<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://techdoku.nogafam.es/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://techdoku.nogafam.es/feed.php">
        <title>NoBIGTech Wiki Técnico - docu:csheet:ofsec:info</title>
        <description></description>
        <link>https://techdoku.nogafam.es/</link>
        <image rdf:resource="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-22T04:09:26+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:mitmproxy_android_install&amp;rev=1599989392&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:netdiscover&amp;rev=1581193790&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:nmap&amp;rev=1752272385&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:sslscan&amp;rev=1581193042&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:whatweb&amp;rev=1581194099&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:wpscan&amp;rev=1581197251&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>NoBIGTech Wiki Técnico</title>
        <link>https://techdoku.nogafam.es/</link>
        <url>https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:mitmproxy_android_install&amp;rev=1599989392&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-09-13T09:29:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>mitmproxy_android_install</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:mitmproxy_android_install&amp;rev=1599989392&amp;do=diff</link>
        <description>Install MitmProxy (or other) CA Certificate on Android System Trusted ca-certs (NEEDS ROOT!)



In order to make Android devices trust our MitmProxy CA Certificate (or another CA of your wish), we need to install it on the device as a System Trusted Certificate</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:netdiscover&amp;rev=1581193790&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T20:29:50+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>netdiscover</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:netdiscover&amp;rev=1581193790&amp;do=diff</link>
        <description>Scan network device manufacturers and IPs



Scan the whole subnetwork or other network ranges with arp pinging.


# syntax (simple)
netdiscover -i INTERFACE -r NETRANGE

# examples:
netdiscover -i eth0
netdiscover -i wlan1 -r 192.168.0.0/16</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:nmap&amp;rev=1752272385&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-11T22:19:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>nmap</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:nmap&amp;rev=1752272385&amp;do=diff</link>
        <description>Map IP network ports with Nmap


# wow
nmap --mtu 488 -Pn -rF -O --top-ports 9000 THEIPTOSCAN

# other working example when SYN-ACK (-sS) method not working
nmap -v -sT -Pn -n --top-ports=100 THEIPTOSCAN

# complete scan working if using tor
nmap --top-ports 10 -sT -PN -n -sV -vv THEIPTOSCAN</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:sslscan&amp;rev=1581193042&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T20:17:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sslscan</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:sslscan&amp;rev=1581193042&amp;do=diff</link>
        <description>Get SSL/TLS vulnerable information about a website



Obtain SSL and TLS information about the actual implementations supported by the selected server/domain


# syntax
sslscan HOST:port

# examples:
sslscan kali.org:443
sslscan 192.168.1.1:443</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:whatweb&amp;rev=1581194099&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T20:34:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>whatweb</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:whatweb&amp;rev=1581194099&amp;do=diff</link>
        <description>Gather information about the software used by a website



Get what software and server version and web applications the server might be using, and some more relevant information.

whatweb -v https://anexamplesite.com</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:wpscan&amp;rev=1581197251&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T21:27:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wpscan</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:info:wpscan&amp;rev=1581197251&amp;do=diff</link>
        <description>WordPress WPScan Analizing tool



This tool can analyze WordPress sites to search for vulnerable settings/plugins
and mostly common vulnerabilities.


# -v                  | verbose
# --url URL           | the url of the target website
# --rua               | use a random user agent on HTTP requests
# -e vp               | vulnerable plugins mode (vp)
# --plugins-detection | aggressive: it will scrap web urls the hardcore way
wpscan -v --url https://thewebsite.com --rua -e vp --plugins-detecti…</description>
    </item>
</rdf:RDF>
