Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators

The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine.

Detalles Bibliográficos
Autor principal: Calderon Pale, Paulino (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub 2012.
Edición:1st edition
Colección:Community experience distilled
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628582206719
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Nmap Fundamentals; Introduction; Downloading Nmap from the official source code repository; Compiling Nmap from source code; Listing open ports on a remote host; Fingerprinting services of a remote host; Finding live hosts in your network; Scanning using specific port ranges; Running NSE scripts; Scanning using a specified network interface; Comparing scan results with Ndiff; Managing multiple scanning profiles with Zenmap; Detecting NAT with Nping
  • Monitoring servers remotely with Nmap and NdiffChapter 2: Network Exploration; Introduction; Discovering hosts with TCP SYN ping scans; Discovering hosts with TCP ACK ping scans; Discovering hosts with UDP ping scans; Discovering hosts with ICMP ping scans; Discovering hosts with IP protocol ping scans; Discovering hosts with ARP ping scans; Discovering hosts using broadcast pings; Hiding our traffic with additional random data; Forcing DNS resolution; Excluding hosts from your scans; Scanning IPv6 addresses; Gathering network information with broadcast scripts
  • Chapter 3: Gathering Additional Host InformationIntroduction; Geolocating an IP address; Getting information from WHOIS records; Checking if a host is known for malicious activities; Collecting valid e-mail accounts; Discovering hostnames pointing to the same IP address; Brute forcing DNS records; Fingerprinting the operating system of a host; Discovering UDP services; Listing protocols supported by a remote host; Discovering stateful firewalls by using a TCP ACK scan; Matching services with known security vulnerabilities; Spoofing the origin IP of a port scan; Chapter 4: Auditing Web Servers
  • IntroductionListing supported HTTP methods; Checking if an HTTP proxy is open; Discovering interesting files and directories in various web servers; Brute forcing HTTP authentication; Abusing mod_userdir to enumerate user accounts; Testing default credentials in web applications; Brute-force password auditing WordPress installations; Brute-force password auditing Joomla! installations; Detecting web application firewalls; Detecting possible XST vulnerabilities; Detecting Cross Site Scripting vulnerabilities in web applications; Finding SQL injection vulnerabilities in web applications
  • Detecting web servers vulnerable to slowloris denial of service attacksChapter 5: Auditing Databases; Introduction; Listing MySQL databases; Listing MySQL users; Listing MySQL variables; Finding root accounts with empty passwords in MySQL servers; Brute forcing MySQL passwords; Detecting insecure configurations in MySQL servers; Brute forcing Oracle passwords; Brute forcing Oracle SID names; Retrieving MS SQL server information; Brute forcing MS SQL passwords; Dumping the password hashes of an MS SQL server; Running commands through the command shell on MS SQL servers
  • Finding sysadmin accounts with empty passwords on MS SQL servers