<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Ruwan Sanjeewa on Medium]]></title>
        <description><![CDATA[Stories by Ruwan Sanjeewa on Medium]]></description>
        <link>https://medium.com/@devzenmaster?source=rss-e89936eeecc3------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*9RY5aod_3Eh3UVC4</url>
            <title>Stories by Ruwan Sanjeewa on Medium</title>
            <link>https://medium.com/@devzenmaster?source=rss-e89936eeecc3------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 14:38:48 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@devzenmaster/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[ Cross-Platform Development: Streamlined Development for Every Screen]]></title>
            <link>https://devzenmaster.medium.com/cross-platform-development-streamlined-development-for-every-screen-a3005cbf97d9?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/a3005cbf97d9</guid>
            <category><![CDATA[ai-technology]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[flutter-and-react-native]]></category>
            <category><![CDATA[mobile-app-development]]></category>
            <category><![CDATA[cross-platform-apps]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Thu, 19 Feb 2026 20:33:39 GMT</pubDate>
            <atom:updated>2026-02-19T20:33:39.755Z</atom:updated>
            <content:encoded><![CDATA[<blockquote>Software teams face the same pressure: <strong>build fast, reduce cost, reach more users</strong>.</blockquote><blockquote>Cross-platform development solves this problem. You write <strong>one codebase</strong>, and deliver apps for <strong>Android, iOS, web, and desktop</strong>. This approach improves <strong>speed, control, and long-term growth</strong>.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*locNVkAgxqF7V4JKR7zvxw.png" /></figure><h3><strong>📌 What Is Cross-Platform App Development?</strong></h3><p>Cross-platform app development uses a <strong>single codebase</strong> to build applications that run on multiple platforms: <strong>iOS, Android, web, and desktop</strong>.</p><p>Instead of writing separate code for each platform, you write once and deploy everywhere using frameworks such as <a href="https://flutter.dev/"><strong>Flutter</strong></a>, <a href="https://reactnative.dev/"><strong>React Native</strong></a>, and <a href="https://ionicframework.com/"><strong>Ionic</strong></a>.</p><p>This reduces duplication and accelerates delivery.</p><p><strong>Example Conceptual Diagram</strong>:</p><h3>🧩 How Major Cross-Platform Frameworks Differ</h3><p>Each framework supports a different development goal.</p><h4>⚛️ React Native</h4><p>React Native focuses on mobile-first development with strong native integration. You build shared logic while keeping native UI performance.<br>This works well for complex apps that later expand to web and desktop.</p><h4>🎯 Flutter</h4><p>Flutter delivers consistent UI across platforms using its own rendering engine. It uses Dart, a strongly typed language that improves code quality and reliability. Flutter works well for apps that rely on custom UI and animation.</p><h4>🌐 Ionic with Capacitor</h4><p>Ionic follows a web-first strategy. You build with HTML, CSS, and JavaScript, then deploy to mobile using Capacitor. This approach fits teams converting web apps into mobile products fast.</p><p><strong>Example Code Snippet (Flutter “Hello World”)</strong>:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*M9XR6yT2_l-6TqfT-gtxHg.png" /><figcaption>Flutter “Hello World”</figcaption></figure><h3>📅 Why 2026 Is a Turning Point for Cross-Platform Apps</h3><p>Several forces are pushing cross-platform development into the mainstream.</p><h4>💸 Rising Development Costs and Talent Shortages</h4><p>Hiring separate iOS and Android teams increases cost and complexity. Cross-platform development reduces this burden with <strong>one team, one codebase</strong>.</p><blockquote>According to <a href="https://www.gartner.com/en">Gartner</a>, global software development spending has increased by over <strong>30% in the last five years</strong>.</blockquote><h4>⚡ Speed as a Competitive Advantage</h4><p>Simultaneous releases on multiple platforms accelerate feedback and innovation.</p><blockquote><a href="https://www.mckinsey.com/">McKinsey &amp; Company</a> reports that high-performing IT organizations achieve <strong>up to 35% higher revenue growth</strong>.</blockquote><h4>🚀 Framework Maturity and Performance Gains</h4><p>Earlier cross-platform tools struggled with performance. Modern frameworks now offer near-native speed and full device access. For most business apps, performance gaps are minimal.</p><h3>📱 Key Trends Driving Cross-Platform Adoption</h3><h4>🖥️ Unified Development Across Devices</h4><p>One codebase now supports mobile, web, and desktop apps. This improves consistency and reduces duplicated work.</p><h4>🤖 AI-Driven Application Features</h4><p>AI is now a baseline expectation. According to <strong>IDC</strong>, more than 60 percent of mobile apps will include AI features by 2026. Cross-platform development lets you add AI once and deploy everywhere.</p><h4>🏢 Growing Enterprise Adoption</h4><p>Large organizations now trust cross-platform frameworks for critical systems. One codebase improves security control and long-term maintenance.</p><h3>🛠️ Tools Shaping the Cross-Platform Ecosystem</h3><h4>⚛️ React Native</h4><p>React Native supports fast iteration and native-like performance. Used widely for consumer apps and enterprise dashboards.</p><h4>🎨 Flutter</h4><p>Flutter excels in UI consistency and smooth animation. Ideal for design-focused applications.</p><h4>🧱 .NET MAUI</h4><p><strong>.NET MAUI</strong> fits teams already using C# and Microsoft tools.</p><h4>🔗 Kotlin Multiplatform</h4><p><strong>Kotlin Multiplatform</strong> shares business logic while keeping native UI.</p><h3>💼 Business Advantages of Cross-Platform Apps</h3><h4>💰 Cost Efficiency</h4><p>One codebase reduces development and maintenance costs.</p><h4>🎯 Consistent User Experience</h4><p>Users get the same features across devices. This builds trust.</p><h4>🔧 Simple Maintenance and Scalability</h4><p>Updates apply everywhere. This supports long-term growth.</p><h3>🌍 Faster Market Expansion</h3><p>Launching on multiple platforms at once increases reach.</p><h4>⚖️ Cross-Platform vs Native Development</h4><h3>📊 Measuring ROI from Cross-Platform Development</h3><p>Cross-platform development delivers long-term value.</p><p>Faster releases.<br>Better retention.<br>Easier adaptation.</p><p>Teams using this approach are ready for future platforms without rebuilding.</p><h3>🏁 Final Insight</h3><p>Cross-platform development is no longer a compromise.</p><p>It is a smart engineering decision.</p><p>One codebase.<br>Many platforms.<br>Clear impact.</p><h3>📲 Connect with Me</h3><p>If you want to discuss <strong>AI, cybersecurity, or technology</strong>, reach out through any of these channels:</p><p><strong>YouTube:</strong> <a href="https://www.youtube.com">DevZenMaster</a><br> <strong>LinkedIn:</strong> <a href="https://www.linkedin.com">Ruwan Sanjeewa</a><br> <strong>WhatsApp Channel:</strong> <a href="#">Join Here</a><br> <strong>Website:</strong> <a href="https://www.ruwansanjeewa.com">www.ruwansanjeewa.com</a></p><p>✍️ Written by <strong>Ruwan Sanjeewa | DevZenMaster</strong><br> 📅 February 20, 2026</p><p>🔗 Follow for <strong>insights on AI, cybersecurity, and ethical technology</strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a3005cbf97d9" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[ AI Hallucinations: When Machines Get It Wrong]]></title>
            <link>https://devzenmaster.medium.com/ai-hallucinations-when-machines-get-it-wrong-884bbdd7d38d?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/884bbdd7d38d</guid>
            <category><![CDATA[data-science]]></category>
            <category><![CDATA[ai-hallucination]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[ethical-ai]]></category>
            <category><![CDATA[large-language-models]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Fri, 07 Nov 2025 22:06:44 GMT</pubDate>
            <atom:updated>2025-11-07T22:06:44.810Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vDj59fPcpK16EfrmMerfzg.png" /></figure><p>Artificial Intelligence (AI) hallucinations happen when AI models output factually incorrect, nonsensical, or surreal information. 🌐 These hallucinations show a hidden danger: AI can be confident but wrong, potentially impacting businesses, research, and decisions.</p><p>Flawed training data or model design is often the root cause. Bias, incompleteness, or errors in data make AI predict incorrectly, producing outputs that seem credible but are false.</p><p>AI is used across retail, travel, education, customer service, and healthcare. 🚀 Understanding hallucinations is key to using AI responsibly.</p><h3>🤯 What Exactly Is an AI Hallucination?</h3><p>AI hallucinations occur when generative models — like chatbots or image recognition systems—misinterpret patterns in training data. 📊</p><p>They range from small factual errors to completely surreal outputs, including nonsensical text or impossible visuals.</p><h3>🔹 Hallucination Examples You Should Know</h3><ul><li>🏛️ Historical inaccuracies</li><li>🌍 Geographical errors</li><li>💰 Incorrect financial data</li><li>⚖️ Inept legal advice</li><li>🔬 Scientific inaccuracies</li></ul><h3>⚙️ Why AI Hallucinates: Inside the Black Box</h3><p>AI doesn’t think like humans. It predicts outcomes based on probability, choosing the most likely next word, pattern, or result. Errors appear when the AI learns from flawed data or when model design allows unchecked outputs.</p><h3>🔹 Main Causes of AI Hallucinations</h3><p><strong>1. 🧠 Biased or Limited Training Data</strong><br> AI learns from large datasets, but if the data is biased, inaccurate, or incomplete, hallucinations appear as “confident mistakes.”</p><p><strong>2. 💡 Complex Models Without Limits</strong><br> Highly complex models can produce unpredictable results. Limiting the AI’s probabilistic range reduces hallucinations.</p><p><strong>3. 🧨 Data Poisoning</strong><br> Malicious actors can inject false or misleading data. This may lead to misclassification in images or cybersecurity vulnerabilities.</p><p><strong>4. 🔁 Overfitting</strong><br> An overfitted model memorizes training data but fails to generalize. Example: a model trained on people standing next to lamps might identify lamps as humans. Overfitting causes the AI to learn irrelevant noise instead of meaningful patterns.</p><h3>🌍 The Industry Impact of AI Hallucinations</h3><p>AI hallucinations affect multiple sectors, with consequences that can be serious.</p><h3>🏥 Healthcare Risks</h3><p>AI can assist doctors in detecting medical conditions, but hallucinations may cause <strong>false positives</strong>—identifying issues like cancer in healthy patients.</p><p>Errors arise when training data doesn’t distinguish healthy from diseased examples, preventing the AI from recognizing natural variations like benign lung spots. This can lead to unnecessary or harmful treatments.</p><h3>💸 Financial Consequences</h3><p>Banks and investment firms rely on AI for stock predictions, risk analysis, and financial advice. Hallucinations can cause <strong>bad investment decisions</strong> or poor debt management guidance.</p><p>Since many companies don’t disclose AI involvement, consumers may trust flawed outputs as expert advice. Widespread use of unreliable AI could even contribute to economic instability.</p><h3>📣 Marketing and Branding Risks</h3><p>AI-generated content must align with brand tone. Hallucinations may produce <strong>false claims, misleading promises, or inaccurate product details</strong>, damaging credibility and eroding customer trust.</p><h3>🔍 Strategies to Reduce AI Hallucinations</h3><p>While hallucinations cannot be fully eliminated, they can be controlled.</p><h3>🔹 Prioritize High-Quality Data</h3><p>AI is only as good as its training data. Diverse, balanced, and structured datasets reduce errors. 🧾</p><h3>🔹 Evaluate and Validate Models</h3><p>Rigorous testing, validation, and ethical development catch hallucinations early. Techniques include:</p><ul><li>Structured prompts</li><li>Predefined data templates</li><li>Probabilistic thresholds to limit broad predictions</li></ul><h3>🔹 Educate Users</h3><p>People often assume AI is objective. Teaching users about AI limitations helps them spot hallucinations and make informed decisions. 🎓</p><h3>🔹 Introduce Human Oversight</h3><p>Human review is essential. Subject matter experts can validate outputs, particularly in specialized fields. Hybrid systems, combining AI efficiency with human judgment, reduce errors and improve reliability. 👥</p><h3>🎨 The Silver Lining: When Hallucinations Inspire Creativity</h3><p>Not every hallucination is bad. In creative fields, <strong>controlled imagination</strong> can produce innovation.</p><p>🎭 <strong>Art &amp; Design:</strong> AI generates surreal visuals and story ideas.<br> 🎮 <strong>Gaming &amp; VR:</strong> Hallucinations make virtual worlds unpredictable and exciting.<br> 📊 <strong>Data Visualization:</strong> Sometimes “creative error” exposes hidden trends.</p><p>In creative work, hallucination = inspiration.<br> In critical work, hallucination = danger.</p><h3>🧭 What You Should Do</h3><p>Until AI becomes consistently factual, follow these steps:</p><p>🔍 Verify every claim before acting.<br> ✅ Check sources before sharing AI content.<br> 👨‍⚕️ Get expert confirmation in health or legal issues.<br> 💬 Report hallucinations to improve system training.<br> 📚 Understand AI’s limits—it predicts, not knows.</p><h3>💡 The Bottom Line</h3><p>The goal isn’t to create <strong>perfect AI</strong>, but <strong>trustworthy AI</strong>.<br> We won’t fully remove hallucinations — but we can detect, manage, and minimize them.</p><p>AI doesn’t think.<br> It predicts.</p><p>So humans must <strong>verify, question, and guide</strong> every answer.<br> In a time when machines speak with confidence even when wrong — <strong>critical thinking is your strongest defense.</strong> 🧠⚡</p><h3>🌟 Key Takeaways</h3><p>AI hallucinations remind us that even advanced technology can mislead. Confidence does not equal correctness.</p><p>Combining <strong>high-quality data</strong>, <strong>ethical practices</strong>, <strong>human oversight</strong>, and <strong>user awareness</strong> ensures AI is <strong>trustworthy, accurate, and effective</strong>. ⚖️ Recognizing and managing hallucinations is critical for safe AI adoption.</p><h3>📲 Connect with Me</h3><p>If you want to discuss AI, cybersecurity, or technology:</p><p>📺 <strong>YouTube</strong> — <a href="https://www.youtube.com/@DevZenMaster">DevZenMaster</a><br>💼 <strong>LinkedIn</strong> — <a href="https://www.linkedin.com/in/ruwansanjeewa/">Ruwan Sanjeewa</a><br>💬 <strong>WhatsApp Channel</strong> — <a href="https://whatsapp.com/channel/0029Vakwz2lHbFV0SwSGvr1s">Join Here</a></p><p>✍️ <em>Written by Ruwan Sanjeewa | DevZenMaster</em><br> 📅 <em>November 2025</em><br> 🔗 <em>Follow for insights on AI, cybersecurity, and ethical technology.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=884bbdd7d38d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[️ Penetration Testing කියන්නේ මොකද්ද?]]></title>
            <link>https://devzenmaster.medium.com/%EF%B8%8F-penetration-testing-%E0%B6%9A%E0%B7%92%E0%B6%BA%E0%B6%B1%E0%B7%8A%E0%B6%B1%E0%B7%9A-%E0%B6%B8%E0%B7%9C%E0%B6%9A%E0%B6%AF%E0%B7%8A%E0%B6%AF-c6eb1ff365ca?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/c6eb1ff365ca</guid>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Wed, 05 Nov 2025 20:43:54 GMT</pubDate>
            <atom:updated>2025-11-05T20:48:21.020Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-uvVaTiQ_NhG_UpYAXMavQ.png" /><figcaption>Penetration Testing—identifying vulnerabilities before attackers do.</figcaption></figure><p>Penetration Testing (හෝ “Ethical Hacking”) කියන්නේ organization එකක systems, networks, web apps, APIs, cloud infrastructure වගේ assets වල තියෙන vulnerabilities සොයාගැනීමක්.</p><p>අපි attackers ලා exploit කරන හැටි simulate කරලා real-world risk එක <strong>measure</strong> කරනවා.<br> ඒ කියන්නේ — “අපේ system එක attack එකකට බලපාන්නේ කොහොමද?” කියලා practical way එකකින් test කරන එක.</p><p>මේ test එකෙන් organization එකට <strong>security improve කරගන්න</strong>, <strong>weak points identify කරගන්න</strong>, සහ <strong>mitigation plan එකක් build කරගන්න</strong> support එකක් ලැබෙනවා.</p><h3>⚙️ Pen Test කිරීමේ ප්‍රධාන වර්ග (Main Types of Penetration Testing)</h3><ul><li>🌐 <strong>External Network Penetration Test</strong> — Internet-facing systems test කරනවා.</li><li>🏢 <strong>Internal Network Penetration Test</strong> — Internal environment එක simulate කරනවා.</li><li>🌍 <strong>Web Application Penetration Test</strong> — Web apps &amp; APIs test කරනවා.</li><li>📶 <strong>Wireless / Mobile / IoT Penetration Test</strong> — Wi-Fi, mobile apps, IoT devices secureද කියලා බලනවා.</li><li>☁️ <strong>Cloud Penetration Test</strong> — AWS, Azure, GCP වගේ cloud infra assess කරනවා.</li><li>🎯 <strong>Red Team Exercises</strong> — Full attack simulation against the organization.</li><li>🏢 <strong>Physical Pen Testing</strong> — Physical access controls test කරනවා (door locks, ID systems, etc.)</li></ul><h3>🧭 Typical Phases of a Pen Test (පියවර)</h3><ol><li><strong>Scope &amp; Rules of Engagement (ROE)</strong> — boundaries, permissions, timelines define කරනවා.</li><li><strong>Reconnaissance</strong> — Passive &amp; Active information gathering.</li><li><strong>Scanning &amp; Enumeration</strong> — Open ports, services, and users identify කරනවා.</li><li><strong>Exploitation</strong> — Weak points exploit කරලා access test කරනවා.</li><li><strong>Post-Exploitation</strong> — Privilege escalation, data access, persistence check කරනවා.</li><li><strong>Reporting &amp; Remediation</strong> — Findings, severity, and fixes explain කරනවා.</li><li><strong>Re-test</strong> — Fixes verify කරන final stage එක.</li></ol><h3>🧰 Common Tools (ප්‍රසිද්ධ Tools)</h3><p><strong>🔎 Network Discovery</strong> — Nmap → Port scan, host detection<br> <strong>🌐 Web App Testing</strong> — Burp Suite, OWASP ZAP → Web traffic proxy, scanner<br> <strong>🧩 Vulnerability Scanning</strong> — Nessus, OpenVAS → Detect known weaknesses<br> <strong>📂 Enumeration</strong> — Nikto, Dirb, Gobuster → Find directories &amp; hidden files<br> <strong>📡 Traffic Analysis</strong> — Wireshark, tcpdump → Capture and analyze network packets<br> <strong>🔐 Brute-force Testing</strong> — Hydra, Medusa → Password strength testing<br> <strong>🌍 Subdomain Enumeration</strong> — Amass, Sublist3r → Identify hidden subdomains<br> <strong>🏢 Active Directory Assessment</strong> — Impacket, CrackMapExec, BloodHound, Mimikatz → AD &amp; privilege testing</p><h3>✅ Ethical &amp; Legal Checklist (නීතිමය සහ සදාචාරික අංශ)</h3><p>🔒 <strong>Do not perform testing without permission.</strong><br> 🔖 Scope, boundaries, and targets <strong>must be signed</strong> before testing.<br> ⚠️ Critical systems (backup, hospital, life-saving systems) avoid කරන්න.<br> 🧾 Always sign <strong>NDA (Non-Disclosure Agreement)</strong> to protect sensitive data.<br> 📊 Reports must include <strong>risk levels</strong> and <strong>prioritized fixes</strong> (what to fix first).</p><h3>🚀 How to Learn Penetration Testing (ඉගෙනගන්න විදිහ)</h3><ol><li><strong>Learn the basics</strong> — Networking (IP, Ports, TCP/UDP), Linux commands, Windows basics.</li><li><strong>Understand the web</strong> — HTTP, HTML, JavaScript, cookies, sessions, APIs.</li><li><strong>Earn certifications</strong> — CEH, CompTIA Pentest+, eJPT, OSCP.</li><li><strong>Practice legally</strong> — Join CTF competitions, bug bounty programs, or use platforms like Hack The Box &amp; TryHackMe.</li></ol><p>ඉගෙනගන්න එකේ අරමුණ තමයි “attackersලගේ mindset එක ethically use කරලා systems secure කිරීම.”</p><h3>📢 Follow for More Cybersecurity Insights!</h3><p>📺 <strong>YouTube</strong> — <a href="https://www.youtube.com/@DevZenMaster">DevZenMaster</a><br> 💼 <strong>LinkedIn</strong> — <a href="https://www.linkedin.com/in/ruwansanjeewa/">Ruwan Sanjeewa</a><br> 💬 <strong>WhatsApp Channel</strong> — <a href="https://whatsapp.com/channel/0029Vakwz2lHbFV0SwSGvr1s">Join Here</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c6eb1ff365ca" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Zero to Hero in Scanning & Enumeration: Sinhala-English Beginner’s Guide]]></title>
            <link>https://devzenmaster.medium.com/zero-to-hero-in-scanning-enumeration-sinhala-english-beginners-guide-b25994878919?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/b25994878919</guid>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[tech-education]]></category>
            <category><![CDATA[network-security]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Sun, 03 Aug 2025 21:06:18 GMT</pubDate>
            <atom:updated>2025-08-04T21:15:02.951Z</atom:updated>
            <content:encoded><![CDATA[<blockquote>“You’ve scanned the network — now what? Welcome to <strong>Enumeration</strong>, where ethical hackers extract usernames, shares, and secrets.”</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iFgzX10oExtIQDF0Xoshnw.png" /><figcaption>Master the essentials of network scanning &amp; enumeration—from beginner to pro with Sinhala-English insights!</figcaption></figure><blockquote>Ethical hacking isn’t just Nmap and ports — let’s <strong>get inside the system</strong> with enumeration techniques every pro uses. 💻💣</blockquote><h3>🌐🔍 What is Network Scanning?</h3><p><strong>Network Scanning</strong> කියන්නෙ network එකක active devices හඳුනාගන්න process එකක්. මේක system-level “ping” වගේ signals යවා, එම devices වලින් responses receive කරලා ඔවුන් active ද, මො​න service ද run වෙන්නේ කියලා verify කරනවා.</p><p>මේක <strong>ethical hacking</strong> වලදිත්, <strong>network management</strong> වලදිත්, <strong>vulnerability assessment</strong> වලදිත් වඩාත්ම වැදගත් role එකක් play කරන technique එකක්.</p><h3>⚙️ Network Scanning කොහොමද වැඩ කරන්නේ?</h3><p>📥 <strong>Active Scanning</strong></p><ul><li>IP address range එකකට “ping” signals යවලා active systems find කරනවා</li><li>Response එක receive වෙලා තියෙනවා නම්, ඒ system එක “live” කියලා mark වෙනවා</li><li>ඉන්පසු further protocols (Eg: TCP, ARP, ICMP) භාවිතා කරලා deep information එකක් collect කරනවා</li></ul><p>📡 <strong>Passive Scanning</strong></p><ul><li>Network traffic continuously monitor කරනවා</li><li>Malicious code, unusual packet behavior detect කරනවා</li><li>No active signal is sent → Silent observation</li></ul><h3>🧑‍💻 Network Scanning Tools</h3><p>Popular tools:</p><ul><li>🔍 <strong>Nmap</strong> — Open-source port &amp; network mapper</li><li>🛡️ <strong>Nessus</strong>, <strong>OpenVAS</strong> — Vulnerability scanners</li><li>📈 Tools with dashboards for reporting (commercial tools like SolarWinds, Qualys, etc.)</li></ul><h3>📌 Why Network Scanning is Important?</h3><p>🔐 Cybersecurity threats escalate every day.<br> Network scanning helps to:</p><ul><li>Discover connected devices</li><li>Detect open ports &amp; services</li><li>Find vulnerabilities</li><li>Identify suspicious activity</li><li>Maintain up-to-date network health status</li></ul><h3>🗺️ Network Scanning Steps :</h3><ol><li><strong>Inventory</strong> — Devices connected to the network detect කරලා list එකක් හදාගන්නවා</li><li><strong>Network Map</strong> — Devices connect වෙලා තියෙන ආකාරය visually represent කරන්න</li><li><strong>Health &amp; Vulnerability Check</strong> — ARP/ICMP protocols use කරලා system-level risks හඳුනාගන්න</li><li><strong>Analysis &amp; Reporting</strong> — Dashboard/report එකක් හරහා info present වෙනවා</li><li><strong>Mitigation Suggestions</strong> — Based on results, fix recommendations provide කරනවා</li></ol><h3>📋 Best Practices for Network Scanning</h3><ul><li>📅 <strong>Regular Scans</strong> — Internal + external devices frequent check කරන්න</li><li>🗂️ <strong>Document Findings</strong> — For audit trails, troubleshooting, and planning</li><li>🎯 <strong>Prioritize Critical Assets</strong> — Not all devices are equal</li><li>🔄 <strong>Update Scan Parameters</strong> — Reduce false positives &amp; negatives</li><li>⚙️ <strong>Automate Scans</strong> — Schedule at low-traffic times</li><li>🧑‍🔧 <strong>Review &amp; Tune Settings</strong> — Always adapt based on results</li></ul><h4>🧠 Final Thought</h4><blockquote><strong><em>Network Scanning</em></strong><em> = </em>“Your first defense and first attack point in cyber space.”<em><br> ඔබ network එක secure කරන්න උත්සාහ කරනවා නම්, </em><strong><em>know your environment</em></strong><em> is the golden rule. Scanning tools give you that visibility.</em></blockquote><h3><strong>⚔️ Importance in Penetration Testing</strong></h3><p>Penetration testing කියන එකේ එක හුඟාක් important stage එකක් තමයි Network Scanning.</p><ul><li>🔐 <strong>Security Audits</strong>: Scanning results use කරලා vulnerabilities find කරන්න පුළුවන්.</li><li>🧩 <strong>Planning Exploits</strong>: Scanning data වලින් ඔයාට හොඳම attack path එක plan කරන්න පුළුවන්.</li><li>📋 <strong>Documentation</strong>: Ethical hacking report එකකට Scanning logs, output එක්කproof ලබාදෙන්න පුළුවන්.</li></ul><h3>🕵️‍♂️ Active vs Passive Scanning</h3><p>Ethical hacker කෙනෙක් විදිහට, ඔයාට තේරුම් ගන්න ඕනේ scanning method දෙකක් තියෙනවා:</p><p>🔴<strong> Active Scanning</strong></p><ul><li>මෙහිදී tool එක network එකට <strong>packets send කරලා</strong> responses analyze කරනවා.</li><li>උදා: nmap, masscan</li><li><strong>මට කියන්න තියෙන්නේ:</strong> මේක fast and accurate, but detectable by firewalls/IDS.</li></ul><p><strong>🟢 Passive Scanning</strong></p><ul><li>මෙහිදී <strong>observe කරනවා existing traffic</strong> (without generating packets).</li><li>Tool: Wireshark, tcpdump</li><li><strong>Stealthy</strong>, but <strong>slow</strong> and <strong>less detailed</strong>.</li></ul><p>📌 <em>Tip:</em> Red Teaming කරනකොට Passive methods first use කරලා, afterward Active use කරන්න.</p><h3>📌 Additional Tips &amp; Suggestions</h3><p><strong>✅ Common Use Cases:</strong></p><ul><li>🔎 Asset discovery (කොයි devices තියෙන්නේද?)</li><li>🧱 Firewall rule bypass check කිරීම</li><li>🕳️ Port &amp; service enumeration</li><li>🔍 Detecting rogue devices</li></ul><h4>🧠 <strong>Learn These Concepts with Tools:</strong></h4><p>🔍 <strong>Ping Sweep</strong> — Use <strong>Nmap</strong><br> 📡 <strong>Port Scan</strong> — Use <strong>Nmap</strong> or <strong>Masscan</strong><br> 🔧 <strong>Service Enumeration</strong> — Use <strong>Nmap</strong> with -sV<br> 💻 <strong>OS Detection</strong> – Use <strong>Nmap</strong> with -O<br> 👂 <strong>Passive Sniffing</strong> – Use <strong>Wireshark</strong></p><h4>🏁 <strong>Summary</strong></h4><p>🔍 <strong>Network scanning</strong> කියන්නේ <strong>target network එක explore</strong> කරන process එකක්.</p><p><strong>📡 මේකෙන් ඔයාට:</strong></p><ul><li>✅ <strong>Live devices</strong></li><li>🚪 <strong>Open ports</strong></li><li>🛠️ <strong>Running services</strong></li><li>⚠️ <strong>Weaknesses </strong>හොඳින් <strong>identify</strong> කරන්න පුළුවන්.</li></ul><p><strong>⚡ Active scanning:</strong></p><ul><li>Fast 🏃‍♂️</li><li>Detailed 📋</li><li>But easily <strong>detectable</strong> 👀</li></ul><p><strong>🕵️‍♂️ Passive scanning:</strong></p><ul><li><strong>Stealthy</strong> 🫥</li><li>But <strong>limited</strong> in detail 📉</li></ul><p>🧑‍💻 <strong>Ethical hacking</strong> වලදි:<br> ✅ Proper scanning = 📈 Better results!</p><h3>🔄 Types of Network Scans</h3><h4>✅ Host Scanning</h4><p>IP range එකේ hosts check කරනවා. Reply නැති systems = potentially vulnerable.</p><h4>✅ Port Scanning</h4><p>Ports check කරලා open, closed, or filtered state determine කරනවා. (Eg: TCP SYN Scan, UDP Scan)</p><h4>✅ Network Scanning</h4><p>Overall IP address range එක scan කරලා connected systems, operating systems, services identify කරනවා.</p><h4>✅ External Vulnerability Scan</h4><p>Outside-in view එකෙන් outdated firewalls, unpatched systems, exposed services detect කරනවා.</p><h4>✅ Total Assessment Scan</h4><p>All IPs + device patching status, antivirus presence, EDR tools availability, etc. check කරනවා.</p><h4>✅ Penetration Testing (Ethical Hacking)</h4><p>Controlled attack simulate කරලා vulnerabilities practically identify කරන method එක. (⚠️ <em>Client approval required</em>)</p><h3>1️⃣🔍 What is Host Scanning (Host Discovery)?</h3><p><strong>Host Scanning</strong> කියන්නේ network එකක <strong>live hosts</strong> (active devices) හඳුනාගන්න process එකක්.<br> මෙම technique එක network administrators සහ security professionalsලා use කරනවා:</p><ul><li>Network map එකක් හදාගන්න</li><li>Vulnerability scanning එකට groundwork create කරන්න</li><li>Unauthorized devices detect කරන්න</li></ul><p>👉 Attackersලාටත් මේක <strong>first step</strong> එකක් වශයෙන් use කරන්න පුළුවන් — to identify attack targets.</p><h3>⚙️ Host Scanning වැඩ කරන හැටි (How it Works)</h3><h4>📶 1. Ping (ICMP Echo Requests)</h4><p>Most common method එක.<br> 👉 ICMP echo requests (ping) send කරලා, echo reply receive උනොත් host එක active කියලා mark කරනවා.</p><h4>🔌 2. TCP/UDP Probes</h4><p>TCP SYN or UDP packets specific ports වලට යවනවා.<br> 👉 If connection success/full response → Host is online.</p><h4>🌐 3. SCTP INIT Scans</h4><p>SCTP protocol එක use කරලා INIT chunks යවනවා to probe hosts (less common but useful in specific networks).</p><h4>🧭 4. Reverse DNS Lookups</h4><p>IP addresses වලට අදාළ hostnames identify කරනවා.<br> 👉 Hostname resolve වෙයි නම්, device එක network එකේ active වෙන්න පුළුවන් indication එකක්.</p><h3>🎯 Importance of Host Scanning</h3><h4>✅ 1. Efficiency</h4><p>Inactive devices scan කරන්න time waste කරන්නෙ නැහැ.</p><h4>✅ 2. Attack Surface Define කිරීම</h4><p>Active devices වලට පමණක් focus වෙන නිසා scope එක clearly define වෙනවා.</p><h4>✅ 3. Network Mapping</h4><p>ඇත්තටම network එකේ structure එක කුමක්ද කියලා map එකක් හදාගන්න පුළුවන්.</p><h4>✅ 4. Baseline Creation</h4><p>Normal state එක record කරලා unauthorized/new devices detect කරන්න help වෙනවා.</p><h4>✅ 5. Vulnerability Identification</h4><p>Live hosts හඳුනාගෙන ඒවට further vulnerability scans run කරන්න පුළුවන්.</p><h4>✅ 6. Resource Optimization</h4><p>Scanning resources (time, bandwidth, processing) active devices වලට efficient විදිහට allocate කරන්න.</p><h3>🧰 Host Scanning Tools</h3><h4>🔍 Nmap</h4><p>Most popular tool — supports host discovery, port scan, OS detection, scripting.</p><h4>⚡ Masscan</h4><p>Ultra-fast — scan thousands of hosts/ports per second. Useful for large-scale scans.</p><h4>🦄 Unicornscan</h4><p>High-performance network reconnaissance tool with asynchronous scanning.</p><h4>🐹 GONET-Scanner</h4><p>Go language-based fast scanner — lightweight &amp; powerful.</p><h3>🛡️ In Cybersecurity Context</h3><h3>🔐 Defensive Use</h3><p>Network admins use host scanning to:</p><ul><li>Identify all active endpoints</li><li>Detect rogue or unknown devices</li><li>Build network inventories</li></ul><h3>💀 Offensive Use</h3><p>Attackers use host scanning to:</p><ul><li>Detect live targets before launching port scans or exploits</li><li>Build attack plans efficiently</li></ul><h3>🧠 Final Thought:</h3><blockquote><strong><em>“Host Scanning</em></strong><em> is like knocking on every door in a neighborhood to see who’s home.”<br> Whether you’re securing your network or planning an attack (ethically!), this is your </em><strong><em>first tactical step.</em></strong></blockquote><h3>1️⃣ 🧩 Port Scanning</h3><h4>🚪🔍 Port Scanning කියන්නේ මොකද්ද?</h4><p>Port scanning කියන්නේ network device එකක තියෙන <strong>open ports</strong> හඳුනාගන්න process එකක්. මේ open ports කියන්නේ services run වෙන “doors” වගේ. මේක both attackers සහ security professionalsලා භාවිතා කරනවා:</p><ul><li>🔓 <strong>Attackers</strong> — weak points හොයලා system එකට unauthorized access try කරන්න</li><li>🛡️ <strong>Security experts</strong> — vulnerabilities identify කරලා secure කරන්න</li></ul><h3>🧠 කොහොමද Port Scanning වැඩ කරන විදිහ?</h3><ol><li>Port scanner එක target system එකට packet එකක් යවයි — usually TCP or UDP.</li><li>Target system එකෙන් එන response එක අනුව තීරණය කරනවා:</li></ol><ul><li>✅ Port එක <strong>open</strong> නම් service එකක් listen වෙනවා</li><li>❌ Port එක <strong>closed</strong> නම් reject වෙනවා</li><li>🔥 Port එක <strong>filtered</strong> නම් firewall එකක් block කරනවා (no response or ICMP error)</li></ul><h4>🎯 What it does / මොනවද හඳුනාගන්නේ?</h4><ul><li><strong>✅ Identifying Open Ports</strong> — යම් system එකක currently active &amp; listening ports හඳුනාගන්න. (Eg: Port 80 = HTTP, 22 = SSH)</li><li><strong>📡 Network Reconnaissance</strong> — Network එක map කරලා system වල function &amp; exposure level check කරනවා.</li><li><strong>🔓 Vulnerability Assessment</strong> — Open ports වල run වෙන්න පුළුවන් vulnerable services locate කරන්න.</li></ul><h4>⚙️ Port Scanning එහෙම කරන්නේ කොහොමද?</h4><p><strong>🔄 1. Packets යවන්න (Sending Probes)</strong></p><p>Port scanner එක target system එකට TCP හෝ UDP packets යවන්නෙ ports check කරන්න.</p><p><strong>📬 2. Response Analyze කරන්න</strong></p><p>System එකේ responses බලලා port එක <strong>open</strong>, <strong>closed</strong>, <strong>filtered</strong>ද කියලා determine කරනවා.</p><h3>🔍 Port Scan Techniques (Short &amp; Clear)</h3><ul><li><strong>SYN Scan</strong> — Just sends a SYN packet. If gets SYN-ACK back, port is open. Stealthy and fast.</li><li><strong>FIN Scan</strong> — Sends FIN packet. Closed ports send RST back. Good to bypass some firewalls.</li><li><strong>ACK Scan</strong> — Sends ACK packets to check firewall rules (filtering or not).</li></ul><h3>🎯 Port Scanning භාවිතා වෙන තැන්</h3><h4>1. Attackers</h4><ul><li>Port scan එකෙන් open ports හොයනවා</li><li>Old service versions / misconfigured ports exploit කරන්න try කරනවා</li></ul><h4>2. Security Professionals</h4><ul><li>System එක scan කරලා check කරනවා:</li><li>මොන portsද open තියෙන්නේ?</li><li>අවශ්‍ය නැති services run වෙනවාද?</li><li>අලුත් vulnerabilities තියෙන්නෙද?</li></ul><h4>🧠 උදාහරණයක්:</h4><p>මොකක්ද Port 22 open කියන්නේ?<br> 👉 SSH service එක run වෙනවා.<br> 👉 If attacker එකෙක්ට මේක accessible නම්, ඔහු try කරන්න පුළුවන් password brute-force attack.</p><h3>⚠️ Port Scanning harmful ද?</h3><p>Port scan එක <strong>dangerous</strong> නෙවෙයි inherently.<br> But:</p><ul><li>🕵️‍♂️ Attack එකක් කරන්න කලින් mostly port scanning එකක් use කරනවා</li><li>👀 Open ports reveal වෙන එක attackers ලාට විශාල info එකක්</li></ul><h3>🛡️ Port Scanning වලට Defense එක</h3><p>ඔබේ system එක secure කරන්න:</p><ul><li>🔐 <strong>Unused ports</strong> close කරන්න</li><li>🔥 <strong>Firewall</strong> properly configure කරන්න</li><li>🧷 <strong>IDS/IPS</strong> tools (e.g. Snort) use කරන්න</li><li>📦 <strong>Unnecessary services</strong> disable කරන්න</li><li>🔁 <strong>Regular internal scans</strong> run කරන්න (e.g. Nmap, Nessus)</li></ul><h3>✅ Summary</h3><p>Port scanning කියන්නේ <strong>network security</strong> world එකේ most common and powerful techniques වලින් එකක්.<br> Attackers use it to find weaknesses.<br> Security professionals use it to fix those weaknesses.</p><blockquote><em>So, </em><strong><em>scan your systems before someone else does.</em></strong><em><br> Scan smart. Defend smarter.</em></blockquote><h4>📌 Conclusion:</h4><blockquote><strong><em>Port Scanning</em></strong><em> = </em>Digital door-checking technique.<em><br> 🔍 Both attackers and defenders use it — difference එක තියෙන්නේ intention එකේ.<br> </em><strong><em>Offensive use</em></strong><em>: Exploitation<br> </em><strong><em>Defensive use</em></strong><em>: Prevention</em></blockquote><h3>🛠️ Common Port Scan Types</h3><h4><strong>Scan Type — Description | Purpose | How it Works | Why Use | When to Use</strong></h4><h4>🔌 -sT TCP Connect Scan</h4><p>👉 <strong>Full connection try කරනවා</strong> (TCP 3-way handshake එක හරියටම complete කරනවා).<br> 📣 <strong>Detect වෙන්න easy</strong> — firewalls / IDS වලට හුඟාක් පහසුවෙන් capture කරගන්න පුළුවන්.</p><ul><li>📍 <strong>Purpose:</strong> Open ports identify කරන්න <strong>full TCP connection</strong> එකක් establish කරනවා.</li><li>⚙️ <strong>How it works:</strong> SYN → SYN-ACK → ACK (Complete handshake).</li><li>✅ <strong>Why use:</strong> Normal user privileges වලින් run කරන්න පුළුවන් (no raw sockets).</li><li>🕒 <strong>When to use:</strong> Root privileges නැති විට හෝ <strong>reliable connection testing</strong> කරන්න ඕනේ නම්.</li></ul><h4>🕵️ -sS SYN Scan (Stealth Scan)</h4><p>👉 <strong>Half-open scan</strong> එකක්.<br> ⚡ <strong>Fast &amp; stealthy</strong>, commonly used scan method එක.</p><ul><li>📍 <strong>Purpose:</strong> Open ports check කරනවා without full TCP handshake.</li><li>⚙️ <strong>How it works:</strong> SYN → SYN-ACK → <strong>No ACK</strong> (scan එක stop වෙනවා middle එකේ).</li><li>✅ <strong>Why use:</strong> Fast, less detectable by firewalls/IDS.</li><li>🕒 <strong>When to use:</strong> <strong>Large-scale scans</strong> වලදී හෝ detection avoid කරන්න.</li></ul><h4>🚪 -sF FIN Scan</h4><p>👉 <strong>FIN packet එක විතරයි</strong> යවන්නේ.<br> 🎯 Stateful නොවන firewalls bypass කරන්න effort.</p><ul><li>📍 <strong>Purpose:</strong> TCP behavior misuse කරලා closed ports identify කරනවා.</li><li>⚙️ <strong>How it works:</strong> FIN packet → Closed port එකක් නම් RST return කරනවා.</li><li>✅ <strong>Why use:</strong> Stealthy, non-standard detection systems evade කරන්න.</li><li>🕒 <strong>When to use:</strong> <strong>Older or misconfigured systems</strong> target කරන විට.</li></ul><h4>❌ -sN NULL Scan</h4><p>👉 <strong>No TCP flags</strong> set — එහෙම packet එකක් යවනවා.<br> 🔄 කිසිම flag එකක් නැති නිසා, firewall එක confuse වෙන්න පුළුවන්.</p><ul><li>📍 <strong>Purpose:</strong> Unexpected packet එකක් යවලා system එකේ behavior test කරනවා.</li><li>⚙️ <strong>How it works:</strong> All flags set to 0 → observe port response.</li><li>✅ <strong>Why use:</strong> IDS/IPS systems evade කරන්න.</li><li>🕒 <strong>When to use:</strong> <strong>Non-standard firewall configurations</strong> තියෙන systems වලට.</li></ul><h4>🎄 -sX XMAS Scan</h4><p>👉 <strong>FIN + URG + PSH</strong> flags තියෙන <strong>strange packet</strong> එකක් යවලා test කරනවා.<br> 🧓 <strong>Old systems</strong> bypass කරන්න හැකි sometimes.</p><ul><li>📍 <strong>Purpose:</strong> Firewall/IDS systems confuse කරලා packet filtering avoid කරනවා.</li><li>⚙️ <strong>How it works:</strong> FIN + URG + PSH flags → Legacy systems misinterpret.</li><li>✅ <strong>Why use:</strong> Old or poorly configured systems exploit කරන්න.</li><li>🕒 <strong>When to use:</strong> <strong>Modern scan methods fail</strong> වෙලා තියෙද්දි fallback option එකක් විදිහට</li></ul><h4>✅ Example:</h4><pre>nmap -sS 192.168.1.10</pre><p>🧠 <em>Hero Tip</em>: SYN scan තමයි ethical hackers ලා use කරන fast stealthy method එක.</p><h3>2️⃣ 🌐 Network Scanning</h3><h4>🔍 What’s this?</h4><p>Network Scanning කියන්නේ <strong>කොයි IP addresses activeද?</strong> කියලා හඳුනාගන්න එක.</p><p>උදා: Wi-Fi network එකක් තියෙනව කියමු. ඒකෙන් <strong>අපිට connected වෙලා ඉන්න හැම device එකක්ම</strong> හොයාගන්න පුළුවන්.</p><h4>🛠️ <strong>Host Discovery Methods</strong><br> <strong>Method</strong> — <strong>Tool/Command</strong> — <strong>Description</strong></h4><p>📶 <strong>Ping Sweep</strong><br> 🔧 nmap -sn 192.168.1.0/24<br> 🔍 <strong>Live hosts</strong> detect කරනවා using ICMP echo requests.</p><p>🔄 <strong>ARP Scan</strong><br> 🔧 arp-scan<br> 🌐 LAN තුළ devices සෙවීම at <strong>MAC address level</strong>. <strong>Fast &amp; reliable</strong> for local networks.</p><p>🕵️‍♂️ <strong>Netdiscover</strong><br> 🔧 netdiscover<br> 🛜 <strong>Passive + ARP-based</strong> discovery tool.<br> ⚠️ Useful in unknown or DHCP networks.</p><h4>✅ Example:</h4><pre>nmap -sn 10.0.0.0/24</pre><p>🧠 <em>Hero Tip</em>: මෙකෙන් ඔයාට network එකේ “who is there?” කියලා full picture එකක් ලැබෙනවා.</p><h3>3️⃣ 🛡️ Vulnerability Scanning</h3><h4>🔍 What’s this?</h4><p>මේකෙන් identify කරනවා <strong>known vulnerabilities</strong> (exploits, misconfigurations, CVEs).</p><p>උදා: එක system එකක <strong>old Apache version</strong> එකක් තියෙනවා නම්, ඒක dangerous. Vulnerability scan එකෙන් ඒක capture වෙනවා.</p><h4>🛠️ <strong>Tools &amp; Scripts</strong><br> <strong>Tool</strong> — <strong>Use Case</strong></h4><p>🧪 <strong>Nessus</strong><br> 🔍 <strong>Professional vulnerability scanner</strong> — Deep, detailed scans for known weaknesses. Best for compliance &amp; audits.</p><p>🧰 <strong>OpenVAS</strong><br> 🆓 <strong>Open-source alternative to Nessus</strong> — Good for budget-friendly vulnerability assessments.</p><p>🧠 <strong>Nmap NSE Scripts</strong><br> 💡 <strong>Lightweight script-based scanning</strong> — Extend Nmap with custom scripts to detect vulns, brute-force, and more.</p><h4>✅ Example (Nmap)</h4><pre>nmap --script vuln -p 80 192.168.1.10</pre><p>🧠 <em>Hero Tip</em>: Nessus වගේ tool එකක් full vuln report එකක් produce කරනවා — ethical report එකකට super valuable.</p><h3>🔄 Suggested Scanning Flow</h3><ol><li><strong>Start with Host Discovery</strong> — Who’s online?</li><li><strong>Then Port Scanning</strong> — What doors are open?</li><li><strong>Then Vulnerability Scanning</strong> — What’s weak?</li></ol><h4>🧠 <strong>Summary</strong></h4><p>🔍 <strong>Port Scanning</strong><br> 🎯 <strong>Goal</strong>: Identify <strong>open ports &amp; services</strong><br> 🛠️ <strong>Tool</strong>: Nmap, Netcat<br> ✅ <strong>Ethical Use</strong>: Initial assessment of target system</p><p>🌐 <strong>Network Scanning</strong><br> 🎯 <strong>Goal</strong>: Detect <strong>live hosts</strong><br> 🛠️ <strong>Tool</strong>: Nmap, Netdiscover<br> ✅ <strong>Ethical Use</strong>: Network mapping for reconnaissance</p><p>🛡️ <strong>Vulnerability Scanning</strong><br> 🎯 <strong>Goal</strong>: Find <strong>known weaknesses</strong><br> 🛠️ <strong>Tool</strong>: Nessus, Nmap<br> ✅ <strong>Ethical Use</strong>: Help plan &amp; prioritize <strong>exploitation or patching</strong></p><h3>📚 Bonus Tips for Real-World Use</h3><p>✅ <strong>Use VPN</strong> when scanning<br> ✅ <strong>Scan your own network</strong> for practice<br> ✅ <strong>Log every result</strong> — keep a scan record<br> ✅ <strong>Use </strong><strong>-v or </strong><strong>-vv in Nmap</strong> for verbose output</p><blockquote>👁️ <strong>Scanning is the EYE of an Ethical Hacker!</strong><br> ⚠️ <strong>Without scanning, you’re hacking blind!</strong></blockquote><h3>🛠️ Popular Scanning Tools</h3><p>Scanning කියන්නෙ skill එකක්. ඒක sharpen කරන්න නම්, <strong>right tools</strong> භාවිතා කරන්න ඕනෙ. මේ tools use කරන්නේ:</p><ul><li>🕵️‍♂️ Reconnaissance</li><li>🔍 Host &amp; Port Discovery</li><li>⚔️ Vulnerability Analysis</li></ul><h3>1️⃣ 🧭 Nmap (Network Mapper) — “ 👑 The King of Scanning 👑”</h3><h4>📌 What is it?</h4><p>Most powerful and flexible scanning tool එක. Beginner to advanced users use කරනවා.</p><p><strong>🔧 Features:</strong></p><ul><li>Host discovery (ping sweep)</li><li>Port scanning (TCP, UDP)</li><li>OS detection (-O)</li><li>Service detection (-sV)</li><li>NSE scripts for vuln scanning</li></ul><h4>✅ Common Commands:</h4><pre>nmap 192.168.1.1             # Basic Scan<br>nmap -sS 192.168.1.1          # Stealth SYN Scan<br>nmap -sV -O 192.168.1.1       # Service + OS Detection<br>nmap -Pn -p 80,443 192.168.1.1 # No ping, specific ports</pre><p>🧠 <em>Hero Tip</em>: Use -A flag for aggressive full scan:</p><pre>nmap -A 192.168.1.1</pre><h3>2️⃣ 🖼️ <strong>Zenmap</strong> — “Nmap for Beginners</h3><h4>📌 What is it?</h4><p><strong>Nmap GUI version</strong>. Very beginner-friendly.<br>Zenmap කියන්නේ Nmap වල graphical version එක. CLI භයනකයි කියන අයට super solution.</p><h4>🔧 Why use it?</h4><ul><li>Visual network maps</li><li>Save scan profiles</li><li>See Nmap commands auto-generate</li></ul><p>🧠 <em>Hero Tip</em>: Learn by watching how Zenmap generates real Nmap syntax behind the scenes.</p><h4>✅ වාසි:</h4><ul><li>Scan results visually දක්වන්න පුලුවන්</li><li>Previous scan history save කරන්න පුලුවන්</li><li>Beginner-friendly interface</li></ul><p>🧠 <em>Tip:</em> Zenmap එකේ commands auto-generate වෙන නිසා CLI එකත් අධ්‍යයනය කරන්න easy.</p><h3>3️⃣ 🚀 Masscan — World’s Fastest Port Scanner</h3><h4>📌 Overview:</h4><p>Ultra-fast scanner. Can scan <strong>entire Internet</strong> in minutes!<br>Masscan කියන්නේ super fast tool එකක්. Port scan කරන්න ගොඩක් IPs තියෙනවනම්, මේකෙන් කරන්න best.</p><pre>masscan -p1-65535 192.168.1.0/24 --rate=1000</pre><p>⚡ <em>One line = Thousands of IPs scan within seconds!</em><br> But: Detail එක අඩුයි. Nmap එකෙන් verify කරන්න ඕනෙ.</p><p>🧠 <em>Hero Tip</em>: Use Masscan for large IP ranges, then use Nmap to dig deeper on selected hosts.</p><h3>4️⃣ 🧱 Netcat (nc) — Swiss Army Knife 🗡️ for Hackers</h3><h4>📌 Overview:</h4><p>Netcat කියන්නේ tool එකක් scanning + other hacking tricks වල use වෙනවා.</p><p>🛠️ Not just for scanning — also used for:</p><ul><li>Port scan</li><li>Banner grabbing</li><li>Reverse shell create කිරීම</li></ul><h4>✅ Example:</h4><pre>nc -zv 192.168.1.1 1-1000<br><br>#Scans ports 1–1000 with verbose output.</pre><blockquote>Netcat + Bash = Ethical hacker’s hidden weapon.</blockquote><p>🧠 <em>Hero Tip</em>: Use it to <strong>check if a port is open manually</strong> or simulate services.</p><h3>5️⃣ 👻 Netdiscover — LAN Host Discovery Tool</h3><h4>📌 මොකක්ද මේ?</h4><p>Netdiscover කියන්නේ <strong>local network එක scan කරන්න</strong> dedicated tool එකක්.<br> Wi-Fi or internal LAN scan වලදි සුපිරියි.</p><pre>netdiscover -r 192.168.1.0/24</pre><p>🧠 <em>Use Case:</em> කවුද Wi-Fi එකට secretly connect වෙලා ඉන්නේ කියලා check කරන්න පුලුවන්.</p><h3>6️⃣ 🧪 Nessus — Professional Vulnerability Scanner</h3><h4>📌 Overview:</h4><p>Nessus කියන්නේ commercial-grade vuln scanner එකක්. Ethical hacking reports වලට හොඳම tool එකක්.</p><p>🛡️ Detects:</p><ul><li>CVEs (known vulnerabilities)</li><li>Missing patches</li><li>Weak configurations</li></ul><p>🧠 <em>Use After Nmap:</em> Port එකක් open කියලා Nmap කියනවා. Nessus කියන්නේ <strong>“මේ port එකේ තියෙන්නේ CVE-2024–12345 exploit එක”</strong> කියලා!</p><h3>7️⃣ 💣 Hping3 — Custom Packet Crafter</h3><h4>📌 What is it?</h4><p>Advanced TCP/IP tool එකක්.<br> Use වෙනවා:</p><ul><li>Firewall/IDS testing</li><li>Custom packet sending</li><li>Traceroute</li></ul><pre>hping3 -S 192.168.1.1 -p 80 -c 5</pre><p>🧠 <em>Use Case:</em> Penetration testers ලා firewall bypass test එකක් කරන්න Hping3 use කරනවා.</p><h3>🧠 <strong>Tool Comparison — Zero to Hero</strong></h3><h4>🔍 <strong>Nmap</strong></h4><ul><li><strong>Use Case</strong>: All-round scanning</li><li><strong>Skill Level</strong>: 🟢 Beginner — 🔴 Expert</li><li><strong>Speed</strong>: ⏱️ Medium</li><li><strong>GUI?</strong>: ❌ No</li></ul><h4>🧭 <strong>Zenmap</strong></h4><ul><li><strong>Use Case</strong>: Visual frontend for Nmap</li><li><strong>Skill Level</strong>: 🟢 Beginner</li><li><strong>Speed</strong>: ⏱️ Medium</li><li><strong>GUI?</strong>: ✅ Yes</li></ul><h4>🚀 <strong>Masscan</strong></h4><ul><li><strong>Use Case</strong>: Large-scale, high-speed scanning</li><li><strong>Skill Level</strong>: 🟠 Intermediate</li><li><strong>Speed</strong>: 🔥 Super Fast</li><li><strong>GUI?</strong>: ❌ No</li></ul><h4>🧪 <strong>Netcat</strong></h4><ul><li><strong>Use Case</strong>: Manual port scanning &amp; reverse shells</li><li><strong>Skill Level</strong>: 🟠 Intermediate</li><li><strong>Speed</strong>: 🐢 Slow</li><li><strong>GUI?</strong>: ❌ No</li></ul><h4>🎯 <strong>Hping3</strong></h4><ul><li><strong>Use Case</strong>: Packet-level testing / crafting</li><li><strong>Skill Level</strong>: 🔴 Advanced</li><li><strong>Speed</strong>: ⚡ Fast</li><li><strong>GUI?</strong>: ❌ No</li></ul><h4>🌐 <strong>Netdiscover</strong></h4><ul><li><strong>Use Case</strong>: LAN host discovery using ARP</li><li><strong>Skill Level</strong>: 🟢 Beginner</li><li><strong>Speed</strong>: ⚡ Fast</li><li><strong>GUI?</strong>: ❌ No</li></ul><h4>🛡️ <strong>Nessus</strong></h4><ul><li><strong>Use Case</strong>: Vulnerability scanning</li><li><strong>Skill Level</strong>: 🟠 Intermediate+</li><li><strong>Speed</strong>: ⏱️ Medium</li><li><strong>GUI?</strong>: ✅ Yes</li></ul><h3>🧠 Understanding Nmap Output</h3><p>අපි දැන් එනවා <strong>Network Scanning</strong> section එකේ super valuable practical part එකට</p><h4>🔎 Why is Nmap Output Important?</h4><p>🧠 Nmap කියලා command එකක් run කළාම ලැබෙන output එක <strong>මොන servicesද</strong>, <strong>මොන ports open ද</strong>, <strong>කොච්චර secure ද</strong>, කියලා ඔබට clear picture එකක් දෙන්නෙ.</p><pre>+ Tool එකෙන් scan එකක් කරන එක easy!<br>+ ඒ result එකක් analyze කරන එකයි PRO skill එක!</pre><h4>🛠️ <strong>Common Nmap Command Flags + Explanation</strong></h4><p>🔹 <strong>-sS</strong> — <strong>SYN Scan</strong><br> 🕵️‍♂️ <strong>Stealthy scan</strong> එකක්.<br> 📡 “Half-open handshake” එකක් use වෙනවා.<br> 💡 Less detectable than full TCP scans.</p><p>🔹 <strong>-sT</strong> — <strong>TCP Connect Scan</strong><br> 🔌 <strong>Full TCP connection</strong> try කරනවා.<br> 🚨 IDS/Firewalls එකට detect වීමට <strong>ඉතා පහසුයි</strong>.</p><p>🔹 <strong>-sU</strong> — <strong>UDP Scan</strong><br> 📤 <strong>UDP ports</strong> check කරනවා.<br> 🐢 Slow but useful for finding <strong>non-TCP services</strong>.</p><p>🔹 <strong>-sV</strong> — <strong>Service Version Detection</strong><br> 🔍 Port එකේ run වෙන්නේ <strong>මොන service එකද?</strong><br> 🧠 Version එකත් identify කරනවා.</p><p>🔹 <strong>-O</strong> — <strong>OS Detection</strong><br> 💻 Target machine එකේ <strong>OS එක guess</strong> කරනවා.<br> 🎯 Useful for attack planning.</p><p>🔹 <strong>-A</strong> — <strong>Aggressive Scan</strong><br> ⚙️ <strong>Combine</strong> කරලා:</p><ul><li>OS Detection</li><li>Service Version</li><li>Scripts</li><li>Traceroute<br> 📈 More info, more noise!</li></ul><p>🔹 <strong>-Pn</strong> — <strong>No Ping</strong><br> 🚫 Host ping <strong>නැහැ</strong>.<br> 🔒 Useful if ICMP blocked or firewall filters pings.</p><p>🔹 <strong>-p</strong> — <strong>Port Selection</strong><br> 🎯 <strong>Specific port</strong> or port range scan කරන්න.<br> 📝 Example: -p 80 or -p 1-1000</p><p>🔹 <strong>-T4</strong> — <strong>Timing Template</strong><br> ⏱️ Scan speed adjust කරන flag.<br> ⚡ T4 is faster than default (T3) – good for quick scans.<br> 🚨 But can trigger detection systems.</p><h4>🧪 Sample Command + Output Breakdown</h4><pre>nmap -sS -sV -O 192.168.1.10</pre><p>මෙය කරන්නේ:</p><ul><li>SYN scan</li><li>Services version identify කිරීම</li><li>OS guess කිරීම</li></ul><h4>🧾 Sample Output (Translated with notes):</h4><pre>Starting Nmap 7.94 ( https://nmap.org ) at 2025-08-03 21:00 IST<br>Nmap scan report for 192.168.1.10<br>Host is up (0.0012s latency).<br>Not shown: 997 closed ports<br>PORT     STATE SERVICE     VERSION<br>22/tcp   open  ssh         OpenSSH 8.4 (protocol 2.0)<br>80/tcp   open  http        Apache httpd 2.4.41<br>443/tcp  open  https       OpenSSL TLS 1.2<br>MAC Address: AA:BB:CC:DD:EE:FF (Intel Corp)<br>Device type: general purpose<br>Running: Linux 5.X<br>OS CPE: cpe:/o:linux:linux_kernel:5<br>OS details: Linux 5.4 - 5.11<br>Uptime guess: 5.234 days (based on TCP timestamp)</pre><h4>🧠 <strong>Breakdown</strong></h4><p>🔹 <strong>Host is up</strong><br> ➡️ <strong>Target එක alive.</strong><br> 📶 Ping request එකට respond කරනවා — so system එක <strong>online</strong>.</p><p>🔹 <strong>Not shown: 997 closed ports</strong><br> ➡️ Total 1000 ports scan කළා.<br> 🚪 ඒ අතරින් <strong>997 ports closed</strong>.<br> 🔍 Only 3 ports of interest remain (likely open or filtered).</p><p>🔹 <strong>22/tcp open ssh</strong><br> ➡️ <strong>SSH service</strong> එක <strong>port 22</strong> තැන <strong>open</strong>.<br> 🛡️ Secure Shell access attempt කල හැක.</p><p>🔹 <strong>OpenSSH 8.4</strong><br> ➡️ <strong>Version detect</strong> කරලා.<br> ⚠️ <strong>Old version</strong> නම්, <strong>vulnerabilities</strong> තියෙන්න පුළුවන්.<br> 💣 Exploit development/usage possible.</p><p>🔹 <strong>Device type, OS details</strong><br> ➡️ <strong>OS fingerprinting</strong> match එකක් — likely a <strong>Linux system</strong>.<br> 🧠 OS guessing helps attackers choose payloads/tools.</p><p>🔹 <strong>Uptime guess</strong><br> ➡️ System එක <strong>last rebooted 5 days ago</strong>.<br> 🕒 Valuable info for <strong>time-based attacks</strong> (e.g., cron jobs, scheduled tasks).</p><h4>🔍 <strong>Extra Nmap Output Elements</strong></h4><p>🔸 <strong>MAC Address:</strong><br> ➡️ Device එකේ <strong>manufacturer</strong> (e.g., Cisco, Dell) හඳුනාගන්න පුළුවන්.<br> 📡 Especially useful on <strong>LAN scans</strong>.</p><p>🔸 <strong>CPE (Common Platform Enumeration):</strong><br> ➡️ Target system/run වෙච්ච <strong>software &amp; OS</strong> identify කරන්න standardized format එක.<br> 🛠️ Vulnerability search tools වලදී <strong>valuable reference</strong>.</p><p>🔸 <strong>Scripts results:</strong><br> ➡️ --script flag එකක් use කළොත්, script output එක මෙතැනට එනවා.<br> 📜 Example: nmap --script=vuln<br> 💣 <strong>Vulnerability detection, brute-force attempts</strong>, etc.</p><p>🔸 <strong>Traceroute:</strong><br> ➡️ <strong>Network path</strong> එක (through routers) aggressive mode (-A) යොදාගත් විට දිස්වෙයි.<br> 🗺️ Useful for <strong>network mapping</strong> &amp; identifying <strong>firewalls or hops</strong>.</p><h4>⚠️ Pro-Level Output Tips (Hero Mode 🦸)</h4><ul><li><strong>Use </strong><strong>-v or </strong><strong>-vv</strong> → Verbose output (more information)</li><li><strong>Combine </strong><strong>-oN, </strong><strong>-oX</strong> → Save result as file (normal, xml, grepable)</li><li><strong>Use with </strong><strong>--script vuln</strong> → Combine vulnerability check</li></ul><pre>nmap -sS -sV --script vuln -p 21,22,80 192.168.1.10 -oN result.txt</pre><h4>📚 <strong>Summary Table — Output Interpreting Cheat Sheet</strong><br> (🔍 Nmap Output Explained — )</h4><p>🔹 <strong>open</strong><br> 📖 <strong>Meaning</strong>: Port එක <strong>open</strong><br> ✅ <strong>What to Do</strong>:</p><ul><li>Check <strong>service version</strong></li><li>Search for <strong>vulnerabilities</strong></li><li>Consider exploitation or deeper analysis</li></ul><p>🔹 <strong>filtered</strong><br> 📖 <strong>Meaning</strong>: Packet එක <strong>block වෙලා</strong> (firewall or rule)<br> 🛠️ <strong>What to Do</strong>:</p><ul><li>Try -Pn to skip ping</li><li>Use --reason to understand why</li><li>Consider using <strong>timing or evasion techniques</strong></li></ul><p>🔹 <strong>closed</strong><br> 📖 <strong>Meaning</strong>: Port එක <strong>closed</strong>, no service running<br> 🚫 <strong>What to Do</strong>:</p><ul><li>Usually <strong>no action needed</strong></li><li>Re-scan later if system is dynamic</li></ul><p>🔹 <strong>OS details:</strong><br> 📖 <strong>Meaning</strong>: OS fingerprint match<br> 🧠 <strong>What to Do</strong>:</p><ul><li>Use info for <strong>OS-specific exploits</strong></li><li>Narrow down <strong>attack strategy</strong></li></ul><p>🔹 <strong>Service version</strong><br> 📖 <strong>Meaning</strong>: Detailed info on service running (e.g., Apache 2.4.49)<br> 🔍 <strong>What to Do</strong>:</p><ul><li>Search CVEs or exploits using <strong>version number</strong></li><li>Example: Use databases like <strong>Exploit-DB</strong> or <strong>NVD</strong></li></ul><p>🔹 <strong>MAC Address:</strong><br> 📖 <strong>Meaning</strong>: Manufacturer info (via MAC prefix)<br> 🖨️ <strong>What to Do</strong>:</p><ul><li>Guess device type (e.g., router, printer, mobile)</li><li>Helps with <strong>physical targeting</strong> or <strong>device profiling</strong></li></ul><h3>🏁 Read the Map Like a Hacker 🧭</h3><blockquote><em>🔓 </em><strong><em>Port එකක් open වෙලා කියන්නෙ invitation එකක් වගේ.</em></strong><em><br> 🧠 </em><strong><em>Nmap output එක කියවන්න දන්න එකෙක්ට</em></strong><em> — <br> 🔥 CVE එකක් තියෙන්න පුලුවන් කියන news එකක් වගේ!</em></blockquote><h3>🔍 <strong>Banner Grabbing සහ OS Detection</strong></h3><h3>🧾 What is Banner Grabbing? 🇱🇰</h3><p>🔎 <strong>Definition:</strong><br> Banner grabbing කියන්නේ service එකක් run වෙන port එකකට connect වෙලා, එය reply කරන <strong>intro message (banner)</strong> එක capture කරන එකයි.</p><p>📥 Example:</p><pre>telnet 192.168.1.10 </pre><pre>220 (vsFTPd 2.3.4)</pre><p>🧠 මෙතැනින් දැනගන්න පුළුවන්:</p><ul><li><strong>Service name</strong> (vsFTPd)</li><li><strong>Version</strong> (2.3.4)</li><li>මෙය vulnerable ද කියලා research කරන්න</li></ul><p>📌 මෙවැනි banners වලින් පිටවෙන්නෙ:</p><ul><li>Web servers (Apache, nginx)</li><li>FTP/SSH/SMTP</li><li>Database services</li></ul><h3>🛠️ Tools for Banner Grabbing</h3><h4>1️⃣ Telnet</h4><p>🧰 Basic method එකක්. Port එකට connect වෙලා manually banner එක බලන්න පුළුවන්.</p><pre>telnet [IP] [Port]</pre><pre>telnet 192.168.1.10 80</pre><h4>2️⃣ Netcat (nc)</h4><p>🧠 Hacker-friendly Swiss Army knife tool එක.</p><pre>nc [IP] [PORT]</pre><pre>nc 192.168.1.10 22</pre><p>➡️ SSH Banner එකක් එනවා:</p><pre>SSH-2.0-OpenSSH_7.4</pre><h4>3️⃣ Nmap</h4><p>🔥 Automated and detailed banner grabbing + version detection</p><pre>nmap -sV 192.168.1.10</pre><p>🧾 Output එක:</p><pre>22/tcp open  ssh     OpenSSH 7.4 (protocol 2.0)<br>80/tcp open  http    Apache httpd 2.4.29</pre><h3>🧠 Why is Banner Grabbing Important?</h3><p>✅ Identify vulnerable versions<br> ✅ Guess OS or server type<br> ✅ Build attacker strategy<br> ✅ Prepare for exploitation</p><pre>+ Banner grabbing = valuable reconnaissance!</pre><h3>🖥️ What is OS Fingerprinting?</h3><p>🧬 OS fingerprinting කියන්නේ Target machine එකේ <strong>Operating System (OS)</strong> එක guess කරන technique එකක්.</p><h3>🔍 Types of OS Detection</h3><p><strong>Active</strong>Target එකට packets යවනවා. Reply pattern එකෙන් OS එක identify කරනවා. (E.g., Nmap -O)<strong>Passive</strong>Packet sniffing පමණක්. Network traffic එක analyze කරනවා (no packets sent). <br>Tools: Wireshark, p0f</p><h3>⚙️ Nmap OS Detection Commands</h3><pre>nmap -O 192.168.1.10</pre><p>🧾 Sample Output:</p><pre>Device type: general purpose<br>Running: Linux 5.X<br>OS details: Linux 5.4 - 5.11</pre><p>💡 More accurate if:</p><ul><li>Root privileges තියෙන්නේ</li><li>Open ports වඩා වැඩියි</li><li>Firewall/IDS නැත්තං</li></ul><h3>🧰 Passive OS Detection Example (p0f):</h3><pre>sudo p0f -i eth0</pre><p>➡️ Analyze කරන්නෙ network packets:</p><pre>192.168.1.10: Linux 5.10+, likely desktop</pre><h3>🧾 <strong>Summary Cheat Sheet</strong><br> (📚 Concepts + Tools )</h3><p>🔹 <strong>Banner Grabbing</strong><br> 🛠️ <strong>Tools</strong>: Telnet, Netcat, Nmap<br> 📝 <strong>Sinhala Summary</strong>:<br> ➡️ Port එකේ run වෙන <strong>service එක සහ version එක</strong> identify කරන්න තමයි මෙහෙම කරනේ.<br> 📍 Example: telnet target.com 80</p><p>🔹 <strong>OS Fingerprinting</strong><br> 🛠️ <strong>Tools</strong>: Nmap (-O), p0f<br> 📝 <strong>Sinhala Summary</strong>:<br> ➡️ Target machine එකේ <strong>Operating System එක guess</strong> කරනවා.<br> 💡 Active (Nmap) vs Passive (p0f)</p><p>🔹 <strong>Passive vs Active Scanning</strong><br> 🛠️ <strong>Tools</strong>: Wireshark (Passive), Nmap (Active)<br> 📝 <strong>Sinhala Summary</strong>:<br> ➡️ <strong>Passive</strong> = Data <strong>observe</strong> කරනවා (packets sniff කරනවා).<br> ➡️ <strong>Active</strong> = Packets <strong>send</strong> කරනවා targets වෙත to get responses.<br> ⚠️ Active methods are more <strong>detectable</strong>.</p><h4><strong>🏁 Final Thought of Banner Grabbing &amp; OS Fingerprinting— Think Like a Pro 🧠</strong></h4><p>🕵️‍♂️ අරමුණ වන්නේ <strong>target system එකේ identity එක හඳුනාගැනීම.</strong><br> Banner grabbing + OS fingerprinting කියන්නේ <strong>pre-exploitation intelligence</strong> එකට most powerful toolset එකක්.</p><h3><strong>🔥 Firewall සහ IDS/IPS Evasion Techniques</strong>!</h3><h3>🔥 Firewall සහ IDS/IPS Evasion කියන්නේ මොකද්ද?</h3><p><strong>Firewall</strong> සහ <strong>Intrusion Detection/Prevention Systems (IDS/IPS)</strong> කියන්නේ network එක protect කරන්න දාපු security barriers. ඒවට බාධාවක් නැතුව attackersලා මග හැරෙන්න try කරන techniques තමයි <em>evasion techniques</em>.</p><h3>🧱 Firewall Evasion Techniques (වැටුනු දොරටු හරහා එළියට යන හැටි)</h3><p>Firewall එකක කාර්යය වන්නේ network traffic inspect කරලා, predefined rules අනුව block හරි allow කරන එක.</p><h4>🔹 1. Fragmentation Attacks</h4><p>Attack එකේ payload එක කුඩා packets වලට split කරලා firewall එක confuse කරනවා. ඒක properly reassemble වෙන්නේ නැති නිසා malicious content detect වෙන්න බැහැ.</p><h4>🔹 2. Protocol Manipulation</h4><p>Network protocols වල structure change කිරීමෙන් firewall එක deceive කරනවා. උදා: HTTP headers modify කිරීම.</p><h4>🔹 3. Exploiting Vulnerabilities</h4><p>Weak configuration හෝ unpatched firewall එකක loophole exploit කරනවා.</p><h4>🔹 4. Source Routing Attacks</h4><p>Packets වල route manually define කර firewall rules avoid කරනවා.</p><h4>🔹 5. Using Encryption</h4><p>Traffic encrypt කර firewall inspection bypass කරනවා. e.g., SSL tunnels or VPNs.</p><h3>👁️‍🗨️ IDS/IPS Evasion Techniques</h3><p><strong>IDS</strong> (detects and alerts) සහ <strong>IPS</strong> (detects and blocks) systems target කරපු attacks detect කරන්න design කරපු systems. ඒව bypass කරන්න attackersලා වෙනම tricks use කරනවා.</p><h4>🌀 1. Polymorphic Attacks</h4><p>Attack එකට ලඟදීමත් වෙනස් signature එකක් තියෙන්න make කරනවා. IDS එක detect කරන්න අපහසුයි.</p><h4>🌀 2. Metamorphic Attacks</h4><p>Attack එකේ structure itself completely change කරනවා. Appearence totally different — even though purpose එක එකයි.</p><h4>🌀 3. Evasion Techniques</h4><p>Obfuscation (හෙවුවම) methods use කර IDS logic එක confuse කරනවා. e.g., encoding, unicode tricks.</p><h4>🌀 4. Exploiting IDS/IPS Vulnerabilities</h4><p>Unpatched system එකක් හරි, weak rule-set එකක් exploit කිරීම.</p><h4>🌀 5. Confusing the System</h4><p>Fake traffic, decoy attacks, timing delays වගේ tactics use කර real attack එක හංගනවා.</p><h3>🛡️ Defense Strategies</h3><h4>✅ 1. Regular Updates and Patching</h4><p>Security systems regularly patch කරලා vulnerabilities fix කරන්න.</p><h4>✅ 2. Advanced Detection Techniques</h4><p>Signature-based detection වල limitations වලට alternative ලෙස <strong>machine learning</strong>, <strong>anomaly detection</strong> වගේ modern methods use කරන්න.</p><h4>✅ 3. Defense in Depth</h4><p>Multiple layers of security (Firewall + IDS/IPS + SIEM + Antivirus + etc.) use කර එකක් fail වුනත් තවත් layer එකක් catch කරන්න හැකි වෙන්න.</p><h4>✅ 4. Traffic Monitoring &amp; Analysis</h4><p>Real-time traffic continuously analyze කරන්න. Suspicious activity detect කරන්න — even if it doesn’t match known patterns.</p><h4>✅ 5. Incident Response Planning</h4><p>Attack එකක් success වුනත් ඒකට rapid and effective way එකකින් respond කරන්න <strong>pre-defined response plan</strong> එකක් තියෙන්න ඕනේ.</p><h4>🧠 Summary:</h4><p>💡 <em>“Evasion is a cat-and-mouse game.”</em><br> Attackers attempt to hide. Defenders must adapt.<br> <strong>Update — Monitor — Harden — Layer defenses</strong> = Sustainable cybersecurity.</p><h3>🧠 Main Evasion Techniques</h3><h4>1️⃣ Decoys — Clone Army Style 👥</h4><p>🕵️ <strong>Purpose</strong>:<br> Real attacker IP එක hide කරන්න fake IPs use කරනවා.</p><pre>nmap -D RND:10 &lt;target ip&gt;</pre><p>📌 මෙතැන RND:10 කියන්නේ Nmap එක use කරනවා <strong>random 10 decoy IPs</strong>.<br> 📡 IDS එක confused වෙනවා – හෙවූ වගේ කොයි IP එකෙන්ද real scan එක වෙන්නේ කියලා දන්න බෑ.</p><h4>2️⃣ Fragmentation — Packet බෙදලා යවන්න 🧩</h4><p>📬 Normal packet එකක content එක IDS එක detect කරන්න පුළුවන්.<br> ➡️ ඒක avoid කරන්න attacker එකෙක් <strong>packet fragmentation</strong> use කරලා small pieces වලට traffic එක cut කරලා path එකට යවනවා.</p><pre>nmap -f 192.168.1.10</pre><p>🧬 -f flag කියන්නේ fragmented packets send කරන එක.</p><p>📌 IDS එකට <strong>whole payload එක analyze කරන්න අමාරුයි.</strong></p><h3>3️⃣ IP Spoofing — Fake Caller ID 🕶️</h3><p>📪 Spoofing කියන්නේ <strong>fake IP address</strong> එකක් use කරලා attack එක initiate කරන එක.<br> ➡️ බොහෝවිට replies receive කරන්න බෑ (unless man-in-the-middle).</p><pre>hping3 -a 1.2.3.4 -S -p 80 192.168.1.10</pre><p>📌 -a → spoofed source IP<br> ⚠️ Not useful unless used with another trick like DoS or Decoys.</p><h3>4️⃣ Scan Timing Tricks — Slow &amp; Low 🐢</h3><p>🚀 IDS එකක් expect කරනවා fast/normal scanning pattern එකක්.<br> ➡️ Slow scan එකක් වුණාම detect කරන්න හරිම අමාරුයි.</p><pre>nmap -T1 192.168.1.10</pre><p>🕓 -T1 = very slow<br> ➡️ IDS එක ignore කරන්න පුළුවන් low frequency traffic.</p><h3>5️⃣ Custom Packet Crafting 🛠️</h3><p>🔧 hping3, scapy, nping වගේ tools use කරලා unusual flags, payloads, timings, source ports set කරන්න පුළුවන්.</p><pre>hping3 -S --flood -p 80 192.168.1.10</pre><p>➡️ <strong>Bypass firewalls</strong> that block normal TCP flags or SYN scans.</p><h3>🛡️ <strong>IDS/IPS Detection Strategies</strong><br> 📈 <strong>IDS/IPS detect කරන method වලට බලමු:</strong></h3><p>🔹 <strong>Signature-based</strong><br> 🧠 <strong>Sinhala Explanation</strong>:<br> ➡️ Attack එකක් දැනටමත් <strong>හඳුනාගත් pattern එකකට match</strong> වෙනවා.<br> 🧬 <strong>Antivirus</strong> systems වල pattern matching වගේමයි.</p><p>🔹 <strong>Anomaly-based</strong><br> 🔍 <strong>Sinhala Explanation</strong>:<br> ➡️ Network එකේ <strong>normal behavior</strong> එකට වෙනස් traffic එකක් detect කරනවා.<br> 📊 E.g., sudden high traffic, unexpected port usage.</p><p>🔹 <strong>Heuristic-based</strong><br> 🧪 <strong>Sinhala Explanation</strong>:<br> ➡️ <strong>Suspicious behavior guess</strong> කරනවා.<br> 🤖 Sometimes AI/ML use වෙනවා unknown threats catch කරන්න.</p><p>🔹 <strong>Stateful Protocol Analysis</strong><br> 📡 <strong>Sinhala Explanation</strong>:<br> ➡️ Protocol (HTTP, FTP, etc.) <strong>correct use</strong> වෙන විදිහ analyze කරනවා.<br> 🧩 Abnormal protocol behavior = suspicious.</p><p>👉 <strong>Note:</strong><br> Most <strong>evasion techniques</strong> (e.g., packet fragmentation, slow scans) target <strong>Signature-based</strong> &amp; <strong>Anomaly-based</strong> systems.</p><h4>🔐 <strong>Summary Cheat Sheet — Evasion Techniques</strong><br> (📚 Technique + Tool )</h4><p>🔹 <strong>Decoy Scans</strong><br> 🛠️ <strong>Tool</strong>: nmap -D<br> 🎯 <strong>Purpose</strong>:<br> ➡️ <strong>Real IP address එක hide</strong> කරනවා by mixing it with fake IPs.<br> 🫥 IDS එකට real attacker identify කරන්න අමාරු වෙනවා.</p><p>🔹 <strong>Fragmentation</strong><br> 🛠️ <strong>Tool</strong>: nmap -f<br> 🎯 <strong>Purpose</strong>:<br> ➡️ <strong>Packet එකට කොටස්</strong> කරලා send කරනවා.<br> 🧩 IDS එකට full payload එක analysis කරන්න <strong>අමාරුයි</strong>.</p><p>🔹 <strong>Spoofing</strong><br> 🛠️ <strong>Tools</strong>: hping3, nmap<br> 🎯 <strong>Purpose</strong>:<br> ➡️ <strong>Fake source IP</strong> යවලා <strong>real attacker hide</strong> කරනවා.<br> ⚠️ Response එක spoof IP එකට යන නිසා sometimes no feedback.</p><p>🔹 <strong>Timing</strong><br> 🛠️ <strong>Tool</strong>: nmap -T1<br> 🎯 <strong>Purpose</strong>:<br> ➡️ <strong>Scan එක slow</strong> කරනවා to <strong>avoid detection</strong>.<br> 🐢 Less suspicious but takes more time.</p><p>🔹 <strong>Custom Packets</strong><br> 🛠️ <strong>Tools</strong>: hping3, scapy<br> 🎯 <strong>Purpose</strong>:<br> ➡️ <strong>Protocol rules break</strong> කරන custom packets generate කරනවා.<br> 🧪 IDS/IPS engines <strong>confuse</strong> කරනවා.</p><h3>🧠 Tip:</h3><p>🚫 <strong>Firewall / IDS evade කරනවා dangerous territory</strong> එකක්.<br> ☑️ Ethical hacking labs / CTFs / Red Teaming scopes තුලදී විතරයි use කරන්න.</p><p>📚 Next Level Topics You Can Learn:</p><ul><li><strong>IDS evasion via encrypted payloads (SSL tunneling)</strong></li><li><strong>Evasion using proxy chains</strong></li><li><strong>Detecting honeypots before scanning</strong></li></ul><h3>🔍 Enumeration කියන්නේ මොකද්ද?</h3><p>Enumeration කියන්නේ attacker කෙනෙක් (හෝ ethical hacker කෙනෙක්) active way එකකින් system එක query කරලා valuable information gather කරන process එකක්. මේක <strong>reconnaissance phase</strong> එකේ second step එකක් ලෙස භාවිතා කරනවා — Passive recon වලින් වඩා <strong>direct</strong> සහ <strong>aggressive</strong>.</p><p>📌 මේක <strong>Active Reconnaissance</strong> category එකට වැටෙනවා — ඒ කියන්නේ network එක actively query කරනවා information එකක් retrieve කරන්න.</p><p>🧠 මෙය <strong>Scanning</strong> එකෙන් පසුව එන step එක.</p><h3>🎯 Enumeration වල Main Objectives මොනවද?</h3><h4>👤 Users &amp; Groups Enumeration</h4><p>Attackersලා try කරනවා valid usernames හොයාගන්න. මේවා password guessing attacks වලට සහ privilege escalation වලට use කරන්න පුළුවන්.</p><h4>🗂️ Network Shares &amp; Services</h4><p>Open file shares, SMB shares, RPC services වගේ ඒව හඳුනාගෙන unauthorized access try කරන්න පුළුවන්.</p><h4>💻 Operating System &amp; Software Information</h4><p>OS version එක, installed software, patch levels වගේ details collect කරලා attackersලා known vulnerabilities check කරනවා.</p><h4>🔌 Open Ports &amp; Protocols</h4><p>Port scan කරලා TCP/UDP ports වලින් run වෙන services ගැන idea ගන්න පුළුවන්. උදාහරණයක් ලෙස TCP 139/445 (NetBIOS/SMB), TCP 389 (LDAP), UDP 161 (SNMP).</p><h4>🌐 SNMP &amp; DNS Enumeration</h4><p>SNMP service එක query කරලා network devices, system info, routing info වගේ දේවල් gather කරන්න පුළුවන්. DNS zone transfer එකක් success වුණොත් attackersට domain structure එකම දැනගන්න පුළුවන්.</p><h3>🔄 Ethical Use vs Malicious Use</h3><ul><li><strong>Ethical hackers</strong> enumeration use කරනවා system එක secure කරන්න, weaknesses identify කරලා fix කරන්න.</li><li><strong>Malicious hackers</strong> enumeration use කරනවා system එක hack කරන්න pre-planning step එකක් ලෙස.</li></ul><h3>⚙️ Common Enumeration Techniques</h3><h4>✅ User Enumeration</h4><p>Login page එකේ error messages observe කරලා හෝ SMB/FTP services query කරලා valid usernames හොයාගන්න.</p><h4>✅ DNS Zone Transfer</h4><p>DNS server එක misconfigured නම්, attacker කෙනෙක්ට zone file එකක් transfer කරගන්න පුළුවන්. ඒකෙන් domain එකේ internal structure හොයාගන්න පුළුවන්.</p><h4>✅ SNMP Enumeration</h4><p>Tools like snmpwalk use කරලා system uptime, installed software, interfaces, routing tables gather කරන්න පුළුවන් (mostly via SNMPv1/2).</p><h4>✅ LDAP Enumeration</h4><p>LDAP directories query කරලා user accounts, groups, policies වගේ data enumerate කරන්න පුළුවන්.</p><h3>🛡️ Enumeration වලට Protection Strategies</h3><ul><li>Unused services disable කරන්න (Eg: NetBIOS, RPC, SNMP)</li><li>DNS zone transfers restrict කරන්න</li><li>SNMPv3 only allow කරන්න, strong community strings use කරන්න</li><li>Access controls properly configure කරන්න</li><li>Intrusion detection systems (IDS) implement කරන්න</li><li>Login attempts limit කරන්න (lockout policy)</li></ul><h4>🧠 Final Thought:</h4><blockquote>Enumeration is the gateway to exploitation.<em><br> අපි ethical hackerලෝ වශයෙන් මෙය use කරනවා systems secure කරන්න.<br> Attackersලා මේම step එක use කරන්නේ system එකට තුලින්ම බිඳීමේ planning එකට.</em></blockquote><h3>🔄 <strong>🆚 Scanning vs Enumeration</strong><br> (Compare &amp; contrast)</h3><h3>🌐 1️⃣ Scanning — Broad-level Info Gathering</h3><p>📌 <strong>Purpose</strong>:<br> Identify කරනවා:</p><ul><li>Live hosts (active devices on network)</li><li>Open ports</li><li>Running services</li><li>Basic vulnerabilities</li></ul><p>📌 <strong>Common Techniques</strong>:</p><ul><li>🛰️ <strong>Ping Sweeps</strong> — To find which IPs are alive</li><li>🔌 <strong>Port Scanning</strong> — To detect which ports are open and what services are running</li><li>🛡️ <strong>Vulnerability Scanning</strong> — Scan known weaknesses in OS/software</li></ul><p>📌 <strong>Popular Tools</strong>:</p><ul><li><strong>Nmap</strong> — Port &amp; service detection</li><li><strong>Nessus</strong>, <strong>OpenVAS</strong> — Vulnerability scanners</li></ul><p>🧠 <em>Think of scanning as creating a “network map” from outside — what’s alive, what’s open, what’s vulnerable?</em></p><h3>🕵️‍♂️ 2️⃣ Enumeration — Deep-level Info Extraction</h3><p>📌 <strong>Purpose</strong>:<br> Already identified targets (from scanning) now probe කරලා:</p><ul><li>User accounts</li><li>Group memberships</li><li>Network shares</li><li>DNS records</li><li>Service banners</li><li>System metadata</li></ul><p>📌 <strong>Common Techniques</strong>:</p><ul><li>🏷️ <strong>Banner Grabbing</strong> — Get service version info from headers</li><li>🌐 <strong>DNS Enumeration</strong> — Hostnames, zone transfers</li><li>👤 <strong>User Enumeration</strong> — Discover valid usernames</li><li>🧾 <strong>SNMP / LDAP Enumeration</strong> — Extract network device data or user/group info</li></ul><p>📌 <strong>Popular Tools</strong>:</p><ul><li><strong>Netcat</strong>, <strong>Telnet</strong>, <strong>Enum4linux</strong>, <strong>Nbtstat</strong>, <strong>SNMPWalk</strong>, <strong>ldapsearch</strong></li></ul><p>🧠 <em>Enumeration gives an attacker a “deep internal map” — වගේ target system එකේ inside structure එකම බලන්න දොරකඩක්.</em></p><h3>📌 Scanning vs Enumeration: Simple Comparison</h3><ul><li><strong>🔭 Scanning</strong> = Surface-level scan</li><li><strong>🔬 Enumeration</strong> = Deep analysis</li><li><strong>Scanning</strong> helps you see <em>what’s there</em>,</li><li><strong>Enumeration</strong> helps you understand <em>what exactly it is &amp; how to use it</em>.</li></ul><h4>🎯 Final Thought:</h4><blockquote><em>“Enumeration without scanning is like trying to break into a house you haven’t even located yet.”<br> “Scanning without enumeration is like finding a door but not knowing how to unlock it.</em></blockquote><h3>🎯 <strong>Goals of Enumeration</strong></h3><p>🕵️ Ethical hacker or penetration tester කෙනෙක් විදිහට, <strong>enumeration</strong> එකෙන් ඔයාට ලැබෙන්නෙ valuable intel like this:</p><p>✅ <strong>Usernames / Groups</strong><br> 📝 <strong>Sinhala</strong>: System එකේ <strong>active users</strong> සහ <strong>group memberships</strong> identify කරනවා<br> 👤 Useful for <strong>brute-force attempts</strong> or privilege escalation.</p><p>✅ <strong>Shares / Services</strong><br> 📝 <strong>Sinhala</strong>: SMB shares, <strong>admin folders</strong>, <strong>network printers</strong> වගේ accessible resources සොයනවා<br> 📂 May contain sensitive files or misconfigurations.</p><p>✅ <strong>Password Policies</strong><br> 📝 <strong>Sinhala</strong>: Password එකේ <strong>length, complexity, age rules</strong> වගේ policy එක දැනගන්නවා<br> 🔑 Helps craft more effective <strong>password attacks</strong>.</p><p>✅ <strong>Software Versions</strong><br> 📝 <strong>Sinhala</strong>: <strong>Services/OS versions</strong> detect කරලා ඒවාට match වෙන <strong>vulnerabilities</strong> හොයනවා<br> 🧪 Key for <strong>exploit selection</strong>.</p><p>✅ <strong>Network Resources</strong><br> 📝 <strong>Sinhala</strong>: Connected <strong>devices</strong>, <strong>computers</strong>, and sometimes <strong>network topology</strong> itself දැනගන්න පුළුවන්<br> 🌐 Helps understand <strong>attack surface</strong>.</p><p>✅ <strong>Open Sessions</strong><br> 📝 <strong>Sinhala</strong>: <strong>කවුද login වෙලා තියෙන්නේ</strong>, <strong>කව්රුන් කොහෙන් connect වෙලාද</strong> කියලා track කරනවා<br> 👥 Useful for identifying <strong>active users</strong> and potential targets.</p><h3>📡 Protocols Involved in Enumeration</h3><h3>1️⃣ NetBIOS / SMB (Windows)</h3><p>📁 Shares, users, domain info, OS version</p><p>🔧 Tools:</p><ul><li>nbtstat</li><li>enum4linux</li><li>smbclient</li><li>smbmap</li></ul><p>🧪 Example:</p><pre>enum4linux -a 192.168.1.10</pre><p>➡️ Returns:</p><ul><li>Users</li><li>Groups</li><li>Shared folders</li><li>OS version</li></ul><h3>2️⃣ SNMP (Simple Network Management Protocol)</h3><p>📟 Used mostly in <strong>network devices (routers, switches)</strong><br> ➡️ Weak SNMP configs (like public community string) allow <strong>total system info dump</strong>!</p><p>🔧 Tools:</p><ul><li>snmpwalk</li><li>onesixtyone</li></ul><p>🧪 Example:</p><pre>snmpwalk -v1 -c public 192.168.1.10</pre><p>➡️ Can reveal:</p><ul><li>Uptime</li><li>Interfaces</li><li>Device name, OS</li><li>Routing table</li><li>Installed software</li></ul><h3>3️⃣ LDAP (Lightweight Directory Access Protocol)</h3><p>📘 Used in <strong>Active Directory</strong> to manage users/computers.</p><p>🔧 Tools:</p><ul><li>ldapsearch</li><li>nmap --script ldap-*</li></ul><p>🧪 Example:</p><pre>ldapsearch -x -h 192.168.1.10 -b &quot;dc=corp,dc=local&quot;</pre><p>➡️ Reveal:</p><ul><li>Organizational units (OU)</li><li>Users</li><li>Groups</li><li>Email addresses</li></ul><h3>4️⃣ RDP / Telnet / SSH</h3><p>🖥️ Sometimes login prompts or banners reveal usernames or OS.</p><p>🔧 Tools:</p><ul><li>hydra for brute force</li><li>Manual telnet connection for banner grabbing</li></ul><h3>5️⃣ SMTP (Mail Servers)</h3><p>📨 Can be used to verify valid users via <strong>VRFY / EXPN</strong> commands</p><pre>telnet mail.target.com 25</pre><p>➡️ VRFY alice → 250 User exists</p><h3>🧠 <strong>Enumeration Summary Cheat Sheet</strong></h3><h4>🔹 <strong>NetBIOS / SMB</strong></h4><ul><li>Data Extracted: Users, Shares, OS info</li><li>Tools: enum4linux, smbclient</li></ul><h4>🔹 <strong>SNMP</strong></h4><ul><li>Data Extracted: Network configurations, OS details</li><li>Tools: snmpwalk, onesixtyone</li></ul><h4>🔹 <strong>LDAP</strong></h4><ul><li>Data Extracted: Active Directory structure, Users</li><li>Tools: ldapsearch</li></ul><h4>🔹 <strong>SMTP</strong></h4><ul><li>Data Extracted: Valid usernames</li><li>Tools: telnet, nmap --script smtp-*</li></ul><h4>🔹 <strong>RDP / SSH</strong></h4><ul><li>Data Extracted: Banner info, brute force attempts</li><li>Tools: hydra, telnet‍</li></ul><h3>🏁 Final Thoughts</h3><p>✅ <strong>Enumeration</strong> stage එකෙන් ethical hacker ට ලැබෙන්නෙ<br> <strong>maximum leverage</strong> for privilege escalation, lateral movement, and exploiting.</p><p>🚨 <strong>ALWAYS REMEMBER</strong>: Enumeration is <strong>active</strong> — target system එකේ logs වල එය record වෙනවා!</p><h3>Enumeration Tools</h3><h3>🔧 What are Enumeration Tools?</h3><p><strong>Enumeration tools</strong> කියන්නේ automate කරන tools –<br> ඔයාට system එකෙන් usernames, shares, groups, services වගේ <strong>valuable data</strong> grab කරන්න දෙන.</p><h3>🛠️ 1. Enum4linux – SMB/NetBIOS King 👑</h3><h4>🔍 What it does:</h4><p>Windows systems වල SMB/NetBIOS service එක exploit කරලා:</p><ul><li>👤 Usernames</li><li>🧑‍🤝‍🧑 Groups</li><li>📁 Shares</li><li>🧾 Password policy</li><li>🧠 OS info</li></ul><h4>🔧 Usage:</h4><pre>enum4linux -a 192.168.1.10</pre><p>📌 -a කියන්නේ <strong>all options</strong> run කරන්න.</p><h4>🧪 Sample Output:</h4><pre>[+] Getting OS info...<br>[+] Enumerating users using RID cycling...<br>[+] Found user: alice<br>[+] Found group: Administrators<br>[+] Password policy: min length = 8</pre><p>🔐 <strong>Use-case</strong>: Active Directory systems enumerate කරන්න perfect!</p><h3>🛠️ 2. SNMPWalk – Network Info Collector 📡</h3><h4>🔍 What it does:</h4><p>SNMP service එකේ <strong>public string</strong> (default: public) use කරලා:</p><ul><li>Device info (Router/Switch)</li><li>OS version</li><li>Network interfaces</li><li>Running processes</li><li>Uptime</li></ul><h4>🔧 Usage:</h4><pre>snmpwalk -v1 -c public 192.168.1.10</pre><p>📌 -v1 = SNMP version 1<br> 📌 -c = community string (public is default, weak!)</p><h4>🧪 Sample Output:</h4><pre>sysDescr.0 = STRING: Linux kali 5.15.0 ...<br>ifDescr.1 = STRING: eth0<br>hrSWRunName.1 = STRING: sshd</pre><p>🔐 <strong>Use-case</strong>: Network devices enumerate කරන විට use කරන්න.</p><h3>🛠️ 3. nbtstat – Windows NetBIOS Enumerator 🧱</h3><p>➡️ Mainly use වෙනව <strong>Windows to Windows</strong> systems අතර.</p><h4>🔍 What it does:</h4><ul><li>🔎 NetBIOS table එක show කරනවා</li><li>🔐 Logged-in user</li><li>🧠 MAC address</li><li>Domain/workgroup info</li></ul><h4>🔧 Usage (Windows CMD):</h4><pre>nbtstat -A 192.168.1.10</pre><p>📌 -A = IP address එකෙන් query</p><h4>🧪 Sample Output:</h4><pre>Name           Type       Status<br>--------------------------------------<br>PC-NAME       &lt;00&gt;       UNIQUE      Registered<br>WORKGROUP     &lt;00&gt;       GROUP       Registered<br>USERNAME      &lt;03&gt;       UNIQUE      Registered</pre><p>🔐 <strong>Use-case</strong>: Windows enumeration basic step එකක්.</p><h3>🛠️ 4. LDAP Enumeration Tools — Active Directory 🎯</h3><h4>🔍 What is LDAP?</h4><p>LDAP (Lightweight Directory Access Protocol) — mainly use වෙනවා <strong>Active Directory</strong> info retrieve කරන්න.</p><h4>🔧 Tool: ldapsearch</h4><pre>ldapsearch -x -h 192.168.1.10 -b &quot;dc=corp,dc=local&quot;</pre><p>📌 -b = base DN<br> 📌 -x = simple auth</p><h4>🧪 Sample Output:</h4><pre>dn: cn=alice,ou=Users,dc=corp,dc=local<br>uid: alice<br>mail: alice@corp.local<br>memberOf: CN=Admins,CN=Users,DC=corp,DC=local</pre><p>🔐 <strong>Use-case</strong>: Users, groups, emails enumerate කරන්න.</p><h3>🧠 <strong>Summary Cheat Sheet 🧾</strong></h3><p>🔹 <strong>enum4linux</strong></p><ul><li><strong>Protocol:</strong> SMB</li><li><strong>Info Gathered:</strong> Users, Shares, Groups</li><li><strong>OS Support:</strong> Linux</li></ul><p>🔹 <strong>snmpwalk</strong></p><ul><li><strong>Protocol:</strong> SNMP</li><li><strong>Info Gathered:</strong> Device &amp; Network info</li><li><strong>OS Support:</strong> Linux / Unix</li></ul><p>🔹 <strong>nbtstat</strong></p><ul><li><strong>Protocol:</strong> NetBIOS</li><li><strong>Info Gathered:</strong> Hostname, Logged users</li><li><strong>OS Support:</strong> Windows</li></ul><p>🔹 <strong>ldapsearch</strong></p><ul><li><strong>Protocol:</strong> LDAP</li><li><strong>Info Gathered:</strong> AD users, Groups, Emails</li><li><strong>OS Support:</strong> Linux / Windows (via WSL)</li></ul><h4>✅ Final Tips</h4><ul><li>🎯 <strong>Enum4linux</strong> best for Windows environments.</li><li>📡 <strong>SNMPWalk</strong> perfect for routers/switches.</li><li>🧱 <strong>nbtstat</strong> Windows command line quick check.</li><li>📘 <strong>LDAP</strong> is gold mine in corporate AD networks.</li></ul><h3>🐧 Windows &amp; Linux Enumeration</h3><h3>🪟 Windows Enumeration 🧱</h3><p>Windows systems වල mostly use වෙන්නේ <strong>SMB / NetBIOS / Active Directory protocols</strong>.<br> කොහොමද Windows targets enumerate කරන්නෙ කියලා බලමු:</p><h3>1️⃣ RID Cycling — Bruteforce Windows Usernames 🧑‍💻</h3><p>🧠 RID = Relative Identifier<br> 👉 Domain accounts වල SID එකේ final part එක</p><ul><li>Domain SID: S-1-5-21-11223344-55667788-99009900</li><li>RID Cycling: Try from 500 onwards (500 = Administrator)</li></ul><p>🔧 <strong>Tool</strong>: enum4linux, crackmapexec, rpcclient</p><pre>rpcclient -U &quot;&quot; 192.168.1.10<br>&gt; enumdomusers</pre><p>➡️ Identify:</p><ul><li>Administrator</li><li>Guest</li><li>alice, bob…</li></ul><h3>2️⃣ SMB Info Gathering — Shares, Users, Policies</h3><p>🔧 Tools:</p><ul><li>enum4linux</li><li>smbclient</li><li>smbmap</li></ul><pre>smbclient -L //192.168.1.10 -N</pre><p>➡️ Outputs:</p><ul><li>Shared folders (e.g., ADMIN$, public)</li><li>Access permissions</li></ul><h3>3️⃣ NetBIOS Names — Quick Host Info</h3><p>🔧 Tool: nbtstat (Windows)</p><pre>nbtstat -A 192.168.1.10</pre><p>➡️ Hostname, domain/workgroup, logged-in user</p><h3>4️⃣ LDAP Enumeration (if part of AD)</h3><pre>ldapsearch -x -h 192.168.1.10 -b &quot;dc=corp,dc=local&quot;</pre><p>➡️ Lists:</p><ul><li>Users</li><li>Organizational Units (OUs)</li><li>Email addresses</li></ul><h3>🐧 Linux Enumeration 🐚</h3><p>Linux systems expose different protocols &amp; services. Here’s how you enumerate them like a pro:</p><h3>1️⃣ Finger Service — User Info 📇</h3><p>🔧 Tool: finger</p><pre>finger @192.168.1.10</pre><p>➡️ Shows:</p><ul><li>Logged-in users</li><li>Login times</li><li>Shell</li></ul><p>💡 Not always enabled, but if found — 🔓 goldmine!</p><h3>2️⃣ RPC (Remote Procedure Call) — User/Group Info</h3><p>🔧 Tool: rpcinfo, showmount</p><pre>rpcinfo -p 192.168.1.10</pre><p>➡️ Shows:</p><ul><li>NFS exports</li><li>RPC programs/services</li></ul><pre>showmount -e 192.168.1.10</pre><p>➡️ Exposed shares in NFS server</p><h3>3️⃣ SSH (Banner Grabbing + Brute) 🗝️</h3><p>SSH sometimes gives <strong>version info</strong> and is also a <strong>brute force target</strong>.</p><pre>nc 192.168.1.10 22</pre><p>➡️ Output:</p><pre>SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7</pre><p>🛠️ Use tools like hydra, medusa for SSH bruteforce if allowed.</p><p>🧠 <strong>Summary Table — Windows vs Linux Enumeration</strong><br> (📊 Techniques, Tools &amp; Outcomes — Sinhala-friendly)</p><h3>🪟 Windows Enumeration</h3><p>🔹 <strong>RID Cycling</strong></p><ul><li>🛠️ Tools: rpcclient, enum4linux</li><li>🎯 Outcome: Discover <strong>usernames</strong> via RID brute-force</li><li>📝 Sinhala: User list එකක් enumerate කරනවා SID-based method එකක් භාවිතා කරලා</li></ul><p>🔹 <strong>SMB Shares</strong></p><ul><li>🛠️ Tools: smbclient, smbmap</li><li>🎯 Outcome: View <strong>shared folders &amp; access levels</strong></li><li>📝 Sinhala: Public සහ hidden shares inspect කරනවා</li></ul><p>🔹 <strong>NetBIOS</strong></p><ul><li>🛠️ Tools: nbtstat</li><li>🎯 Outcome: <strong>Hostname</strong>, <strong>logged-in user</strong>, <strong>workgroup</strong></li><li>📝 Sinhala: LAN environment එකේ system ID collect කරන්න</li></ul><p>🔹 <strong>LDAP</strong></p><ul><li>🛠️ Tools: ldapsearch</li><li>🎯 Outcome: Extract <strong>users, groups, emails</strong></li><li>📝 Sinhala: Active Directory structure එක explore කරන්න</li></ul><h3>🐧 Linux Enumeration</h3><p>🔹 <strong>Finger</strong></p><ul><li>🛠️ Tool: finger</li><li>🎯 Outcome: Show <strong>currently logged-in users</strong></li><li>📝 Sinhala: System එකේ active user sessions බලන්න</li></ul><p>🔹 <strong>RPC/NFS</strong></p><ul><li>🛠️ Tools: rpcinfo, showmount</li><li>🎯 Outcome: List <strong>NFS exports</strong> &amp; <strong>RPC services</strong></li><li>📝 Sinhala: Remote file shares identify කරන්න</li></ul><p>🔹 <strong>SSH</strong></p><ul><li>🛠️ Tools: nc, hydra</li><li>🎯 Outcome: Check <strong>SSH version</strong>, attempt <strong>brute-force</strong></li><li>📝 Sinhala: Access attempts + service fingerprinting</li></ul><h3>🎯 <strong>Final Thoughts — Start Small, Think Big</strong></h3><p>Scanning and enumeration are the foundation stones of any cybersecurity or ethical hacking journey. Tools like Nmap, Netcat, Enum4linux, and SNMPWalk help you peek into the network’s secrets — but always remember:</p><p>🛡️ <strong>Knowledge is Power,</strong><br> ⚖️ <strong>Using that Power Ethically is Your Responsibility</strong></p><p>👉 මෙහි ඇති scanning සහ enumeration techniques සහ tools හැම එකම, legal සහ ethical boundaries ඇතුළත පාවිච්චි කරන්න කියලා මතක් කරන්නම්. Unauthorized scanning එක legal issues වලට හේතුව විය හැක.</p><p><strong>🔍 Use These Skills and Tools For:</strong><br> 🧪 Ethical hacking labs and practice<br> 🎯 Bug bounty challenges<br> 🏫 Learning and teaching cybersecurity<br> 🛡️ Authorized internal network testing</p><p>🚀 Your journey from zero to hero starts with these basics — keep experimenting, keep exploring!<br> If you found this guide useful:</p><p>📌 Try scanning your own lab or test environments<br> 📚 Share this with friends starting their cyber journey<br> 💬 Comment below if you want hands-on tutorials or Sinhala-English walkthroughs on real-world labs and CTFs!</p><p>🙏 Thanks for reading! Let’s learn and grow together — making the digital world safer, one scan at a time. 🌐🔎</p><p>✍️<strong> Written by: Ruwan Sanjeewa <em>(DevZenMaster)</em></strong><br> 🎓 Cybersecurity Enthusiast | Ethical Hacker | Medium Writer 🇱🇰</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b25994878919" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[️ Sinhala-English Guide to Reconnaissance Tools in Ethical Hacking (Practical Examples)]]></title>
            <link>https://devzenmaster.medium.com/%EF%B8%8F-sinhala-english-guide-to-reconnaissance-tools-in-ethical-hacking-practical-examples-d8376907eb3b?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/d8376907eb3b</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hacking-tools]]></category>
            <category><![CDATA[cybersecurity-education]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Sat, 02 Aug 2025 18:17:09 GMT</pubDate>
            <atom:updated>2025-08-03T16:13:29.411Z</atom:updated>
            <content:encoded><![CDATA[<blockquote>“Learn how ethical hackers gather information using passive &amp; active recon tools, explained with real commands, examples, and Sinhala-English descriptions.”</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*p_xQxd8LbkRZc14Z95XGfw.png" /></figure><blockquote>Learn how to ethically gather intelligence using tools like WHOIS, theHarvester, and Maltego — with Sinhala explanations for local learners. 🇱🇰🔐</blockquote><h3>🔍 <strong>WHOIS Lookup කියන්නේ මොකක්ද?</strong></h3><p><strong>WHOIS</strong> කියන්නේ “<strong>Who is responsible for this domain/IP?</strong>” කියන එකට උත්තරයක් දෙන්න භාවිතා කරන 🧾 query එකක්. මෙය 🌐 domain names සහ 🖥 IP addresses වල owner info, registrar info, register date, expire date වගේ තොරතුරු ලබාගන්න භාවිතා වෙනවා.<br> 📘 <strong>Passive Reconnaissance</strong> එකේදී WHOIS lookup එකෙන් 🕵️ attacker/ ethical hacker ට target එකේ publicly available info collect කරන්න පුළුවන්.</p><p>🧪 <strong>WHOIS Lookup Example</strong><br> අපි බලමු practical example එකක්:<br> 🎯 <strong>Target Domain</strong>: google.com<br> 🔧 <strong>Kali Linux</strong> එකෙන් WHOIS lookup එක කරන්න මෙහෙම type කරන්න:</p><pre>whois google.com</pre><p>🔽 <strong>Output</strong> එකේදි ඔයාට ලැබෙන තොරතුරු:</p><ul><li>🏷️ Domain Name: GOOGLE.COM</li><li>🏢 Registrar: MarkMonitor Inc.</li><li>🔄 Updated Date: 2019–09–09</li><li>🗓️ Creation Date: 1997–09–15</li><li>⏳ Expiration Date: 2028–09–14</li><li>🌐 Name Servers: ns1.google.com, ns2.google.com</li><li>👤 Registrant Contact: <em>(Sometimes hidden for privacy)</em></li></ul><h4>🌐 <strong>Online WHOIS Lookup Tools</strong></h4><p>CLI (Command Line Interface) එකක් නැතිව Browser එකෙන් පවා මෙවලම් භාවිතා කරන්න පුළුවන්:<br> 🔗 <a href="https://whois.domaintools.com">https://whois.domaintools.com</a><br> 🔗 <a href="https://who.is">https://who.is</a><br> 🔗 <a href="https://www.whois.com/whois/">https://www.whois.com/whois/</a></p><h4>🛠 <strong>Real Life Use Case</strong></h4><p>🔎 Ethical hacker කෙනෙක්ට target company එකේ domain name එක WHOIS check කරලා:</p><ul><li>📞 Contact info,</li><li>📧 Admin email (phishing possibilities check),</li><li>🖥️ Server info (next step — scanning phase)<br> එහෙම collect කරන්න පුළුවන්.</li></ul><h4>📌 <strong>Extra Tip</strong></h4><p>👨‍💻 Kali Linux CLI එකෙන් යාවත්කාලීන WHOIS tool එක run නොවුනොත් install කරන්න:</p><pre>sudo apt install whois</pre><h3>🌐 <strong>DNS Enumeration කියන්නේ මොකක්ද?</strong></h3><p>DNS Enumeration කියන්නේ <strong>Domain Name System</strong> එක හරහා domain එකට සම්බන්ධ services, hosts, mail servers, subdomains, IP addresses වගේ valuable තොරතුරු හොයන ක්‍රියාවලියක්.<br> 👉 <strong>DNS</strong> = Domain Name System<br> 👉 <strong>Enumeration</strong> = ගොඩක් details systematically එකතු කරන ක්‍රියාවලිය</p><h4>🛠️ <strong>Tools: </strong><strong>nslookup සහ </strong><strong>dig</strong></h4><p>අපි DNS Enumeration සඳහා mostly භාවිතා කරන CLI tools දෙකක්:<br> 🔹 nslookup – 🧓 Older tool, but very handy<br> 🔹 dig – ⚙️ More modern and flexible DNS query tool</p><h4>🔍 <strong>nslookup භාවිතා කරන්නේ කොහොමද?</strong></h4><p>📘 <strong>Basic Command:</strong></p><pre>nslookup google.com</pre><p>👉 මෙයින් google.com එකේ IP address එක resolve වෙනවා.</p><p>🧪 <strong>Example 1: Mail Server (MX Record) බලමු</strong></p><pre>nslookup -query=mx google.com</pre><p>🔽 <strong>Output එක</strong>:</p><pre>Server:  192.168.8.1<br>Address: 192.168.8.1#53<br><br>Non-authoritative answer:<br>google.com mail exchanger = 10 smtp.google.com.<br><br>Authoritative answers can be found from:</pre><p>➡️ මෙයින් ඔයාට 📬 Mail Servers identify කරන්න පුළුවන් (📤 Mail Server Exploits / 🎣 Phishing Analysis වලට help වෙනවා)</p><p>🧪 <strong>Example 2: Name Server බලන්න</strong></p><pre>nslookup -type=ns google.com</pre><p>➡️ මෙය Google.com වල 🧭 authoritative name servers identify කරනවා.</p><h4>🔍 <strong>dig භාවිතා කරන්නේ කොහොමද?</strong></h4><p>dig කියන්නේ &quot;<strong>Domain Information Groper</strong>&quot; කියන එකේ shorten form එක. මෙය advanced DNS querying tool එකක්.</p><p>📘 <strong>Basic Command:</strong></p><pre>dig google.com</pre><p>🔽 <strong>Output එකෙන් ඔයාට ලැබෙන්නේ:</strong></p><ul><li>🧠 IP Address</li><li>⏱️ Query Time</li><li>⏳ TTL (Time To Live)</li><li>💻 Server used</li><li>📦 Answer section</li></ul><p>🧪 <strong>Example 1: MX Record බලන්න</strong></p><pre>dig google.com MX</pre><p>➡️ Mail server info එක ලැබෙනවා</p><p>🧪 <strong>Example 2: All Records (AXFR attempt — Zone Transfer)</strong></p><pre> dig @ns1.google.com google.com AXFR</pre><p>📛 <strong>Note</strong>: Zone Transfer try කරන්න හොඳද කියලා check කරන්න ඕන. එක unauthorized නම් 🔴 legally dangerous!</p><p>👉 nslookup සහ dig කියන්නේ DNS server එකට query එකක් යැවලා 🌐 domain එකට අදාළ server, mail server, subdomain, IP වගේ details CLI එකෙන් ලබාදෙන tools.<br> 📘 අපි මේවා <strong>Passive Recon</strong> + <strong>Initial Active Scan</strong> step වල use කරනවා.</p><p>✅ <strong>Pros:</strong></p><ul><li>🧑‍💻 <strong>Easy to Use</strong> — nslookup සහ dig commands CLI එකේදි use කරන්න ලේසියි. Beginners ටත් සරලයි.</li><li>⚡ <strong>Fast Results</strong> — DNS info real-time වලින් resolve වෙන නිසා info එක ඉක්මනට ලැබේ.</li><li>📘 <strong>Detailed Information</strong> — dig tool එකෙන් IP address, TTL, authoritative name server, MX records වගේ deep info ලැබේ.</li><li>🎯 <strong>Supports Passive Reconnaissance</strong> — Without alerting the target (no direct probing), DNS info collect කරන්න පුළුවන්.</li><li>🧪 <strong>Useful in Penetration Testing</strong> — Mail server targeting, subdomain finding, zone transfer attempts වගේ testing වල extremely useful.</li></ul><p>❌ <strong>Cons:</strong></p><ul><li>🔐 <strong>Limited if DNS Security is Tight (DNSSEC)</strong> — Zone Transfer attempts (AXFR) fail වෙනවා if proper security settings තියෙනවානම්.</li><li>📵 <strong>May Not Reveal Hidden Services</strong> — Obfuscated/protected subdomains or internal hosts නම් detect කරන්න බැහැ.</li><li>🧱 <strong>Blocked by Firewalls or IDS/IPS</strong> — Organizations කිහිපයක firewall වලින් dig / nslookup queries block කරනවා.</li><li>🚫 <strong>Zone Transfer Unauthorized Attempt is Illegal</strong> — Unauthorized zone transfer try කිරීම 🟥 illegal and can get you into trouble.</li><li>🌐 <strong>Depends on External DNS Availability</strong> — DNS server unreachable නම් tool එක timeout වෙයි.</li></ul><p>👉 <strong>Ethical hacking context</strong> එකේදි nslookup සහ dig කියන්නේ <strong>valuable DNS enumeration tools</strong> දෙකක්.</p><p>🛡️ <strong>Use them only in legal or educational environments</strong> – especially when attempting zone transfers or scanning organizational domains.</p><blockquote>⚖️ dig = powerful but complex<br> ⚖️ nslookup = simple but limited</blockquote><h3>📩 <strong>What is Email and Host Harvesting?</strong></h3><h4>🔍 Email Harvesting කියන්නේ මොකක්ද?</h4><blockquote><em>Public internet වලින් (Google, Bing, LinkedIn වගේ) </em><strong><em>target organization එකේ email addresses</em></strong><em> ගොඩක් එකතු කරන ප්‍රොසෙසියි.</em></blockquote><p>📧 example:</p><pre>john.doe@target.com<br>admin@target.com<br>info@target.com</pre><p>👉 මේ emails එක phishing attacks වල, password spraying වල, social engineering වල use වෙයි.</p><h4>🖥️ Host Harvesting කියන්නේ මොකක්ද?</h4><blockquote><em>Target domain එකට අදාල </em><strong><em>subdomains, IP addresses, servers</em></strong><em> වගේ hostnames එකතු කරන recon process එක.</em></blockquote><p>🌐 example:</p><pre>mail.target.com<br>login.target.com<br>dev.target.com</pre><h4>🛠️ Tool Used: theHarvester</h4><p><strong>theHarvester</strong> කියන්නේ Kali Linux එකේ pre-installed recon tool එකක්.<br> මේකෙන් ඔයාට <strong>email addresses + hostnames</strong> එකතු කරන්න පුළුවන් public sources (search engines, PGP, Shodan, Hunter.io etc.) භාවිතා කරලා.</p><h4>🔧 How to Use theHarvester – with Examples</h4><h4>🔍 Step 1: Basic Syntax</h4><pre>theHarvester -d &lt;domain&gt; -b &lt;source&gt; -l &lt;limit&gt;</pre><p>Flag — Meaning</p><blockquote><strong>-d</strong>Target domain name (e.g., example.com)</blockquote><blockquote><strong>-b</strong>Source (e.g., google, bing, linkedin, shodan, etc.)</blockquote><blockquote><strong>-l</strong>Limit number of results</blockquote><h4>🧪 Example 1: Search Email and Hosts from Google</h4><pre>theHarvester -d tesla.com -b google -l 100</pre><p>📥 මෙය <strong>Tesla.com</strong> වල emails සහ hosts 100ක් වෙනම collect කරනවා Google එකෙන්.</p><h4>🧪 Example 2: Use All Sources</h4><pre>theHarvester -d microsoft.com -b all</pre><p>📡 මෙය <strong>Microsoft.com</strong> වල Emails, Hostnames, Subdomains එකතුවක් sources like Google, Bing, Yahoo, LinkedIn, etc. use කරලා ගන්නවා.</p><h4>💾 Optional: Output එක export කරන්න</h4><pre>theHarvester -d example.com -b google -l 100 -f outputfile.html</pre><p>➡️ Output එක HTML format එකට save වෙනවා (GUI report එකක් ලෙස).</p><h4>✅ Pros and ❌ Cons of theHarvester</h4><h4>Pros 🟢</h4><p>✅ <strong>Passive Reconnaissance Tool — </strong>No direct contact with the target system (silent info collection).</p><p>✅ <strong>Multiple Sources Supported — </strong>Google, Bing, LinkedIn, Hunter.io, Shodan, etc.</p><p>✅ <strong>Both Email + Host Harvesting — </strong>Dual functionality in one tool.</p><p>✅ <strong>HTML Report Export — </strong>Easy to review and share results.</p><p>✅ <strong>Beginner Friendly CLI Tool — </strong>Simple syntax and readable output.</p><h4>Cons 🔴</h4><p>❌ <strong>Depends on Public Info — </strong>If emails or hosts are hidden or protected, can’t find them.</p><p>❌ <strong>Rate Limiting by Search Engines — </strong>Google or Bing sometimes block/bypass scraping.</p><p>❌ <strong>No Real-time Validation — </strong>Shows outdated or inactive email addresses/hosts too.</p><p>❌ <strong>Limited Deep Enumeration — </strong>Only initial recon phase; no vulnerability scanning.</p><blockquote>📌 Ethical Reminder:</blockquote><blockquote>🚨 theHarvester should <strong>only be used in legal contexts</strong>:</blockquote><blockquote>For bug bounty programs</blockquote><blockquote>Educational labs</blockquote><blockquote>Red team inside authorized pentesting scopes</blockquote><blockquote>Unauthorized use = <strong>illegal</strong> 🛑</blockquote><h4>🧪 Summary Table:</h4><p>Feature &amp; Description</p><p>Tool NametheHarvester</p><p>Use Case — Collecting emails and hostnames from open sources</p><p>Best For — Passive Recon in early hacking steps</p><p>Example — theHarvester -d example.com -b google -l 100</p><p>Output — Emails, Subdomains, IPs, Exportable Report</p><h3>🌐 What is Shodan Search?</h3><p>🔍 <strong>Shodan</strong> කියන්නේ <strong>internet එකට connect වූ devices, servers, cameras, routers, printers, databases, SCADA systems</strong> වගේ machines සොයාගන්න special search engine එකක්.</p><p>📡 <strong>Google</strong>: Searches for websites<br> 🛰️ <strong>Shodan</strong>: Searches for <strong>devices and services</strong></p><p>exmaple:</p><ul><li>IP Cameras</li><li>Servers (Apache, Nginx, FTP)</li><li>Databases (MongoDB, Elasticsearch)</li><li>Industrial Controls (SCADA/ICS)</li></ul><h4>📦 What kind of info can you find on Shodan?</h4><p>Info Type &amp; Example</p><p>🌍 <strong>IP Address </strong>— 123.45.67.89</p><p>🌐 <strong>Location</strong> — Sri Lanka, Germany, USA</p><p>⚙️ <strong>Open Ports</strong> — 22 (SSH), 80 (HTTP), 443 (HTTPS), 3389 (RDP)</p><p>🧰<strong> Banner Info</strong> — Apache/2.4.29 (Ubuntu), SSH-2.0-OpenSSH_7.6</p><p>🛑<strong> Default Password Devices</strong> — CCTV, Printers, NAS</p><h4>🔐 Why is Shodan Powerful?</h4><p>Shodan continuously scans the internet and stores:</p><ul><li>Device banners</li><li>Open ports</li><li>Service versions</li><li>SSL certificates</li><li>Metadata of IoT devices</li></ul><p>🔎 මේක <strong>passive recon tool</strong> එකක් වගේ use කරන්න පුළුවන් — එකෙන් <strong>target device එක directly probe නොකර</strong> info එක ලබාගන්න පුළුවන්.</p><h4>🧪 How to Use Shodan Search (Optional if online)</h4><p><strong><em>🔗 Step 1: Visit </em></strong><a href="https://www.shodan.io"><strong><em>https://www.shodan.io</em></strong></a></p><ul><li>Free account create කරන්න.</li><li>Advanced filters use කරන්න පුළුවන්.</li></ul><h4>✅ Pros (Advantages)</h4><p>🛰️ <strong>Device-Level Visibility — </strong>Can find IoT devices, web servers, and industrial control systems</p><p>🔍 <strong>Banner Grabbing without Scanning — </strong>Already-scanned info, so you don’t need to directly scan</p><p>🧰 <strong>Easy to Search — </strong>Google-like search bar with filters</p><p>📈 <strong>Security Research &amp; Bug Bounty Use — </strong>Shodan helps find exposed databases and services</p><p>📍 <strong>Geolocation Support — </strong>Devices filtered by country, org, port, OS</p><h4>❌ Cons (Disadvantages)</h4><p>🚫 <strong>Some Features are Paid — </strong>Exporting data, advanced filters, full scans need premium</p><p>🔐 <strong>Ethical Risk — </strong>Viewing exposed data = okay, <strong>interacting = illegal without permission</strong></p><p>🧱 <strong>Devices May Use Firewalls/VPNs — </strong>All devices aren’t indexed if protected well</p><p>🕵️ <strong>Visible Searches — </strong>Your searches can be tracked/logged by Shodan</p><p>⏳ <strong>Not Always Real-time — </strong>Shodan data may be hours/days old (not live scan)</p><h4>⚠️ Ethical &amp; Legal Notice</h4><p>🚨 <strong>Shodan use is legal only when:</strong></p><ul><li>You’re searching your own organization/network</li><li>You’re doing bug bounty / red teaming with authorization</li><li>You’re using it purely for educational/demo purposes</li></ul><p>Unauthorized exploitation = <strong>illegal hacking</strong> ⚠️</p><h4>📚 <strong>Summary Table:</strong></h4><p>🔍 <strong>Feature</strong> — Shodan Search<br> 🛠️ <strong>Type</strong> — IoT/Device Search Engine<br> 🎯 <strong>Use</strong> — Passive Recon, Info Gathering<br> 💸 <strong>Free Access</strong> — Yes (Limited)<br> 💎 <strong>Premium Needed</strong> — For exports, deep searches<br> 🌐 <strong>URL</strong> — <a href="https://www.shodan.io">https://www.shodan.io</a><br> 🧪 <strong>Examples</strong> — port:22, org:&quot;SLT&quot;, country:&quot;LK&quot;<br> 👨‍💻 <strong>Good For</strong> – Pentesters, Security researchers, SOC teams</p><h3>🌐 What is Netcraft Site Report?</h3><p><strong>Netcraft Site Report</strong> කියන්නේ target website එකක <strong>technology stack, web server, hosting provider, DNS, SSL certificate, OS</strong> වගේ valuable information එකක් provide කරන <strong>online tool</strong> එකක්.</p><blockquote>🔗 Netcraft Site Report URL:</blockquote><blockquote>👉 Visit: <a href="https://sitereport.netcraft.com/">https://sitereport.netcraft.com/</a></blockquote><h4>🧪 How to Use Netcraft Site Report — Step-by-step</h4><h4>🔍 Step 1: Visit the site</h4><p>Go to ➡️ <a href="https://sitereport.netcraft.com/">https://sitereport.netcraft.com/</a></p><h4>✍️ Step 2: Enter the domain</h4><p>Example:</p><pre>google.com</pre><h4>📊 Step 3: Review the information you get:</h4><p>Hosting Company — Google LLC</p><p>IP Address — 142.250.72.206</p><p>OS — Linux</p><p>Web Server — gws (Google Web Server)</p><p>SSL Info — Issued by Google Trust Services</p><p>First Seen — 1998</p><p>Netblock Owner — Google LLC</p><p>Site Rank — (based on Netcraft usage data)</p><p>Technologies Used — HTTP/2, TLS 1.3, etc.</p><h4>🧠 Use Cases in Reconnaissance</h4><p>Goal &amp; How Netcraft Helps</p><p>🏷️ Identify Hosting Provider — Helps if you want to contact/report or test via hosting</p><p>🔐 SSL Inspection — Find certificate issuer and expiry</p><p>⚙️ Tech Stack Discovery — Web server, OS, and backend technologies</p><p>🚨 Security Assessment — Detect phishing, uptime anomalies, possible CDN use</p><p>🌐 Identify Subdomains — (Sometimes shows past changes with different IPs)</p><h4>✅ Pros (Advantages):</h4><p>🌐 <strong>Web-Based Tool — </strong>No software installation required — just use browser</p><p>🧩 <strong>Passive Recon — </strong>Doesn’t alert the target site or trigger firewalls</p><p>📡 <strong>Detailed Tech Info — </strong>OS, server, SSL, IP, host, ASN all visible</p><p>📈 <strong>Historical Data — </strong>See how the site infrastructure changed over time</p><p>🔍 <strong>Searchable by Company or Host — </strong>Helps for profiling large orgs</p><h4>❌ Cons (Disadvantages)</h4><p>❌ <strong>No Real-time Data Always — </strong>Cached results or delayed updates possible</p><p>❌ <strong>Limited Subdomain Info — </strong>Doesn’t show deep subdomain discovery</p><p>❌ <strong>Surface-level Recon Only — </strong>No vulnerability info or deep scanning</p><p>❌ <strong>Some Data Obfuscated — </strong>If site uses Cloudflare/CDN or proxying, real IP may not be shown</p><p>⚠️ <strong>Can be blocked by robots.txt — </strong>Some sites block Netcraft crawling</p><blockquote>🛡️ Ethical Use Notice</blockquote><blockquote>Netcraft data is <strong>publicly available</strong> and gathered legally from passive means.</blockquote><blockquote>✅ Ethical to use for:</blockquote><blockquote>Pentesting (initial recon)</blockquote><blockquote>Competitive analysis</blockquote><blockquote>Security awareness</blockquote><blockquote>Self-testing your site</blockquote><blockquote>🚫 Not ethical to combine this with malicious scanning or attacking the discovered host.</blockquote><h4>📚 <strong>Summary Table:</strong></h4><p>🔧 <strong>Tool Name</strong> — Netcraft Site Report<br> 🌐 <strong>URL</strong> — <a href="https://sitereport.netcraft.com">https://sitereport.netcraft.com</a><br> 🎯 <strong>Use Case</strong> — Passive web reconnaissance<br> 🧾 <strong>Info Provided</strong> — Host, IP, OS, SSL, Web Server, ASN, Rank<br> 👨‍💻 <strong>Best For</strong> — Ethical hackers, pentesters, web admins<br> 📊 <strong>Output Type</strong> — Web-based dashboard</p><h3>🌍 What is Traceroute?</h3><p><em>Traceroute කියන්නේ network tool එකක්, ඒකෙන් IP packet එකක් </em><strong><em>කොහොමද destination එකට යන්නේ</em></strong><em> කියන පාර දිගේ තියෙන </em><strong><em>network path</em></strong><em> එක හඳුනාගන්න පුළුවන්.</em></p><p>📌 එකකින් පුළුවන් ඔයාට බලන්න:</p><ul><li>එම domain එක යන්නෙ <strong>කවුද intermediate routers / hops</strong> හරහාද</li><li><strong>Delay (latency)</strong> කීයද හැම hop එකකදි</li><li>කවුද DNS resolving කරන <strong>IP-level path</strong> එකේ අගභාගයේ device එක</li></ul><h4>🛠️ Traceroute Tool එක භාවිතා කරන හැටි:</h4><p><strong>1. Windows CMD:</strong></p><pre>tracert google.com</pre><p><strong>2. Linux / Mac Terminal:</strong></p><pre>traceroute google.com</pre><p><strong>3. Online Tools:</strong></p><ul><li><a href="https://tools.keycdn.com/traceroute">https://tools.keycdn.com/traceroute</a></li><li><a href="https://www.geekflare.com/tools/traceroute-test/">https://www.geekflare.com/tools/traceroute-test/</a></li></ul><h4>🧪 Example:</h4><pre>traceroute google.com</pre><p><strong>Output එක:</strong></p><pre>1  192.168.1.1 (Router)<br> 2  203.115.0.1 (ISP Gateway)<br> 3  209.85.246.150 (Google Edge Node)<br> 4  ...</pre><p>මේකෙන් ඔයාට හඳුනාගන්න පුළුවන්:</p><ul><li>Domain එක resolve වෙලා යන path එක</li><li>වෙනත් countries / ISPs involved ද?</li><li><strong>Packet loss</strong> or delay තියෙන router location එක</li></ul><h3>📚 <strong>Use Cases in Reconnaissance:</strong></h3><p>🛡️ <strong>Ethical Hacker’s Goal &amp; Traceroute Help</strong></p><p>🔍 <strong>IP Trace</strong> — 🎯 Target domain එක resolve වෙන්නේ කොහේද කියලා බලාගන්න<br> 🛰️ <strong>Identify Network Infrastructure</strong> — Routers, hops, and ISPs 🧭 හඳුනාගන්න<br> 🔥 <strong>Detect Firewall / Filtering</strong> — Traceroute එක ⌛ timeout වෙන තැනින් 🔒 filtering indications හඳුනාගන්න<br> 🗺️ <strong>Regional Path Tracking</strong> — Path එක 🧵 යන්නේ කව්රුන් හරහාද කියලා 🌍 geographical location එකත් එක්ක විශ්ලේෂණය කරන්න.</p><h4>✅ Pros (Advantages)</h4><p>🧩 <strong>Passive &amp; Lightweight — </strong>Port scan වගේ deep probing නැහැ<br>🔎 <strong>Network Map එකක් දෙනවා — </strong>IP routing structure එක වගේ<br>🌐 <strong>DNS Resolve + IP Reveal — </strong>DNS resolve එකෙන් IP and route දෙකම බලාගන්න පුළුවන්<br>🕒 <strong>Latency Tracking — </strong>Hop-to-hop delay analyze කරන්න පුළුවන්</p><h4>❌ Cons (Disadvantages)</h4><p>🚫 <strong>ICMP Blocked Devices — ​</strong>මේ විදිහට * * * සමහර වෙලාවට timeouts එනවා<br>🚫 <strong>CDNs / Proxies — </strong>Real IP address එක sometimes ලැබෙන්නේ නෑ<br>⛔ <strong>Traceroute Detectable — </strong>IDS/IPS systems trace attempts detect කරයි<br>📉 <strong>Not 100% Reliable — </strong>Intermediate routers sometimes hop skip කරනවා or response deny කරනවා</p><h4>🧠 <strong>Summary Table:</strong></h4><p>🔧 <strong>Tool Name</strong> — Traceroute<br> 💻 <strong>OS Commands</strong> — tracert (Windows), traceroute (Linux/Mac)<br> 🎯 <strong>Purpose</strong> – Show path to domain or IP<br> 📡 <strong>Info Given</strong> – IP hops, latency, intermediate routers<br> 📈 <strong>Best Use</strong> – Mapping network path, delay analysis<br> 🛡️ <strong>Ethical Recon Use</strong> – DNS info, IP infrastructure, filter detection</p><h4>🎓 BONUS: Sinhala Lab Style Exercise</h4><p><strong>Objective:</strong> Target domain එකකට යන route එක විස්තර කරන්න<br> <strong>Domain:</strong> slt.lk</p><pre>traceroute slt.lk</pre><p>🔹 <strong>Analyze:</strong></p><ul><li>First hop → Router (e.g., 192.168.x.x)</li><li>Second hop → SLT ISP gateway</li><li>Mid → International routing (if outside country)</li><li>Final hop → Destination IP with domain match</li></ul><h3>🔐 Ethical Hacking Context:</h3><p>Traceroute කියන්නේ mostly passive tool එකක්, <strong>but can be logged</strong>. Reconnaissance phase එකේදි traceroute analysis එකෙන් පුළුවන්:</p><ul><li>Infrastructure mapping</li><li>Firewall presence check</li><li>Hosting zones analyze කිරීම</li></ul><h3>🕵️‍♂️ What is Maltego?</h3><p><strong>Maltego</strong> කියන්නේ <strong>powerful open-source intelligence (OSINT) සහ link analysis tool එකක්</strong>.<br> <strong>Community Edition</strong> එක free version එක. Ethical hackers, investigators, security analysts, researchers වගේ අයට දැනගන්න, map කරන්න, visualize කරන්න පුළුවන් <strong>entities අතර සම්බන්ධතා (relationships)</strong>.</p><p>Maltego වලින් අපිට පුළුවන් <strong>email addresses, domain names, IP addresses, phone numbers, social media profiles, organizations</strong> වගේ data එකක් collect කරලා ඒවා අතර තියෙන සම්බන්ධතා <strong>graphically visualize</strong> කරන්න.<br> ඉතා හොඳ visual tool එකක් විදිහට, හොයාගන්න පුළුවන් hidden connections.</p><h4>🔧 How to Use Maltego Community Edition?</h4><p><strong>Step 1: Download and Install</strong></p><ul><li>Visit: <a href="https://www.maltego.com/downloads/">https://www.maltego.com/downloads/</a></li><li>Choose <strong>Community Edition</strong></li><li>Create free account and activate</li></ul><p><strong>Step 2: Create a New Graph</strong></p><ul><li>Open Maltego</li><li>Click “New Graph”</li></ul><p><strong>Step 3: Add Entities</strong></p><ul><li>Search entity (e.g., Domain, Person, Email, IP)</li><li>Drag &amp; drop entity onto graph canvas</li></ul><p><strong>Step 4: Run Transforms</strong></p><ul><li>Right-click on entity → “Run Transform”</li><li>Select transforms (e.g., domain to IP, email to domain, DNS records, social media lookup)</li><li>Results appear as linked nodes on the graph</li></ul><h4>🧪 Example Use Case</h4><h4>Example: Domain Recon</h4><ul><li>Add entity: example.com (Domain)</li><li>Run transform: DNS records lookup → gets IP addresses</li><li>Run transform: Whois lookup → owner info</li><li>Run transform: Search emails related to domain → get email addresses</li><li>View how all info connects on graph</li></ul><h4>✅ Pros (Advantages)</h4><p>🔍 <strong>Visual Data Representation — </strong>Data relationships clearly seen in graphs<br>🧰 <strong>Multiple Data Sources — </strong>Supports many transforms &amp; integrations (WHOIS, DNS, social media)<br>💻 <strong>Community Edition is Free — </strong>Good for beginners and small recon tasks<br>⚡ <strong>Fast OSINT Collection — </strong>Automates data gathering from public sources<br>📊 <strong>Customizable Transforms — </strong>Advanced users can write their own transforms</p><h4>❌ Cons (Disadvantages)</h4><p>🔒 <strong>Limited Features in Community Version — </strong>Pro and paid versions have more transforms and higher limits<br>🕒 <strong>API Limits — </strong>Free version limits queries per day<br>💡 <strong>Learning Curve — </strong>Slightly complex UI for beginners<br>🌐 <strong>Needs Internet — </strong>Online transforms require connectivity<br>🔐 <strong>Privacy Concern — </strong>Sensitive data exposure risk if not careful</p><h3>📚 <strong>Summary Table:</strong></h3><p>🔍 <strong>Feature</strong> — Maltego Community Edition<br> 🎯 <strong>Purpose</strong> — OSINT, Link Analysis, Visualization<br> 💰 <strong>Cost</strong> — Free<br> 💻 <strong>Platform</strong> — Windows, Mac, Linux<br> 🕵️ <strong>Use Case</strong> — Reconnaissance, Social Engineering, Investigations<br> 🧪 <strong>Example Usage</strong> — Domain to IP, Email search, WHOIS lookup<br> 📊 <strong>Output</strong> — Interactive graphs</p><h4>🎓 Bonus Tips:</h4><ul><li>Maltego එකට <strong>Twitter, LinkedIn</strong> වගේ social media integration කරලා පුළුල් recon කරන්න පුළුවන් (paid versions mostly)</li><li>Community edition එකේ <strong>max 12 transforms per run</strong> limit තියෙනවා</li><li>Always use Maltego in <strong>legal and ethical context</strong> only</li></ul><h3>🕵️‍♂️ What is Recon-ng?</h3><p><strong>Recon-ng</strong> කියන්නේ <strong>full-featured reconnaissance framework එකක්</strong> command-line (CLI) based.<br> Python වල ලියපු open-source tool එකක්, ethical hackers සහ penetration testers ලා passive recon (hidden data collection) කරන්න use කරනවා.</p><p>Recon-ng හරහා අපිට පුළුවන් <strong>web-based info sources, APIs</strong> භාවිතා කරලා target එකට අදාල information (domains, emails, IPs, social media, metadata) එකතු කරගන්න.<br> මේක modular system එකක්, කියන්නේ recon modules එකතු කරලා customize කරන්න පුළුවන්.</p><h4>🔧 How to Use Recon-ng?</h4><p><strong>Step 1: Install &amp; Start</strong></p><pre>git clone https://github.com/lanmaster53/recon-ng.git<br>cd recon-ng<br>./recon-ng</pre><p><strong>Step 2: Create Workspace (Project)</strong></p><pre>workspaces create myproject<br>workspaces select myproject</pre><p><strong>Step 3: Add Target Domain</strong></p><pre>add domains example.com</pre><p><strong>Step 4: Load Modules &amp; Run</strong></p><pre>modules search<br>modules load recon/domains-hosts/google_site_web<br>run</pre><p><strong>Step 5: View Results</strong></p><pre>show hosts</pre><h4>🧪 Example: Google Site Web Module</h4><pre>modules load recon/domains-hosts/google_site_web<br>set SOURCE example.com<br>run<br>show hosts</pre><p>➡️ Google search results වලින් example.com domain related hosts collect කරගන්නවා.</p><h4>✅ Pros (Advantages)</h4><p>🧰 <strong>Modular Design — </strong>Easy to add/remove recon modules<br>📡 <strong>Many Data Sources — </strong>Google, Bing, LinkedIn, Shodan, etc. APIs support<br>🛡️ <strong>Passive Recon — </strong>Doesn’t directly probe target systems<br>📊 <strong>Workspace Management — </strong>Projects and data organized neatly<br>🛠️ <strong>Scriptable — </strong>CLI commands allow automation</p><h4>❌ Cons (Disadvantages)</h4><p>💻 <strong>Requires Setup &amp; Dependencies — </strong>Python environment and modules setup needed<br>🕒 <strong>Learning Curve — </strong>CLI commands and modules need time to learn<br>🔐 <strong>API Limits — </strong>Some modules need API keys, limited free usage<br>🌐 <strong>Internet Required — </strong>Passive recon modules mostly online-based<br>⚠️ <strong>Not Fully Automated — </strong>User needs to manually select and run modules</p><h4>🧠 Extra Tip:</h4><ul><li>Recon-ng supports <strong>API keys</strong> for Google, Shodan, VirusTotal, etc., so get API keys for more power!</li><li>Use help command inside for usage instructions.</li><li>Combine with other tools like Maltego or theHarvester for deeper recon.</li></ul><h4>📚 <strong>Summary Table:</strong></h4><p>📦 <strong>Type</strong> — Passive Reconnaissance Framework<br> 💻 <strong>Platform</strong> — CLI (Linux, Mac, Windows with Python)<br> 🎯 <strong>Use Case</strong> — Collect domain info, hosts, emails, social media data<br> 🧪 <strong>Examples</strong> — Google Site Search, Bing, Shodan modules<br> 📁 <strong>Output</strong> — Organized workspace data, CSV export<br> 👨‍💻 <strong>Best For</strong> — Ethical hackers, pentesters, OSINT researchers</p><h3>📋 What is Job Posting Analysis?</h3><p><strong>Job Posting Analysis</strong> කියන්නේ companies හෝ organizations advertise කරන <strong>job vacancies වල details (position, skills, location, salary)</strong> study කරලා,</p><ul><li>Market trends හඳුනාගන්න,</li><li>Target company ගැන info එක එකතු කරගන්න,</li><li>අලුත් tech stack, skill requirements, job roles වැනි දේවල් විශ්ලේෂණය කරන්න.</li></ul><p>Job postings වලින් අපට පුළුවන් company එකේ current technology usage, recruitment focus, future plans ගැන හොඳ idea එකක් ගන්න පුළුවන්.<br> උදාහරණයක් වශයෙන්, Facebook එකේ හෝ LinkedIn එකේ posted job ads විමර්ශනය කිරීමෙන් companies විමසිලිමත් වීමේ තොරතුරු ලබාගන්න පුළුවන්.</p><h4>🔧 <strong>How to Use Job Posting Analysis?</strong></h4><p>📌 <strong>Example:</strong> Analyze LinkedIn Job Posts for <strong>“Software Engineer”</strong> at <strong>“ABC Pvt Ltd”</strong></p><p><strong>🔎 Step 1: Search LinkedIn or Company Career Page</strong></p><p>Use a targeted search query on Google or directly on LinkedIn:</p><pre>&quot;Software Engineer&quot; site:linkedin.com/jobs &quot;ABC Pvt Ltd&quot;</pre><p><strong>📊 Step 2: Collect Data On:</strong></p><ul><li>🧠 <strong>Required Skills</strong> (e.g., Python, AWS, Docker)</li><li>🎓 <strong>Experience Level</strong> (e.g., Junior, Mid, Senior)</li><li>📍 <strong>Location</strong> (Remote, On-site, Hybrid)</li><li>📝 <strong>Job Description Details</strong> (responsibilities, tools, methodologies)</li></ul><p><strong>📈 Step 3: Analyze for Patterns:</strong></p><ul><li>🔥 Which <strong>tech skills</strong> are most in-demand?</li><li>🌍 Is <strong>remote work</strong> allowed or location-specific?</li><li>💰 Are there clues about <strong>salary range</strong>, perks, or benefits?</li></ul><h3>📱 What is Social Media Analysis?</h3><p><strong>Social Media Analysis</strong> කියන්නේ Facebook, Twitter, Instagram, LinkedIn වැනි platforms වල user-generated content, posts, comments, hashtags, followers, and interactions analyze කරලා</p><ul><li>Target company or person ගැන public sentiment, connections, recent activities, influence levels හඳුනාගන්න.</li><li>Recon (reconnaissance) phase එකේ social footprint එක collect කරන්න.</li></ul><p>Social media posts, photos, videos, comments, location tags වලින් අති විස්තර හොයාගන්න පුළුවන්. මේක social engineering or footprinting එකේ වැදගත් කොටසක්.</p><h4>🔧 <strong>How to Use Social Media Analysis?</strong></h4><p>📌 <strong>Example:</strong> Analyze Twitter for company <strong>“XYZ Ltd”</strong></p><p><strong>🔎 Step 1: Use Twitter Search or Advanced Search</strong></p><p>Search for posts using filters like:</p><pre>from:xyzltd #launch</pre><p>You can also use keywords, hashtags, or filter by date/location.</p><p><strong>👀 Step 2: Check for:</strong></p><ul><li>📝 <strong>Content Type</strong> — What kind of content do they post? (e.g., promotional, tech updates, hiring)</li><li>👥 <strong>Audience</strong> — Who are their followers or who engages most?</li><li>🚀 <strong>Updates</strong> — Any recent announcements, product launches, or event promotions?</li></ul><p><strong>🛠️ Step 3: Use Monitoring Tools</strong></p><p>Automate or streamline your tracking with tools like:</p><ul><li>🐦 <strong>TweetDeck</strong> — Real-time Twitter monitoring</li><li>📊 <strong>Hootsuite</strong> — Scheduled posts, engagement insights</li><li>🌐 <strong>Social Mention</strong> — Sentiment analysis and keyword trends</li></ul><p><strong>This kind of analysis is useful for:</strong></p><ul><li>🎯 Competitor research</li><li>👨‍💻 OSINT investigations</li><li>📈 Marketing &amp; brand tracking</li></ul><h4>✅ Pros (Advantages)</h4><p>🔎 <strong>Publicly Available Data — </strong>No hacking needed, info openly available.<br>📈 <strong>Trend &amp; Sentiment Analysis — </strong>Helps understand company’s market position.<br>🕵️‍♂️ <strong>Valuable Recon Data — </strong>Useful for OSINT, social engineering, marketing.<br>📊 <strong>Free or Low Cost Tools — </strong>Many social media analysis tools are free or freemium.<br>🌐 <strong>Wide Reach — </strong>Access to global data and multiple platforms.</p><h4>❌ Cons (Disadvantages)</h4><p>🔐 <strong>Privacy Concerns — </strong>Some info may be sensitive or restricted.<br>🕰️ <strong>Data Overload — </strong>Huge volumes of data can be overwhelming.<br>⚠️ <strong>Misinformation Risk — </strong>Fake news or biased posts can mislead analysis.<br>⏳ <strong>Constant Updates — </strong>Social media changes rapidly; data becomes outdated quickly.<br>📉 <strong>Platform Restrictions — </strong>APIs or scraping limits affect data collection.</p><h3>🔍 Nmap කියන්නේ මොකක්ද?</h3><p>🧠 <strong>Nmap</strong> කියන්නේ <strong>Network Mapper</strong> කියන වචනේ සංක්ෂිප්ත නාමය. මේක open-source tool එකක්. මේකෙන් network එකක තියෙන devices, services, සහ ඒවායේ open ports identify කරන්න පුළුවන්.</p><h4>🚪 Port කියන්නේ මොකක්ද?</h4><p>Computer එකක හෝ Server එකක තියෙන <strong>ports</strong> කියන්නේ communication channels. උදාහරණයක්:</p><ul><li>Port 80 — Web server (HTTP)</li><li>Port 443 — Secure Web server (HTTPS)</li><li>Port 22 — SSH</li></ul><h4>🔎 Why is Nmap Important?</h4><p>🔍 Port Scanning — Service එකකට යන්න පුළුවන් entry points හඳුනාගන්න.<br>📡 Live Host Detection — Network එකේ active device එකක් ද කියලා බලන්න.<br>🔐 Vulnerability Hunting — Weak services/old versions detect කරලා security flaws identify කරන්න.<br>🧰 Reconnaissance — Ethical hacking steps වල Reconnaissance &amp; Scanning phases වලදී හොඳම tool එකක්.</p><h4>🧰 Nmap Scan Types (Common)</h4><p>SYN Scan — nmap -sS &lt;target&gt;Fast scan එකක් (stealthy)<br>Version Detection — nmap -sV &lt;target&gt;Service versions (Apache 2.4.41 වගේ)<br>OS Detection — nmap -O &lt;target&gt;Operating system guess කරන්න<br>Script Scan — nmap -sC &lt;target&gt;Built-in scripts use මගින් vulnerability info<br>Full Port Scan — nmap -p- &lt;target&gt;Port 1-65535 වලට scan කරන්න</p><h4>🛠️ How to Use Nmap (with Examples)</h4><pre>nmap -sS -sV -O 10.10.10.1</pre><p><strong>මෙහිදී:</strong></p><ul><li>-sS: SYN Scan</li><li>-sV: Service Version Detection</li><li>-O: Operating System Detection<br> 🔍 <em>අපිට මේකෙන් ඒ IP එකේ service, OS, open ports හඳුනාගන්න පුළුවන්.</em></li></ul><h4>💡 Real-World Use Cases</h4><ol><li><strong>Penetration Testing</strong>: Pre-engagement stage එකේ recon &amp; vuln. hunting.</li><li><strong>Network Inventory</strong>: Organization එකක connected hosts list එකක් හදාගන්න.</li><li><strong>Firewall Testing</strong>: IPTables/Windows Firewall rules bypass වෙනවද කියලා check කරන්න.</li><li><strong>Home Lab Troubleshooting</strong>: Services run වෙන ports check කරන්න (SSH, HTTP, etc).</li></ol><h4>🧰 Nmap Install කරන්නේ කොහොමද?</h4><p><strong>✅ Kali Linux / Ubuntu:</strong></p><pre>sudo apt install nmap</pre><p><strong>✅ macOS:</strong></p><pre>brew install nmap</pre><p><strong>✅ Windows:</strong></p><ul><li>Download from: <a href="https://nmap.org/download.html">https://nmap.org/download.html</a></li></ul><h4>🛠️ Basic Nmap Scan එකක්</h4><pre>nmap 192.168.1.1</pre><blockquote><em>මේකෙන් ඔබ කියන IP එකේ open තියෙන ports check කරනවා. (default TCP scan)</em></blockquote><h4>🧪 Example 1: Identify open ports (Basic)</h4><pre>nmap 3.89.20.134</pre><p>➡️ මෙය basic scan එකක්. Open ports සහ service names identify කරයි.</p><h4>🧪 Example 2: Scan with service detection</h4><pre>nmap -sV 3.89.20.134</pre><ul><li>-sV කියන්නේ service version detect කරන්න.</li></ul><p>➡️ මෙය port එකේ service එකේ <strong>type සහ version</strong> identify කරනවා (e.g., Apache 2.4.29).</p><h4>🧪 Example 3: Aggressive scan (More info)</h4><pre>nmap -A 3.89.20.134</pre><ul><li>-A → OS detection, version detection, script scanning, traceroute.</li></ul><p>➡️ මේකෙන් OS එක detect වෙයි, service version, traceroute, DNS info වගේ විස්තර හොඳටම ලැබෙනවා.</p><h4>🧪 Example 4: Scan multiple IPs</h4><pre>nmap 192.168.1.1 192.168.1.2 192.168.1.3</pre><h4>OR</h4><pre>nmap 192.168.1.1-50</pre><p>➡️ Multiple devices එකවර scan කරන්න පුළුවන්.</p><h4>🧪 Example 5: Scan a Subnet</h4><pre>nmap 192.168.1.0/24</pre><p>➡️ මේකෙන් <strong>entire subnet එක scan වෙයි</strong>. 192.168.1.1 to 192.168.1.254.</p><h4>🧪 Example 6: Detect open UDP ports</h4><pre>nmap -sU 3.89.20.134</pre><p>➡️ UDP ports scan කරන්න. (Slow but useful)</p><h4>🧪 Example 7: Stealth Scan (SYN Scan)</h4><pre>nmap -sS 3.89.20.134</pre><p>➡️ Fast &amp; silent. වැඩි chances නැහැ firewall එක catch කරන.</p><h4>⚠️ Ethical Note:</h4><p>🚫 Unauthorized systems scan කරන්න එපා. ඔබට අවසර ඇති systems (like your own machine or test server) scan කරන්න පමණක් use කරන්න.</p><h4>🧰 Nmap Command Cheat Sheet (සිංහල + English Mix Guide)</h4><p>🔍 <strong>Basic to Advanced Nmap Commands with Explanations:</strong></p><p>📦 nmap IP<br> ➡️ Simple/basic scan එකක්. Open ports check කරනවා (default TCP scan).</p><p>🔍 nmap -sV IP<br> ➡️ Service version detect කරනවා. e.g., Apache/2.4.41, SSH-2.0-OpenSSH_7.9 වගේ.</p><p>⚙️ nmap -A IP<br> ➡️ Aggressive scan. OS, services, versions, traceroute, script results — හැම දෙයක්ම එකවර.</p><p>🌊 nmap -sU IP<br> ➡️ UDP port scan. DNS, SNMP වගේ UDP-based services detect කරන්න හොඳයි.</p><p>🕵️‍♂️ nmap -sS IP<br> ➡️ Stealth (SYN) scan. Half-open scan method එකක්, IDS/Firewall වලට detect වෙන්න possibility අඩුයි.</p><p>📶 nmap 192.168.1.1-20<br> ➡️ IP range එකක් scan කරනවා. එකවර multiple hosts scan කරන්න.</p><p>🌐 nmap 192.168.1.0/24<br> ➡️ Whole subnet එකක් scan කරනවා. (Class C network)</p><p><strong>🛡️ Advanced &amp; Useful Options</strong></p><p>🧪 nmap -O IP<br> ➡️ Operating System (OS) detect කරන්න. Target machine එකේ OS guess කරනවා.</p><p>🔐 nmap --script vuln IP<br> ➡️ Vulnerability scan. Known vulnerabilities detect කරන්න (e.g., Heartbleed, SMB vulns).</p><p>📁 nmap -Pn IP<br> ➡️ Ping scan එක skip කරනවා. Target host එක &quot;offline&quot; වගේ fake results avoid කරන්න.</p><p>📂 nmap -p 80,443,22 IP<br> ➡️ Specific ports වලට පමණක් scan කරනවා.</p><p>🔎 nmap -T4 IP<br> ➡️ Scan speed control. T0 slowest, T5 fastest (but more noisy). T4 balance එකක්.</p><p>🧱 nmap --top-ports 10 IP<br> ➡️ Most common 10 ports check කරනවා. Faster scan.</p><p>🔁 nmap -iL list.txt<br> ➡️ IP list එකක් file එකක තියලා scan කරන්න. (Multiple targets in one go)</p><p>🧾 nmap -oN output.txt IP<br> ➡️ Scan results save වෙනවා file එකකට (Normal format).</p><p>📊 nmap -oX output.xml<br> ➡️ XML format output එකක් (automation/scripts වලට</p><h3>🎯 Final Thoughts — Stay Curious, Stay Ethical</h3><p>Reconnaissance is the <strong>first and most crucial step</strong> in ethical hacking. Whether you’re using tools like WHOIS, theHarvester, Shodan, or Maltego, always remember:</p><p>🛡️ <strong>Knowledge = Power</strong>, but<br> ⚖️ <strong>How you use that power = Responsibility</strong></p><p>👉 මෙහි සඳහන් හැම tool එකක්ම දැනගන්න විදිහක් වුණාමත්, භාවිතා කරන්නෙ lawfully, responsibly, සහ ethical purpose එකකට විතරයි. Unauthorized use එකක් වුනොත් ඒක <strong>illegal hacking</strong> එකක් විය හැක.</p><h3>🔐 Use These Tools For:</h3><ul><li>🧪 Ethical Hacking labs</li><li>🎯 Bug bounty programs</li><li>🏫 Cybersecurity education</li><li>🛡️ Internal company testing (with permission)</li></ul><h3>🚀 Keep Learning — ඔබේ cyber journey එකේ start එක මෙතනින්!</h3><p>If you learned something valuable:</p><ul><li>📌 Try out a tool on a test domain</li><li>📚 Share this post with a fellow learner</li><li>💬 Drop a comment if you want tutorials on hands-on labs or real CTF walkthroughs in Sinhala-English!</li></ul><p><strong>🙏 Thank you for reading. Let’s build a safer cyber world — one recon step at a time. 🔍🌐</strong></p><p>✍️ Written by: <strong>Ruwan Sanjeewa(DevZenMaster)</strong><br> 🎓 Cybersecurity Enthusiast | OSINT Learner | Medium Writer 🇱🇰</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d8376907eb3b" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[ Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala  + English)]]></title>
            <link>https://devzenmaster.medium.com/beginners-guide-to-ethical-hacking-footprinting-in-sinhala-english-86dc58009527?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/86dc58009527</guid>
            <category><![CDATA[footprinting]]></category>
            <category><![CDATA[tech-education]]></category>
            <category><![CDATA[cybersecurity-basics]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Fri, 01 Aug 2025 18:34:35 GMT</pubDate>
            <atom:updated>2025-08-01T19:15:17.042Z</atom:updated>
            <content:encoded><![CDATA[<p>🧑‍💻✨ A beginner-friendly guide to understanding <strong>hacking steps</strong>, 🛠️ tools, and 🛡️ cybersecurity basics in 🇱🇰 Sinhala-English 🌐.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*keT3Sw1_dzDyAQTJLJCi2g.png" /></figure><h3>📌 What is Hacking? | Hacking කියන්නේ මොකක්ද?</h3><p><strong>Hacking කියන්නේ</strong> unauthorized way එකකින් system එකකට, network එකකට හෝ application එකකට ඇතුල් වීම.</p><p>✅ <strong>White Hat —</strong>security issues හඳුනාගෙන fix කරනවා, <strong>permission</strong> එක්ක systems check කරනවා.<br>🚫<strong>Black Hat Hackers</strong> — අනිත් අයගේ system වලට අනවසරයෙන් යන malicious hackers<br>⚖️<strong>Grey Hat —</strong>Ethical + unethical දෙක mix කරන්නෙ, but වෙනසක් කරන්න හදනවා<br>📣<strong>Hacktivist — </strong>Political / social reason එකක් වෙනුවෙන් hack කරනවා<br>🤖<strong>Script Kiddie —</strong>හැමදාම tools භාවිතා කරන හැමදෙයක්ම තේරෙන්නේ නැති hackers (beginner level)</p><h3>🔐 Introduction to Ethical Hacking</h3><p><strong>Ethical Hacking</strong> කියන්නේ authorized, legal hacking එකක්, computer systems, networks, apps වල vulnerabilities (දෝෂ, දුර්වලතා) හොයාගෙන, එම systems හොඳට secure කරන්න help කරන process එක.</p><p><strong>Ethical Hacking කියන්නේ</strong> ලෝකෙට හොඳ වැඩක් කරන හැකර්ලාගේ ක්‍රියාවලියක්. මෙය <strong>“White Hat Hacking”</strong> කියලාත් කියනවා.</p><p>Ethical Hacking කියන්නේ හොඳ දෙයක්. හැබැයි හැමදාමත් <strong>ethics</strong> සහ <strong>law</strong> තුළින් කටයුතු කරන්න ඕන. හොඳ hacker කෙනෙක් වීම කියන්​නේ knowledge තියෙන එක​ම නෙවෙයි — <strong>කොහොමද ඒ knowledge එක ethical ලෙස භාවිතා කරන්​නේ කියන එකයි real value එක..</strong></p><p>👉 Ethical Hackers use their skills <strong>to protect systems, networks, and data</strong> — not to harm them.</p><h3>🎯 Why Ethical Hacking is Important? | Ethical Hacking වැදගත් කම</h3><ul><li>🛡️ <strong>Cybersecurity strengthen කරන්න.</strong></li><li>🔍 <strong>Vulnerabilities හඳුනාගන්න.</strong></li><li>🧑‍💻 <strong>Hackers attack කලොත් response plan එක set කරන්න.</strong></li><li>🏢 Companies වලට <strong>data breaches වලින් බේරෙන්න උදව් කරනවා.</strong></li></ul><h3>🧠 Skills Needed for Ethical Hacking | අවශ්‍ය හැකියාවන්</h3><ul><li>Networking (IP, DNS, Subnetting වගේ දේ)</li><li>Operating Systems (Linux, Windows)</li><li>Programming (Python, JavaScript etc.)</li><li>Cyber Laws සහ Penetration Testing tools (Nmap, Metasploit, Burp Suite)</li></ul><h3>🧭 Ethical Hacker කෙනෙ​ක් වෙන්න ඔයාට…</h3><ol><li><strong>Legal සහ Ethical Boundaries</strong> follow කරන්න ඕන.</li><li>Company එකේ <strong>Permission</strong> ලබාගෙන test කරන්න ඕන.</li><li>ලැබුණු <strong>vulnerabilities responsibly report කරන්න</strong> ඕන.</li></ol><h3>🧑‍💻 Ethical Hacking Process (Steps)</h3><h4>1️⃣ Reconnaissance (Footprinting)</h4><p>🔍 Target system එක ගැන තොරතුරු එකතු කරනවා.<br> 🛠️ Tools: 🌐 Google, 🧾 Whois, 🔎 Shodan, 🕸️ Maltego</p><h4>2️⃣ Scanning</h4><p>📡 Open ports, vulnerabilities හොයනවා.<br> 🛠️ Tools: 🧪 nmap, 🕵️ nikto, 🔐 nessus</p><h4>3️⃣ Gaining Access</h4><p>🚪 Exploit එකක් භාවිතා කරලා system එකට ඇතුළුවෙන්න හදනවා.<br> 🛠️ Tools: 💣 Metasploit, 💉 SQLMap, 🧪 Burp Suite</p><h4>4️⃣ Maintaining Access</h4><p>🔐 Access එක ආපහු නැතිවෙන්න backdoor එකක් හදනවා.<br> 🛠️ Tools: 🧬 Netcat, 🛡️ NGROK, 🧾 Cron Jobs</p><h4>5️⃣ Clearing Tracks</h4><p>🧹 Log files clear කරලා තමන්ගේ අවශ්‍යතාවය ඉටු කරගන්න​වා. 🙈<br> 🛠️ Tools: 🧼 Clear logs manually, 🔒 Timestomp, 🕵️‍♂️ Anti-forensics tools</p><h3>1️⃣ 🕵️‍♂️What is Footprinting and Reconnaissance?</h3><h3>🕵️‍♂️ What is Reconnaissance?</h3><p><strong>Reconnaissance</strong> කියන්නේ hacker කෙනෙක් හෝ penetration tester කෙනෙක් attack එකක් කරන්න කලින් <strong>target එක ගැන gather කරන information</strong>.</p><h4><strong>Reconnaissance කියන්නේ විමසුමක්</strong> — system එකක්, web application එකක්, network එකක් <strong>පළමුවෙන්ම observe කරලා study කිරීමක්</strong>.</h4><blockquote><strong>⚔️ Military</strong> වල <strong>Reconnaissance</strong> කියන එක කියන්නේ:</blockquote><blockquote><em>“Before attacking, first </em><strong><em>scout the enemy territory</em></strong><em>, observe their base, weapons, and paths.”</em></blockquote><blockquote>ඒ වගේම…</blockquote><blockquote>💻 <strong>Cybersecurity</strong> වල <strong>Reconnaissance</strong> කියන එක කියන්නේ:</blockquote><blockquote><em>“Before attacking or testing a system, first </em><strong><em>gather information</em></strong><em> — about domains, emails, IPs, services, software, etc.”</em></blockquote><h3>🕵️‍♂️ What is Footprinting?</h3><p>👉 මෙය reconnaissance process එකේ sub-part එකක්.</p><p><strong>Footprinting</strong> කියන්නේ hacker කෙනෙක් හෝ ethical hacker කෙනෙක් <strong>සංවිධානයක්, system එකක්, website එකක්, network එකක් පිළිබඳව හැකි ඉක්මනින් විස්තර (blueprint) එකක් හදාගන්නවා</strong> කියන එකයි.</p><blockquote><em>🔒 Ethical hacker කෙනෙකුට නම් මේක හරි ethically කරන්න ඕනේ — with permission only!</em></blockquote><h3>🧠 What is Footprinting and Reconnaissance?</h3><p>Reconnaissance/Footprinting කියන්නේ hacking process එකේ පළමු අදියර. මෙය පහසුවෙන් කියන්න ගියොත්:</p><blockquote><em>🔍 </em><strong><em>Reconnaissance</em></strong><em> = Target එක පිළිබඳව </em><strong><em>information gather කිරීම.</em></strong><em><br> 📜 </em><strong><em>Footprinting</em></strong><em> = ඒ info එක use කරලා </em><strong><em>target system එකේ structure එක, blueprint එක</em></strong><em> හදාගන්න එක.</em>Footprinting කියන්නේ Reconnaissance එකේ sub-part එකක්, <strong>deep structured data gathering</strong>.</blockquote><p>මේ දෙකම basically එකම goal එකක් තියෙනවා — <strong>attack එකකට පෙර info එකකට analyze කිරීම</strong>.</p><h3>🔄 Types of Reconnaissance</h3><p>Reconnaissance/footprinting කියන එක අංශ 2ක් ලෙස වෙන් කරන්න පුලුවන්:</p><h3>1️⃣ Passive Reconnaissance 🟢</h3><p><strong>Without contacting the target system</strong><br> 🛡️ Target system එකට කිසිම alert එකක් trigger වෙන්නේ නැහැ<br> <strong>❌🧑‍💻</strong> No direct contact with the target system<br> 🌐📂 Use public resources</p><h4>🕶️🧠 <strong>Passive Recon කරන්න හොඳයි — Silent but Powerful!</strong></h4><blockquote><strong>👣 Low footprint</strong> — Target system එකට interaction නැති නිසා detect වෙන්න chance අඩුයි.</blockquote><blockquote><strong>No alerts triggered</strong> — IDS, firewall, SIEM systems activate වෙන්නෙ නැහැ.</blockquote><blockquote><strong>Valuable public intel</strong> — Whois, DNS, subdomains, social media, leaked data වගේ OSINT sources වලින් data grab කරන්න පුළුවන්.</blockquote><blockquote><strong>Ideal for pre-engagement phase</strong> — Target එක ගැන silent mapping එකක් කරන්න perfect.</blockquote><p>📌 <strong>Tools/Methods:</strong></p><ul><li>WHOIS lookup</li><li>DNS info (nslookup, dig)</li><li>Google Dorking</li><li>Social media, LinkedIn search</li><li>theHarvester tool</li></ul><p>🟢 <strong>Advantages</strong>: Target doesn’t know you’re gathering info<br> 🔴 <strong>Disadvantages</strong>: Info may be outdated or limited</p><p>📌 <strong>Passive Recon කියන්නෙ hackerලාගේ “first move” 🧩 — quietly observe, gather intel, and plan without making a sound.</strong><br> 🔥 Stealthy, Smart, and Strategic!</p><h3>2️⃣ Active Reconnaissance 🔴</h3><p><strong>Direct interaction with the target system</strong><br> ⚠️ Detect වෙන්න chance තියෙනවා<br>🕵️‍♂️Directly interact with target system</p><h4>🛠️🎯 <strong>Active Recon කරන්න හොද​යි — Direct, Detailed &amp; Powerful!</strong></h4><blockquote><strong>🔍 Real-time data</strong> — Live systems, open ports, services, version info discover කරන්න පුළුවන්.<br> <strong>🚀 Faster results</strong> — Data grab කිරීම passive method වලට වඩා ඉක්මන්.<br> <strong>🧪 Vulnerability spotting</strong> — Specific service versions check කරලා known vulnerabilities 🎯 හඳුනාගන්න.<br> <strong>🧭 Precise targeting</strong> — Attack surface එක clearly identify කර exploitation plan එකක් හදාගන්න easy.<br> <strong>📡 Internal assessments</strong> — Company-approved scans වලදි complete network mapping &amp; enumeration කරන්න perfect.</blockquote><h4>⚠️ Active Recon එකේ Risk:</h4><blockquote>👀 <strong>Target Detect කරගන්න පුළුවන් (Firewall, IDS)</strong><br> ➡️ Scanning tools නිසා firewall / intrusion detection systems (IDS) වලට ලේසියෙන් ditect වෙන්න ​හැකියා​ව තියෙනවා.</blockquote><blockquote>📄 <strong>Logs Generate වෙනවා</strong><br> ➡️ Activity logs එකේ tool usage, IP addresses්ව​ගේ.</blockquote><blockquote>🚨 <strong>Alert Systems Active වෙනවා</strong><br> ➡️ Scanning හේතුවෙන් SIEM systems සහ SOC teams alert වෙන්න පුළුවන්.</blockquote><h4>📌 <strong>Tools/Methods:</strong></h4><ul><li>Nmap (port scanning)</li><li>Ping</li><li>Traceroute</li><li>Banner grabbing</li><li>WhatWeb / Wappalyzer</li></ul><p>🟢 <strong>Advantages</strong>: Detailed real-time info<br> 🔴 <strong>Disadvantages</strong>: Target may detect your activity</p><p>📌 <strong>Active Recon කියන්නෙ ethical hackersලාගේ “power move” 💥 — You touch the system, and it talks back!</strong><br> ⚠️ But careful — it’s loud and detectable! 👀</p><h3>🧭🔍 <strong>Recon Process එක — Example එකක් සමඟ</strong></h3><h4>Step 1: Passive Recon</h4><p>🔹 <strong>Goal</strong>: Target එක ගැන publicly available info එකක් එකතු කිරීම — no direct contact.<br> 🔹 <strong>Tools</strong>: Google Dorks, Whois, Shodan, LinkedIn, crt.sh 🌐<br> 🔹 <strong>Example</strong>:<br> ➡️ Target domain එක example.com කියලා ගනිමු.<br> 🔍 Google search – site:example.com<br> 🧑‍💻 LinkedIn වලින් employee names &amp; job titles collect කරනවා<br> 📁 crt.sh හරහා subdomains like dev.example.com, mail.example.com හඳුනාගන්න.</p><pre># Domain Owner හොයාගන්න<br>whois example.com</pre><pre># Emails, subdomains එකතු කරන්න<br>theharvester -d example.com -b google</pre><pre># Google Dorking<br>site:example.com confidential filetype:pdf</pre><h4><strong>Step 2: Active Recon (Permission තියෙන විට!)</strong></h4><p>🔹 <strong>Goal</strong>: Live systems, open ports, services, version info confirm කිරීම.<br> 🔹 <strong>Tools</strong>: Nmap, Netcat, Nikto, Masscan 🧪<br> 🔹 <strong>Example</strong>:<br> ➡️ nmap -sS -sV dev.example.com<br> 🔍 Result: Port 22 (SSH), 80 (HTTP), 443 (HTTPS) open.<br> 🌐 HTTP banner shows: Apache 2.4.49 → vulnerable version.<br> 🛠️ Web server fingerprinting with Nikto reveals possible misconfigurations.</p><pre># Port scan සහ service versions හොයාගන්න<br>nmap -sV example.com</pre><pre># Network path එක බලන්න<br>traceroute example.com</pre><pre># Web vulnerabilities check කරන්න<br>nikto -h <a href="http://example.com">http://example.com</a></pre><h3>🧪 Real Life Ethical Hacking Scenario:</h3><p>Imagine Ruwan is hired to pentest xyzbank.com</p><p><strong>Step 1 — Passive Recon</strong></p><ul><li>WHOIS xyzbank.com</li><li>Google Dork: site:xyzbank.com filetype:pdf</li><li>LinkedIn වලින් employees list එක බලනවා</li><li>theHarvester වලින් emails හොයනවා</li></ul><p><strong>Step 2 — Active Recon</strong></p><ul><li>nmap -sV xyzbank.com → Open ports &amp; services</li><li>traceroute xyzbank.com → Network path check</li></ul><p>👉 මේ හැම එකම <strong>Footprinting and Reconnaissance</strong> process එකේ steps.</p><h3>🧠🔍 Active Recon &amp; Passive Recon — Use Cases</h3><h3>🔍 Active Recon — Use Cases</h3><p>🛠️ <strong>1. Vulnerability Assessment &amp; Penetration Testing</strong><br> ➡️ Pen tester එකෙක් හෝ red team එකක් real-time data එකකට access වෙලා open ports, running services, version info, etc. එකක් check කරනවා.</p><p>🧪 <strong>2. Exploitation Preparation</strong><br> ➡️ Active scan එකෙන් result අරගෙන ඒකට 맞ම exploits හදනවා (e.g., Nmap → SMB version → EternalBlue exploit).</p><p>🖥️ <strong>3. Internal Network Scanning (Authorized)</strong><br> ➡️ Company network එකේ device/services inventory එකක් ලබාගැනීම.</p><p>📡 <strong>4. Confirming Attack Surface</strong><br> ➡️ Passive recon එකෙන් හඳුනාගත් targets, actively confirm කිරීම (e.g., Port 80 open ද? Service run වෙනවද?).</p><h3>🕵️‍♂️ Passive Recon — Use Cases</h3><p>🌐 <strong>1. OSINT (Open Source Intelligence)</strong><br> ➡️ Whois, DNS records, social media, website content, Shodan, Google Dorks වලින් info එකක් ගන්න.</p><p>🔍 <strong>2. Pre-engagement Scoping</strong><br> ➡️ Target system එකේ minimal/no interaction එකක් වුණාම, silent data gathering එකක්.</p><p>🛡️ <strong>3. Avoiding Detection</strong><br> ➡️ IDS/IPS වලට trigger නොවෙන්න stealthy way එකෙන් info එකක් grab කිරීම.</p><p>🧑‍💻 <strong>4. Social Engineering Preparation</strong><br> ➡️ Employee names, roles, emails collect කරලා phishing attacks, vishing, or impersonation plan කරන එක.</p><p>📁 <strong>5. Historical Footprint Analysis</strong><br> ➡️ Subdomain archives, leaked data, past breaches check කිරීම.</p><h3>🧰 Tools Used in Footprinting &amp; Reconnaissance</h3><p>Tool &amp; Use Case</p><p>🔎 <strong>WHOIS</strong> — Domain owner &amp; registrar info<br>🌐 <strong>nslookup / dig — </strong>DNS records (A, MX, TXT, NS)<br>📧 <strong>theHarvester — </strong>Email addresses &amp; hosts from search engines<br>🧠<strong> Google Dorking — </strong>Public files, passwords, login pages<br>🛰️<strong> Shodan — </strong>Internet-connected devices<br>🧭<strong> Traceroute — </strong>Network path analysis<br>🌐<strong> Netcraft — </strong>Web technology fingerprinting<br>🧱<strong> Maltego — </strong>Entity relationships (people, domains)</p><h3>🎯 Why is This Important?</h3><p>Role &amp; Purpose<br>🧑‍💻 <strong>Ethical Hacker — </strong>Attack vectors identify කරලා pentest plan එක හදාගන්න<br>🛡️ <strong>Blue team — </strong>Defend වෙන්න කලින් attacker thinking එක හඳුනාගන්න<br>❌<strong> Attacker — </strong>System එකේ weak points exploit කරන්න</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ekXcDMmQ2ehk_tYNP6fosQ.png" /></figure><h3>🔚 That’s a wrap on the basics of Ethical Hacking &amp; Footprinting!</h3><p>💡 <strong>If you found this article helpful, please:</strong></p><ul><li>💬 Leave a comment below with your thoughts or questions</li><li>⭐ Follow me for more cybersecurity and ethical hacking guides in Sinhala-English</li><li>📢 Share this article with friends or colleagues who want to learn ethical hacking</li><li>🚀 Start practicing responsibly and keep learning — Ethical Hacking is a powerful skill!</li></ul><p>🙏 <strong>Thank you for reading — stay curious and hack ethically!<br> — <em>Ruwan Sanjeewa (DevZenMaster)</em></strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=86dc58009527" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[ What is Google Dorking / Google Hacking?(Google Dorking කියන්නේ මොකද්ද?)]]></title>
            <link>https://devzenmaster.medium.com/what-is-google-dorking-google-dorking-%E0%B6%9A%E0%B7%92%E0%B6%BA%E0%B6%B1%E0%B7%8A%E0%B6%B1%E0%B7%9A-%E0%B6%B8%E0%B7%9C%E0%B6%9A%E0%B6%AF%E0%B7%8A%E0%B6%AF-94ee2ea14178?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/94ee2ea14178</guid>
            <category><![CDATA[google-dork]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Fri, 01 Aug 2025 08:47:59 GMT</pubDate>
            <atom:updated>2025-08-01T10:26:30.848Z</atom:updated>
            <content:encoded><![CDATA[<blockquote><strong><em>“Not all hacking needs a terminal. Sometimes, Google is enough!”</em></strong><em> 😎</em></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RQoSUyCeqYw3VQ66NVoGdg.png" /></figure><h3>🧠 What is Google Dorking / Google Hacking?</h3><p>ඔබට විශ්වය පුරා අන්තර්ජාලයේ ඇති data වලින් අගනා තොරතුරු (sensitive data) හොයන්න පුළුවන් කියලා හිතන්න. ඒක කිරීමට terminal tool එකක්වත්, hacking tool එකක්වත් අවශ්‍ය නැහැ. <strong>Google Search</strong> එක විතරයි ඔයාට අවශ්‍ය!</p><p><strong>Google Dorking</strong> (a.k.a Google Hacking) කියන්නේ Google search engine එක භාවිතා කරලා publicly available but hidden data discover කරන්න තියෙන method එකක්. මෙය penetration testers, bug bounty hunters, ethical hackers, සහ cyber attackersලා විසින් භාවිතා කරන technique එකක්.සරලවම google Dorking කියන්නේ Google එකෙන් advanced search queries දාලා normally visible නැති sensitive data (admin login pages, passwords, email lists, config files etc.) search කරලා හොයාගන්න එක.</p><h3>🛠️ How Does Google Dorking Work?</h3><p>Google search එකේ <strong>advanced operators</strong> භාවිතා කරලා, අපිට ඒ අවශ්‍ය info හොයාගන්න පුළුවන්.</p><p>Google index කරන website content වලින් filter කරන search queries (a.k.a <strong>Dorks</strong>) Google search bar එකේ type කරලා info search කරන්නයි Google Dorking කියන්නේ.</p><p><strong>Basic Structure</strong>:</p><pre>operator:keyword</pre><p>For example:</p><pre>intitle:&quot;index of&quot; &quot;admin&quot;<br>filetype:xls inurl:&quot;password&quot;</pre><p>මේවලින් Google engine එක instruct කරනවා specific location එකකට/ file type එකකට/ keyword එකකට match වෙනම data search කරන්න.</p><h3>📌 Why is Google Dorking Important?</h3><ul><li><strong>For Ethical Hackers</strong> — Vulnerability testing, bug hunting</li><li><strong>For Cybersecurity Awareness</strong> — Know what’s exposed</li><li><strong>For Sysadmins &amp; Developers</strong> — Understand misconfigurations</li><li><strong>For Learners</strong> — Sharpen info gathering skills</li></ul><h3>🎯 Different Google Dorking Techniques</h3><p>මෙහිදී භාවිතා කරන <strong>Google Search Operators</strong>:</p><blockquote>intitle:Page title එක තුළ keyword එක තියෙනවාද කියලා බලනවා<br>inurl:URL එක තුළ keyword එකක් තියෙනවාද කියලා බලනවා<br>filetype:Specific file type search කරනවා (e.g., pdf, xls, docx)<br>site:Specific site එකක් තුළ පමණක් search කරනවා<br>ext:Alternative to filetype<br>intext:Page content වල keyword එක තියෙනවාද කියලා බලනවා<br>allintitle:Title එකේ multiple words check කරනවා<br>allinurl:URL එකේ multiple words check කරනවා</blockquote><h3>⚠️ Why is it Dangerous? (මේක ගොඩක් අවදානම්ද?)</h3><p>ඔව්, මේක ethical hacker කෙනෙක් දැනගන්​න වටින tool එකක්. හැබැයි malicious hacker කෙනෙක් මේක භාවිතා කරන්නේ:</p><ul><li>Unprotected login panels හොයාගන්න</li><li>Database backup files (.sql, .db) download කරන්න</li><li>Usernames &amp; Passwords leaked වෙන files සෙවීමට</li><li>CCTV live feeds හොයාගන්න (Yes, seriously 😳)</li></ul><p>🔐 ඔයාගේ website එක secure වෙලාද කියලා test කරන්න ethical hackers Google Dorking භාවිතා කරනවා.</p><h3>✅ Ethical Use (නීතිමය භාවිතය)</h3><p>ඔබ <strong>penetration tester</strong> කෙනෙක් වුවහොත් හෝ <strong>cybersecurity enthusiast</strong> කෙනෙක් වුවහොත්, ඔබට Google Dorking ethical ක්‍රමයට භාවිතා කරන්න පුළුවන්:</p><ul><li>Own or authorized systems සඳහා පමණක් භාවිතා කරන්න.</li><li>Reconnaissance phase එකේ info gathering කිරීමේදී භාවිතා කරන්න.</li><li>අයෙත් කියන්නම්: Don’t use this for unauthorized hacking. ❌</li></ul><h3>🔒 How to Protect Your Site from Dorking?</h3><ol><li>✅ <strong>robots.txt</strong> properly configure කරන්න</li><li>🔐 Sensitive directories වලට authentication යොදන්න</li><li>🚫 Directory listing disable කරන්න</li><li>🧽 Sensitive files (e.g., backup.sql) web root එකෙන් ඉවත් කරන්න</li><li>🔎 Google Search Console භාවිතා කරලා indexed content regularly audit කරන්න</li><li>🔐 <strong>Admin panels</strong> සඳහා 2FA (Two-Factor Authentication) සහ IP restriction භාවිත කරන්න</li><li>📵 <strong>X-Robots-Tag:</strong> noindex headers add කරලා Google index එකෙන් sensitive pages වලට block දාන්න</li><li>🕵️‍♂️ <strong>Regularly audit</strong> කරන්න public files &amp; URL structures to detect accidentally exposed info</li></ol><h3>🧪 Final Thoughts</h3><p>Google Dorking කියන්නේ අපි හරි හැටි දන්නවානම් <strong>අතිශයින්ම ශක්තිමත් recon tool එකක්</strong>. Ethical hacking වල reconnaissance stage එකේ Google Dorks වලින් passive footprinting කරන්න පුළුවන්.</p><p>හැබැයි unauthorized systems එකකට apply කිරීමේදී, මේක law violate කරන හැටිටත් යන්න පුළුවන්. 🛑</p><p>✍️ <strong>Author:</strong> Ruwan Sanjeewa<br> 🔗 DevZenMaster — Empowering your Cybersecurity Journey!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=94ee2ea14178" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Version Control කියන්නේ මොකක්ද? ✅]]></title>
            <link>https://devzenmaster.medium.com/version-control-%E0%B6%9A%E0%B7%92%E0%B6%BA%E0%B6%B1%E0%B7%8A%E0%B6%B1%E0%B7%9A-%E0%B6%B8%E0%B7%9C%E0%B6%9A%E0%B6%9A%E0%B7%8A%E0%B6%AF-eb9986f722a9?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/eb9986f722a9</guid>
            <category><![CDATA[git-basics]]></category>
            <category><![CDATA[git]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[version-control-system]]></category>
            <category><![CDATA[git-version-control]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Sun, 05 Jan 2025 16:48:11 GMT</pubDate>
            <atom:updated>2025-01-05T16:48:11.917Z</atom:updated>
            <content:encoded><![CDATA[<p>Version Control System (VCS) කියන්නේ Files Collection එකක changes track කරන්න පුලුවන් program එකක් හෝ program සමූහයකි. මෙහි main purpose එකක් වන්නේ files collection එකක changes track කිරීම. මෙහි අනෙකුත් main purpose එක වන්නේ එකම project එකක් multiple team membersලා එකවර එකට work කරන එක enable කිරීමයි, එහිදී අනෙකාගේ වැඩ වලට බලපෑමක් නොවීමට සහතික වේ. 🔄</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/300/1*hAG1mdH7PLR8DE5S8hR_hg.png" /></figure><p>VCS සදහා තවත් නමක් වන්නෙ Software Configuration Management (SCM) System එකයි.ඇත්ත වශයෙන්ම මෙම පද දෙක එකිනෙකට වෙනස් ලෙස භාවිතා වේ.git හි official documentation, git-scm.com හි ඇත.technically, version control කියන්නෙ SCM හි එක භාවිතයක් පමණි.📚</p><h3>VCS වලින් කරන්න පුළුවන් දේවල්: ✅</h3><ul><li>✅ Project එකේ complete history එක track කරගන්න පුළුවන්. 🕒</li><li>✅ Branches create කරන්න පුළුවන්, ඒකෙන් separate changes හෝ experimental features try කරන්න පුළුවන්. 🌿</li><li>✅ Project එකේ history එකේ previous versions files retrieve කරන්න පුළුවන්. 🔙</li><li>✅ Changes commit කරද්දි reasons explain කරන message add කරන්න පුළුවන්. 💬</li><li>✅ New releases mark කරන්න Tags attach කරන්න පුළුවන්. 📌</li></ul><h3>Git 🐙</h3><p>Git කියන්නේ fast, versatile, high scalable, free, open-source distributed version control system එකක්. එහි primary author වන්නෙ Linux නිර්මාණය කල Linus Torvalds ය. 👨‍💻</p><p>Git distributed system එකක් වේ. ඒකියන්නෙ සම්පූර්ණ history එක client සහ server යන දෙකෙහිම store කර ඇති බවයි. network connection එකක් නැතුව උනත් files edit කිරීමට, locally ඒවා check කරන්න සහ connection එකක් තියෙන විට ඒවා server එක සමග sync කිරීමට හැකිය. Git distributed system එකක් නිසා project history එක server එකේ තියෙනවාට අමතරව client machine එකෙත් store වෙනවා. Networking problem එකක් වෙලා server unavailable වුනත්, local repository එකට access කරලා work කරගන්න පුළුවන්. technically server එකක් අවශ්‍ය නොවේ. changes email හෝ removable media භාවිතා කර share කරගත හැකිය නමුත් කවුරුත් practically මේ විදිහට git භාවිතා නොකරයි. 🚀</p><h3>Git Terminology 📖</h3><p>Git ගැන තේරුම්ගැනීමට, git terminology තේරුම්ගැනීමට සිදුවේ. පහත දැක්වෙන්නෙ git භාවිතා කරන පුද්ගලයන් අතර frequently භාවිතා වන term කිහිපයකි. don’t be concerned about the details for now. මේවා භාවිතයත් සමග හුරුපුරුදු වේ. 🧠</p><p><strong>Working tree</strong>: 🌳<br>✅ වැඩකරමින් පවතින project එකහි අඩංගු nested directories and files.</p><p><strong>Repository</strong>: 📂<br>✅ working tree එකේ ඉහළ මට්ටමේ Folder ය. මෙහි Git project එකෙ history එක සහ metadata ගබඩා කරයි. Bare Repository කියන්නේ working tree එකට අදාළ නොවන, වෙනත් ගබඩා කිරීමක් හෝ බෙදාගැනීමක් සඳහා පාවිච්චි කරන රෙපෝ. මේවා සාමාන්‍යයෙන් .git වර්ගය ලෙස නම් කරයි (e.g., project.git).</p><p><strong>Hash</strong>: 🔑<br>✅ Fike එකක අන්තර්ගතය නියෝජනය කරන සංකේතීය අංකයක්. Git hash 160-bits දිගින් ඇති අංකයක් ලෙස භාවිතා කරයි. Hash Function මගින් සාදන මෙම අංකය, ෆයිල් එකේ වෙනස්කම් ඇතිද යන්න පරීක්ෂා කිරීමට උපකාරී වේ.</p><p><strong>Object</strong>: 🏷️<br>✅ Git repo එකක objects වර්ග 4ක් අඩංගු වේ. ඒ සෑම එකක්ම SHA-1 Hash එකකින් uniquely identify කරගෙන ඇත.</p><ul><li>Blob: ordinary file එකක් නියෝජනය කරයි.</li><li>Tree: directory එකක් represent කරයි. එහි names, hashes, සහ permission අඩංගු වේ.</li><li>Commit: working tree එකේ specific version එකක් represent කරයි.</li><li>Tag: commit එකකට නමක් දෙන්න පාවිච්චි කරයි.</li></ul><p><strong>Commit</strong>: 📝<br>✅ Verb (ක්‍රියාපදයක්) වශයෙන්, “commit” කියන්නෙ ඔබේ වෙනස්කම් Git repo එකේ සටහන් කිරීමයි. මේකේ අරමුණ තමයි වෙනත් පුද්ගලයන්ට ඔබේ වෙනස්කම් දැකගත හැකි වීම.</p><p><strong>Branch</strong>: 🌱<br>✅ branch යනු නම්කරන ලද linked commits series එකකි. branch එකක් මත කරන most recent commit එක head ලෙස හැදින්වේ. Default Branch එක main හෝ master ලෙස හැඳින්වේ. branches Git හි ඉතා වැදගත් වන්නේ ඒවා developerලාට branch තුල independently හෝ එකට වැඩ කිරීමට සහ ඔවුන්ගේ changes default branch එකට පසුව merge කිරීමට හැකි වීමයි.</p><p><strong>Remote</strong>: 🌍<br>✅ තවත් Git repo එකට කරන සම්බන්ධය. සාමාන්‍යයෙන්, origin යන නම යටතේ පළමු remote එක සාදයි.</p><p><strong>Command</strong>: 💻<br>✅ Git operations සිදු කිරීමට භාවිතා කරන command.<br>උදාහරණයක් ලෙස:</p><ul><li>git push: ඔබේ වෙනස්කම් remote repo එකට යැවීම.</li><li>git pull: remote repo එකෙන් වෙනස්කම් ගැනීම.</li></ul><p><strong>The Git Command Line</strong>: ⌨️<br>Github desktop වගේ git සදහා විවිධ GUIs තිබේ. Microsoft Visual Studio Code වැනි බොහො programing editors වලට පවා git සදහා interface එකක් ඇත. නමුත් ඒ සියල්ලටම විවිධ limitations ඇති අතර ඒවා git හි සියලුම functionality ක්‍රියාත්මක නොකරයි. එම නිසා git GUI වගේ විකල්ප තිබුණත් git command line interface(CLI) එක භාවිතා කිරීම ඉතාමත් ප්‍රයෝජනවත් වේ. CLI එකෙන් git හි සම්පූර්ණ ක්‍රියාකාරකම් පාලනයක් කල හැක. 🔧</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=eb9986f722a9" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Unlock Your Future in Tech: Top Free Microsoft Learn Courses to Level Up Your Skills in 2025…]]></title>
            <link>https://devzenmaster.medium.com/unlock-your-future-in-tech-top-free-microsoft-learn-courses-to-level-up-your-skills-in-2025-59cb91023db1?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/59cb91023db1</guid>
            <category><![CDATA[learning]]></category>
            <category><![CDATA[microsoft-learn]]></category>
            <category><![CDATA[skills-development]]></category>
            <category><![CDATA[free-course]]></category>
            <category><![CDATA[online-courses]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Wed, 01 Jan 2025 21:35:51 GMT</pubDate>
            <atom:updated>2025-01-01T21:35:51.685Z</atom:updated>
            <content:encoded><![CDATA[<h3>🚀Unlock Your Future in Tech: Top Free Microsoft Learn Courses to Level Up Your Skills in 2025 🚀💻🎓</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*51eJ7TLwzqhBKqjchGhvmA.png" /></figure><p>Are you looking to upgrade your skills in technology and stay ahead in your career in 2025? Whether you’re a <strong>beginner</strong> looking to get started or an experienced professional aiming to deepen your knowledge, <strong>Microsoft Learn</strong> offers <strong>100% free</strong> courses that cover a wide range of topics — from <strong>artificial intelligence (AI)</strong> to <strong>web development</strong> and <strong>cloud computing</strong>. 💻✨</p><p>In this post, I’ve gathered some of the top free Microsoft Learn courses that will help you hone your skills in the most sought-after tech areas. Even better, upon completion of each course, you’ll receive a <strong>digital badge</strong> that you can share on your <strong>LinkedIn profile</strong> to showcase your newly acquired skills to potential employers and colleagues! 🎯</p><h3>1️⃣ Azure Fundamentals ☁️</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/courses/az-900t00?wt.mc_id=studentamb_432525">Azure Fundamentals</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginners</strong> to cloud computing and <strong>Microsoft Azure</strong></li><li>Those interested in <strong>cloud infrastructure</strong>, networking, and services 🌐</li></ul><p><strong>Why take it?</strong><br>Microsoft <strong>Azure</strong> is one of the leading cloud platforms used by businesses worldwide 🌍. The <strong>Azure Fundamentals</strong> course will help you build a solid foundation in <strong>cloud computing concepts</strong> and understand how Azure services can help organizations manage their infrastructure. Perfect for anyone new to the cloud or looking to kickstart their career in <strong>IT</strong> or cloud services 🚀.<br><strong>Digital Badge:</strong> Complete this course and earn a <strong>digital badge</strong> that you can proudly display on your LinkedIn profile! 🎓</p><h3>2️⃣ Fundamentals of Generative AI 🤖💡</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/fundamentals-generative-ai?wt.mc_id=studentamb_432525">Fundamentals of Generative AI</a></p><p><strong>Who should take this course?</strong></p><ul><li>Anyone curious about <strong>AI</strong> and its impact on technology</li><li><strong>Beginners</strong> to <strong>intermediate learners</strong> who want to explore <strong>AI tools</strong> and concepts 🧠</li></ul><p><strong>Why take it?</strong><br>Generative AI is one of the most exciting fields in tech today, powering tools like <strong>ChatGPT</strong> and <strong>DALL·E</strong> ✨. This course will introduce you to the fundamentals of <strong>Generative AI</strong> and how it’s reshaping industries 🌍. You’ll learn how AI can create content like images, text, and music 🎨, all while grasping the basic principles behind it. Whether you’re an aspiring data scientist, AI developer, or just an enthusiast, this course is perfect for you!<br><strong>Digital Badge:</strong> Showcase your expertise in <strong>Generative AI</strong> with a <strong>digital badge</strong> to add to your <strong>LinkedIn</strong> profile! 📌</p><h3>3️⃣ Fundamental AI Concepts 🤖🧠</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/get-started-ai-fundamentals?wt.mc_id=studentamb_432525">Fundamental AI Concepts</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginner</strong> learners who want to understand the basics of <strong>AI</strong></li><li>Those interested in learning how AI can solve <strong>real-world problems</strong> 🌍</li></ul><p><strong>Why take it?</strong><br>If you’re just starting out with AI and want to understand the foundational concepts, this course is a great starting point 🎓. It introduces topics like <strong>machine learning</strong>, <strong>neural networks</strong>, and <strong>data science</strong>, laying the groundwork for more advanced studies in AI. Whether you’re pursuing a career in AI or just want to understand the buzz around it, this course provides a clear and easy-to-follow introduction 🚀.<br><strong>Digital Badge:</strong> After completing this course, earn a <strong>digital badge</strong> that demonstrates your <strong>AI</strong> skills and share it on <strong>LinkedIn</strong> to get noticed by potential employers! 💼</p><h3>4️⃣ Introduction to GitHub 🖥️🛠️</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/intro-to-git?wt.mc_id=studentamb_432525">Introduction to GitHub</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginner</strong> developers learning <strong>version control</strong></li><li>Anyone looking to work collaboratively on code with <strong>GitHub</strong> 🤝</li></ul><p><strong>Why take it?</strong><br><strong>GitHub</strong> is the world’s most popular platform for <strong>version control</strong> and collaboration in software development 💻. If you’re a <strong>new developer</strong> or someone who needs a refresher on <strong>Git</strong>, this course will introduce you to the basics of GitHub and Git workflows 🧑‍💻. You’ll learn to manage your code, collaborate on open-source projects, and track changes efficiently. It’s a must-have skill for any developer! 🚀<br><strong>Digital Badge:</strong> Complete this course and get a <strong>digital badge</strong> to show off your <strong>GitHub</strong> expertise on <strong>LinkedIn</strong>. 🌟</p><h3>5️⃣ C# Course — Write Your First C# Program 📝👨‍💻</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/csharp-write-first?wt.mc_id=studentamb_432525">C# Course</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginner</strong> to <strong>intermediate</strong> learners interested in programming</li><li>Aspiring <strong>game developers</strong> or <strong>software engineers</strong> 🕹️</li></ul><p><strong>Why take it?</strong><br><strong>C#</strong> is a powerful programming language used for building desktop apps, games, and web applications 🖥️. If you’re looking to start coding or want to add a versatile language to your skill set, this course will guide you through writing your first <strong>C# program</strong> 💡. The interactive nature of this course makes it perfect for beginners, while also being a valuable resource for those who want to dive deeper into the language.<br><strong>Digital Badge:</strong> Upon completion, earn a <strong>digital badge</strong> to display your <strong>C#</strong> skills and impress others on <strong>LinkedIn</strong>! 🎯</p><h3>6️⃣ Power BI Course — Get Started with Power BI 📊💼</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/get-started-with-power-bi?wt.mc_id=studentamb_432525">Power BI Course</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginners</strong> to <strong>data analysis</strong> and <strong>visualization</strong></li><li><strong>Data enthusiasts</strong> or professionals aiming to upskill in <strong>business intelligence</strong> 📈</li></ul><p><strong>Why take it?</strong><br><strong>Power BI</strong> is one of the leading tools for <strong>data visualization</strong> and <strong>business intelligence</strong> 📊. This course is designed for beginners who want to turn data into actionable insights 💡. You’ll learn how to load data, create interactive reports, and share your findings with others, making it a must-know tool for anyone in the <strong>data</strong> field.<br><strong>Digital Badge:</strong> After completing this course, receive a <strong>digital badge</strong> to showcase your <strong>Power BI</strong> skills on your <strong>LinkedIn</strong> profile! 🚀</p><h3>7️⃣ Web Development Using Visual Studio Code 🌐💻</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/get-started-with-web-development?wt.mc_id=studentamb_432525">Web Development with Visual Studio Code</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginner</strong> to <strong>intermediate</strong> learners wanting to dive into <strong>web development</strong></li><li>Those interested in building websites or web applications 🖥️</li></ul><p><strong>Why take it?</strong><br><strong>Web development</strong> is an essential skill in today’s digital world 🌍. This course will teach you how to use <strong>Visual Studio Code</strong>, one of the most popular code editors for web development 💻. You’ll learn the basics of <strong>HTML</strong>, <strong>CSS</strong>, and <strong>JavaScript</strong>, and how to build a simple website from scratch 🌐. Whether you’re looking to build your personal website or start a career in <strong>web development</strong>, this course is an excellent place to start!<br><strong>Digital Badge:</strong> Earn a <strong>digital badge</strong> and proudly add it to your <strong>LinkedIn</strong> profile to highlight your <strong>web development</strong> expertise! 📌</p><h3>8️⃣ Microsoft 365 Fundamentals 📚💼</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/courses/ms-900t01?wt.mc_id=studentamb_432525">Microsoft 365 Fundamentals</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Beginners</strong> to <strong>Microsoft 365</strong> and cloud productivity tools</li><li>Anyone working in <strong>business</strong> or administration 🧑‍💼</li></ul><p><strong>Why take it?</strong><br><strong>Microsoft 365</strong> is a suite of essential tools used in businesses worldwide, including <strong>Word</strong>, <strong>Excel</strong>, <strong>PowerPoint</strong>, and <strong>Teams</strong> 💼. This course will introduce you to the core features of <strong>Microsoft 365</strong>, including cloud services and security 🔒, making it ideal for beginners who want to improve their productivity or start a career in business administration or <strong>IT support</strong>.<br><strong>Digital Badge:</strong> Complete the course and showcase your <strong>Microsoft 365</strong> skills with a <strong>digital badge</strong> that you can share on <strong>LinkedIn</strong>! 🌟</p><h3>9️⃣ Introduction to Gaming and Disability 🎮♿</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/modules/intro-to-gaming?wt.mc_id=studentamb_432525">Introduction to Gaming and Disability</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Gamers</strong>, <strong>designers</strong>, and those passionate about accessibility 🌍</li><li>Anyone looking to learn about the intersection of <strong>gaming</strong> and <strong>accessibility</strong> 🎮♿</li></ul><p><strong>Why take it?</strong><br>This unique course explores the world of <strong>gaming accessibility</strong>, focusing on how the gaming industry can better serve people with disabilities 🎮. You’ll learn about <strong>assistive technologies</strong> and the challenges faced by disabled gamers 🧑‍🦽. It’s an invaluable resource for anyone passionate about inclusive gaming design and accessibility advocacy.<br><strong>Digital Badge:</strong> After completing this course, share your <strong>gaming accessibility</strong> badge on <strong>LinkedIn</strong> to showcase your commitment to inclusive design! 💡</p><h3>🔟 AZ-104: Manage Identities and Governance in Azure 🛡️</h3><p><strong>Course Link</strong>: <a href="https://learn.microsoft.com/training/paths/az-104-manage-identities-governance?wt.mc_id=studentamb_432525">AZ-104: Manage Identities and Governance in Azure</a></p><p><strong>Who should take this course?</strong></p><ul><li><strong>Intermediate</strong> to <strong>advanced</strong> learners interested in <strong>Azure administration</strong></li><li>IT professionals looking to specialize in cloud <strong>governance</strong> and security 🔐</li></ul><p><strong>Why take it?</strong><br>If you’re already familiar with cloud concepts and want to dive deeper into <strong>Azure administration</strong>, this course is for you 🧑‍💼. You’ll learn how to manage identities, governance, and security policies within the <strong>Azure</strong> cloud environment. Perfect for anyone preparing for the <strong>AZ-104 certification</strong> or working as a cloud administrator ☁️.<br><strong>Digital Badge:</strong> Earn a <strong>digital badge</strong> and share it on <strong>LinkedIn</strong> to demonstrate your advanced skills in <strong>Azure administration</strong>. 🏅</p><h3>🎉 Conclusion</h3><p>The best part? All these courses are <strong>completely free</strong>, giving you access to high-quality learning materials from one of the most trusted names in the industry. Completing these courses not only enhances your <strong>skills</strong> but also allows you to showcase your achievements with <strong>digital badges</strong> 🏅. Don’t forget to share them on <strong>LinkedIn</strong> to get noticed by recruiters and expand your professional network. 🌐</p><p>What are you waiting for? Start learning today and take your career to the next level! 🚀</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=59cb91023db1" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How to Be Different and Positive: Making a Lasting Impact on Others ✨]]></title>
            <link>https://devzenmaster.medium.com/how-to-be-different-and-positive-making-a-lasting-impact-on-others-3b385eb60fcd?source=rss-e89936eeecc3------2</link>
            <guid isPermaLink="false">https://medium.com/p/3b385eb60fcd</guid>
            <category><![CDATA[be-different]]></category>
            <category><![CDATA[positive-impact]]></category>
            <category><![CDATA[positivity]]></category>
            <category><![CDATA[growth]]></category>
            <category><![CDATA[self-improvement]]></category>
            <dc:creator><![CDATA[Ruwan Sanjeewa]]></dc:creator>
            <pubDate>Wed, 01 Jan 2025 21:26:54 GMT</pubDate>
            <atom:updated>2025-01-01T21:26:54.155Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NnEBcmWV5jffuMICO2EVOA.png" /></figure><p>In a world filled with noise and conformity, standing out as a positive and unique individual can be a game-changer. Not only does it help you differentiate yourself, but it also allows you to create an environment where others feel motivated, valued, and empowered. Here’s how you can be the positive difference in someone’s life and make a lasting impact. 🌍💖</p><h3>1. Embrace Your Authenticity 🌟💎</h3><p>Being different starts with embracing who you truly are. Don’t try to fit into a mold or follow the crowd. Your uniqueness is your superpower, and it’s something that no one else can replicate. 🌱</p><ul><li><strong>Own Your Story</strong>: Share your experiences and lessons learned. Whether it’s a personal struggle or an accomplishment, people connect with authenticity. 📖</li><li><strong>Be Confident in Your Differences</strong>: Embrace what sets you apart. Whether it’s your interests, your way of thinking, or your style, don’t shy away from showing the world your true self. 💃🕺</li></ul><p>When you embrace authenticity, you invite others to do the same, creating an environment of mutual respect and positivity. 💫</p><h3>2. Lead with Kindness and Empathy 🤝💖</h3><p>One of the most effective ways to positively influence others is through kindness. When you lead with empathy, you can truly connect with people and make them feel seen and heard. 👂🧡</p><ul><li><strong>Listen with Your Full Attention</strong>: People want to feel understood. Give them the space to express themselves, and listen attentively without judgment. 👂💬</li><li><strong>Offer Encouragement</strong>: A kind word or a helping hand can go a long way. Encouragement motivates people to keep going, even when things seem tough. 🙌💪</li></ul><p>Empathy creates a ripple effect. When you show others that you care, they are more likely to pass it on, creating a positive cycle.</p><h3>3. Cultivate an Attitude of Gratitude 🙏🌱</h3><p>Gratitude is one of the most powerful ways to stay positive and inspire others. By focusing on the positives in your life and expressing gratitude, you create a contagious aura of optimism. 💫</p><ul><li><strong>Express Thanks Often</strong>: Whether it’s a simple “thank you” or a more heartfelt message, showing appreciation can brighten someone’s day. 😊💖</li><li><strong>Focus on the Good</strong>: In challenging situations, make it a habit to identify the positives. Acknowledging the silver lining helps you stay grounded and positive. 🌟🌤️</li></ul><p>When you show gratitude, you inspire others to do the same, helping them shift their focus towards the good around them. ✨🌍</p><h3>4. Be a Source of Inspiration 💡</h3><p>Your actions and mindset can inspire others to reach for greatness. When you live with purpose, people around you will take notice and feel encouraged to pursue their own goals. 🚀🔥</p><ul><li><strong>Share Your Journey</strong>: Whether it’s your career, personal development, or a hobby, let others see the growth process. Be open about the challenges you face and how you overcome them. 📈💪</li><li><strong>Set an Example</strong>: People are more likely to follow someone who practices what they preach. Demonstrate through your actions how positivity, hard work, and kindness lead to success. 💼🌟</li></ul><p>When you lead by example, you become an inspiration to others, encouraging them to strive for their best. 🌟💥</p><h3>5. Encourage and Support Others’ Growth 🌱🚀</h3><p>Being different and positive isn’t just about your own journey; it’s about helping others grow along the way. When you actively encourage others to reach their potential, you create an uplifting environment that fosters mutual growth. 🤗💪</p><ul><li><strong>Offer Constructive Feedback</strong>: Help others improve by offering guidance in a positive, respectful way. Focus on their strengths and suggest ways to enhance their skills. 📋💬</li><li><strong>Celebrate Their Wins</strong>: When someone else achieves something great, celebrate their success. Acknowledging their progress fosters a sense of camaraderie and positivity. 🎉🎊</li></ul><p>By supporting others, you create a community where everyone is empowered to grow and thrive. 🌟✨</p><h3>6. Stay Resilient in the Face of Adversity 💪🔥</h3><p>Life will always have its ups and downs, but resilience is what sets you apart as a positive influence. When you remain calm and optimistic in difficult situations, others will admire your strength and learn to approach challenges with a positive attitude. 💥</p><ul><li><strong>Practice Self-Care</strong>: Taking care of your mental, physical, and emotional health ensures that you can show up as your best self. 🧘‍♂️💆‍♀️</li><li><strong>Find Solutions, Not Problems</strong>: Instead of dwelling on obstacles, focus on finding solutions. This mindset will not only help you but will inspire others to look for opportunities in every challenge. 🔍💡</li></ul><p>Your resilience becomes a beacon of hope for others who may be struggling, showing them that they too can rise above adversity. ✨🌟</p><h3>7. Share Positivity with Others 💖🌍</h3><p>Positive energy is contagious. Whether it’s through a smile, a kind word, or a thoughtful gesture, sharing positivity can transform the mood of an entire room. 🌞😊</p><ul><li><strong>Spread Compliments</strong>: Compliment others sincerely, recognizing their strengths and qualities. This builds their confidence and helps them feel valued. 🗣️💖</li><li><strong>Be a Beacon of Light</strong>: In a world where negativity can sometimes take center stage, be the person who lifts others up. A positive attitude can turn someone’s day around. 🌟✨</li></ul><p>When you make positivity a regular part of your interactions, you create a ripple effect that touches everyone you encounter. 🌍💥</p><h3>Conclusion: Be the Change You Want to See in the World 🌍💫</h3><p>Being different and positive isn’t about perfection; it’s about consistently making choices that reflect your values and your unique perspective. When you embrace your authentic self, lead with kindness, and encourage others to grow, you create an environment of positivity that spreads to everyone you meet.</p><p>The key is to keep showing up with your best self and stay true to your values, no matter the situation. By being the positive difference you want to see in the world, you inspire others to do the same.</p><p>💥 <strong>Start with yourself. Lead with positivity. Inspire others.</strong> 💥</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3b385eb60fcd" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>