#nmap
A question regarding #nmap:
If I want to see all supported TLS versions say on google.com:
```
nmap --script ssl-enum-ciphers -p443 google.com
Starting Nmap 7.70 ( https://nmap.org ) at 2021-06-22 16:14 CEST
Nmap scan report for google.com (142.250.184.238)
Host is up (0.0084s latency).
Other addresses for google.com (not scanned): 2a00:1450:4001:831::200e
rDNS record for 142.250.184.238: fra24s12-in-f14.1e100.net
PORT STATE SERVICE
443/tcp open https
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
| TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
```
Uh-oh: TLS 1.0???
But I need the information for a RADIUS Server:
```
nmap --script ssl-enum-ciphers -sU -p 1812 x.x.x.x
Starting Nmap 7.70 ( https://nmap.org ) at 2021-06-22 16:17 CEST
Nmap scan report for radius.example.org (x.x.x.x)
Host is up (0.00051s latency).
PORT STATE SERVICE
1812/udp open radius
MAC Address: EC:EB:B8:97:9C:38 (Hewlett Packard Enterprise)
Nmap done: 1 IP address (1 host up) scanned in 14.76 seconds
```
Is there a way to get the information I need?
How to Build a #Hacking Station with #RaspberryPi and #Kali #Linux
#Guide here: https://www.iottechtrends.com/build-hacking-station-with-raspberry-pi-kali-linux/
In this #tutorial, we saw how a malicious third party might launch an #attack against your home network. By simulating #cyberattacks in a controlled environment, you can identify potential #security #vulnerabilities before an attacker does.
#hack #hacker #internet #nmap #password #cyberwar #cybersecurity #instructions