back to the stars

  • 0 Posts
  • 1 Comment
Joined 1Y ago
cake
Cake day: Jun 14, 2023

help-circle
rss

I don’t actually know what bad actors can do.

Well, you’re not gonna like this but every pentesting / vulnerability scan starts with a port scan. It’s really there to probe a PC for anything interesting. Although it’s not strictly illegal because you’re just kindly asking a PC to handover any meta information on what is currently running on the PC exposed to the internet, the trajectory is clear and in the contrast the goal is opaque which makes it shady af.