[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/r9k/ - ROBOT9001


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: IMG_4143.png (68 KB, 498x279)
68 KB
68 KB PNG
how likely am I to get in trouble for doing some network scans with nmap? I was using my school wifi and I was scanning this tech websites ports just out of curiosity and I never did anything with this info but now Im worried that I might get in trouble for unauthorised scans. How likely is that? Also how can I practice better OPSEC in the future? I should probably get a vpn but idk which one to get.
>>
>>84010556
Its not illegal to nmap
If you used some of the built in brute forcing scripts you will could get in trouble(still unlikely) but if you just shot some malformed packets syn their way you are fine
>>
>>84010629
Ah thanks anon. That makes me feel better. No nothing like that just a couple basic scans with -sn and -sS. But thanks for telling me that. That was a scare. Im going to do really good opsec now



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.