how do you use pic related to find out what's running on a given port? for example tcp port 1234
> # nc 192.168.0.1 1234
> Connection to 192.168.0.1 1234 port [tcp/*] succeeded!
then what...?
what i'm asking is how do you discover what's running at the application layer on some random tcp port?
no l33t hax0rz on /g/?
hax0r reporting in
solve your CTF alone dude
Nmap, rtfm
https://nmap.org/book/vscan.html
>>60256414
Use cowsay, not catsay.
>>60257526
just a little tip ;D;D;D;D;D;D;D;;D;D;D;D please xD