Nmap is a powerful tool for network recon. However, when paired with other services, Nmap scan outputs can be used offensively as well. Today, on this episode of Cyber Weapons Lab, we’ll show you how hackers and pentesters would pipe Nmap scans into BruteSpray in order to brute-force passwords to network services.
Full Video: https://nulb.app/x4aaw
#eethical-hacking #cyber #nmap