A bright (not so new star as a see from your videos but discovered you only today) star in the sky of itsec content creators. And I like your style. Of course, subscribed. And now a long weekend of watching your videos is ahead :) Good job !!!
@_CryptoCat3 жыл бұрын
thank you mate 🥰🥰🥰
@Italya33433 жыл бұрын
Many thanks for sharing brother!! Please more videos 🙏
@_CryptoCat3 жыл бұрын
thanks bro! that's the plan 😊
@edvinsjudins11093 жыл бұрын
great video! will definitely consider the UDP limitations rustscan has, love the content!
@_CryptoCat3 жыл бұрын
thank you! yep no UDP was very disappointing for me 😔
@benjaminbutton814 Жыл бұрын
Is it possible to scan multiple port ranges with RustScan? Let's say how nmap does it ( -p 10000-12000,12500-16500....). I tried to find the information on my own, but I couldn't.
@_CryptoCat Жыл бұрын
Had a look through the docs and played around with it myself but there doesn't appear to be! Seems like others have also requested this feature: github.com/RustScan/RustScan/issues/424
@Cossaw3 жыл бұрын
Hey really enjoying these reviews/tutorials! Just curious: Do you have any particular goals careerwise? Also, if someone is transitioning from a general pentesting methdology and want to practice more red team techniques, what changes? I suppose I just wanna know how different the general methodologies are when it comes to performing technical assessments. I'm a newbie so I hope you don't mind me asking for so much ^_^
@_CryptoCat3 жыл бұрын
thank you 🥰 i don't really have specific goals career wise haha 😆 i love doing HackTheBox machines and enjoyed OSCP so i guess some professional pentesting would be cool. i also really want to get better at binary exploitation and reverse engineering.. but then i also love doing web and forensics challenges and analysing malware 😂 i'm probably not the best person to ask about transitioning from pentesting to red teaming just because i haven't worked professionally in either but generally i'd say red teaming would be highly tailored to the client with more social engineering, custom exploits etc where pentesting can be as simple as just checking for known vulns with automated scanners, testing for known credentials etc. i imagine it's going to vary a lot from pentest to pentest (and red team to red team) though!
@Cossaw3 жыл бұрын
@@_CryptoCat Thank you very much! You are greatly appreciated :)
@xeno-vj3gc3 жыл бұрын
Love your videos. Keep em coming brother 💯
@_CryptoCat3 жыл бұрын
thank you 🥰
@CoolFire6663 жыл бұрын
Any idea if masscan would do better at finding those udp ports if you run it slower? At its default speed it's still a lot faster than having nmap do it, but missing open ports would make it near enough useless in real engagements imo.
@_CryptoCat3 жыл бұрын
yeh i'm pretty sure it would be! should of tried it really xD