Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA
Security Weekly
Data security, Vulnerability management

What’s That Web Server? – Enumerating HTTP Services

Paul AsadoorianJune 12, 2012

Learn how to use some useful scripts and tools to create an index page of all discovered HTTP(S) services:

Episode 291 Show Notes

Episode 291(mp3)

Tune in to Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our YouTube Channel or our Bliptv channel.

Paul Asadoorian
Paul Asadoorian

Paul Asadoorian is the founder of Security Weekly, which was acquired by CyberRisk Alliance. Paul spent time “in the trenches” implementing security programs for a lottery company and then a large university. Paul is offensive, having spent several years as a penetration tester. As Product Evangelist for Tenable Network Security, Paul built a library of materials on the topic of vulnerability management. When not hacking together embedded systems (or just plain hacking them) or coding silly projects in Python, Paul can be found researching his next set of headphones.

Related

Malware
Novel Bandit Stealer malware examined

SC StaffMay 30, 2023

Numerous web browsers and cryptocurrency wallets on Windows systems are being targeted by the new Bandit Stealer information-stealing malware, which could also evade Windows Defender, and be used to facilitate data breaches, account takeovers, identity theft, and credential stuffing attacks, reports The Record, a news site by cybersecurity firm Recorded Future.

(iStock via Getty Images)
Ransomware
Cyber insurance more popular than ever despite rising costs, ransomware threat

Derek B. JohnsonMay 30, 2023

Insurance premiums for ransomware are getting more expensive, but organizations continue purchasing cyber-specific plans, according to research and industry experts.

Smartphone map and navigation
Privacy
Senators scrutinize Google’s claim to delete users sensitive location data

Jessica DavisMay 25, 2023

After the Supreme Court overturned Roe v. Wade, Google committed to modifying data retention policies for sensitive locations that could put users at risk.

Related Events

  • Cybercast
    Playing network traffic cop in multi-cloud environments: A guide to detecting & restricting lateral movement

    On-Demand Event

  • Cybercast
    Why You Must Bolster Your Defense-in-Depth Strategy with Data Security

    On-Demand Event

  • Cybercast
    Ransomware & Zero Days: A 5-Step Action Plan to Avoid Becoming the Next Big Headline

    On-Demand Event

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.