
How does an attack on a server start? That’s right, with reconnaissance! There are many port scanners available that can quickly and efficiently get the job done. However, a true hacker should understand how their favorite tools work. So today, for educational purposes, we’ll write our own scanner, and I’ll explain which scanning methods are best avoided.
Read full article →