI Automation for Business Professionals
118 views

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)
436 views

Governance Risk and Compliance (GRC)
498 views

Overview of the FedRAMP 800-53 Rev 5 New Test Case
822 views

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec
787 views