Member-only story

Unleashing the Power of AI in Cybersecurity: Exploring 20 Essential Tools for Beginners — part II

Hartarto
4 min readMar 3, 2024

--

From Novice to Ninja: The Journey of a Cybersecurity Enthusiast

  • Embark on a thrilling adventure into the world of cybersecurity, equipped with the knowledge and tools to combat digital threats, safeguard networks, and protect critical assets.

Below, I’ll provide detailed steps along with complete scripts for utilizing each of the 20 cybersecurity tools mentioned earlier:

1. Metasploit Framework

Steps:

  1. Open a terminal in Kali Linux.
  2. Launch Metasploit Framework:
msfconsole

3. Use auxiliary modules for scanning:

use auxiliary/scanner/portscan/tcp

4. Set the target IP range:

set RHOSTS 192.168.1.0/24

5. Run the module:

run

2. Nmap (Network Mapper)

Steps:

  1. Open a terminal in Kali Linux.
  2. Run a basic network scan:
nmap 192.168.1.0/24

3. Wireshark

--

--

Hartarto
Hartarto

Written by Hartarto

Global Cyber Threat Analyst by day, capturing life's beauty through photography by night. Unraveling digital mysteries, painting with pixels

No responses yet