Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks

This book is for beginners who wish to start using Nmap, who have experience as a system administrator or of network engineering, and who wish to get started with Nmap.

Detalles Bibliográficos
Otros Autores: Shaw, David, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England ; Mumbai, India : Packt Publishing 2015.
Edición:1st edition
Colección:Community experience distilled.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629278706719
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Nmap; Nmap's humble beginnings; The many uses of Nmap; Installing Nmap; Building Nmap from source; Summary; Chapter 2: Network Fundamentals; The structure of the Internet; The OSI model; Port scanning; TCP and UDP; Service banners; Summary; Chapter 3: Nmap Basics; How to choose a target; Running a default scan; Service version scans; Logging scans; Specified scan ranges; Understanding the reason flag; Summary; Chapter 4: Advanced Nmap Scans
  • Host detection methodsRunning a ping agnostic scan; Scanning UDP services; Special TCP scans; Operating system detection; Increasing verbosity in scans; Packet tracing; Summary; Chapter 5: Performance Optimization; Nmap timing optimization; Customized host group sizes; Increasing and decreasing parallelism; Dealing with stuck hosts; Delaying and increasing probe rates; Summary; Chapter 6: Introduction to the Nmap Scripting Engine; The history of the NSE; The inner working of the NSE; Finding Nmap scripts; Running Nmap scripts; Summary; Chapter 7: Writing Nmap Scripts
  • Anatomy of an Nmap scriptDefining an Nmap script: script headers; Triggering functions: the rule; Defining a script's action; Summary; Chapter 8: Additional Nmap Tools; Attacking services with Ncrack; Host detection with Nping; File transfers and backdoors with Ncat; Comparing Nmap results with Ndiff; Summary; Chapter 9: Vulnerability Assessments and Tools; Conducting vulnerability scans with Nessus; Assessing web server issues with Nikto; Identifying sensitive web directories with DirBuster; Getting started with intercepting proxies; Summary; Chapter 10: Penetration Testing with Metasploit
  • Installing MetasploitScanning with Metasploit; Attacking services with Metasploit; What to learn next; Summary; Index