Nmap in the Enterprise: Your Guide to Network Scanning

·
· Elsevier
4.2
5 مراجعات
كتاب إلكتروني
264
صفحة
مؤهل

معلومات عن هذا الكتاب الإلكتروني

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.
  • Understand Network Scanning: Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies.
  • Get Inside Nmap: Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques.
  • Install, Configure, and Optimize Nmap: Deploy Nmap on Windows, Linux, Mac OS X, and install from source.
  • Take Control of Nmap with the Zenmap GUI: Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results.
  • Run Nmap in the Enterprise: Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions
  • Raise those Fingerprints: Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan.
  • “Tool around with Nmap: Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser.
  • Analyze Real-World Nmap Scans: Follow along with the authors to analyze real-world Nmap scans.
  • Master Advanced Nmap Scanning Techniques: Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.

التقييمات والتعليقات

4.2
5 مراجعات

نبذة عن المؤلف

Angela Orebaugh (, GCIA, GCFW, GCIH, GSEC, CCNA) is a Senior Scientist in the Advanced Technology Research Center of Sytex, Inc. where she works with a specialized team to advance the state of the art in information systems security. She has over 10 years experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. She has a Masters in Computer Science, and is currently pursuing her Ph.D. with a concentration in Information Security at George Mason University.

تقييم هذا الكتاب الإلكتروني

أخبرنا ما هو رأيك.

معلومات القراءة

الهواتف الذكية والأجهزة اللوحية
ينبغي تثبيت تطبيق كتب Google Play لنظام التشغيل Android وiPad/iPhone. يعمل هذا التطبيق على إجراء مزامنة تلقائية مع حسابك ويتيح لك القراءة أثناء الاتصال بالإنترنت أو بلا اتصال بالإنترنت أينما كنت.
أجهزة الكمبيوتر المحمول وأجهزة الكمبيوتر
يمكنك الاستماع إلى الكتب المسموعة التي تم شراؤها على Google Play باستخدام متصفح الويب على جهاز الكمبيوتر.
أجهزة القراءة الإلكترونية والأجهزة الأخرى
للقراءة على أجهزة الحبر الإلكتروني، مثل أجهزة القارئ الإلكتروني Kobo، عليك تنزيل ملف ونقله إلى جهازك. يُرجى اتّباع التعليمات المفصّلة في مركز المساعدة لتتمكّن من نقل الملفات إلى أجهزة القارئ الإلكتروني المتوافقة.