Introducing Network and Port Scanning using Nmap
Advanced Nmap Scanning and the Nmap Scripting Engine
Web Application Vulnerability Scanning with Nikto
Capturing and Analyzing Packets with TShark and TCPDump
Scanning Docker Containers with Grype
Web Application Vulnerability Scanning with Nikto
Ethical Hacking: Active Recon - Fuzzing web applications using the FFUF fuzzer
Ethical Hacking: Active Recon - Application reconnaissance using gobuster
Ethical Hacking: Active Recon - Enumeration and Fuzzing with Feroxbuster
Additional Tips for Enumerating and Fingerprinting Systems and Applications