Switch to the store?

Nmap Essentials

More Information
Learn
  • Learn about the inner workings of networks and the importance of ports
  • Run a basic or default scan to detect services using Nmap
  • Run an advanced scan with Nmap to designate different types of scans
  • Deal with slow or sluggish networks to optimize timing, parallelism, and so on in order to complete scans efficiently
  • Understand the internal workings of the Nmap scripting engine to find and run specific Nmap scripts
  • Create and run a basic Nmap script in Lua by learning Lua basics, Nmap scripting, and Nmap script submission
  • Crack passwords with Ncrack, map networks with Nping, and communicate over the network with Ncat
About

Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility.

This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning.

By the end of the book, the reader will have gained essential insights into network security analysis.

Features
  • Get acquainted with the intricacies of Nmap's powerful software suite
  • Set up and configure NMAP for different network specifications effectively
  • Secure and troubleshoot large scale networks using the powerful features of NMAP with this easy-to-follow guide
Page Count 118
Course Length 3 hours 32 minutes
ISBN9781783554065
Date Of Publication 26 May 2015
Anatomy of an Nmap script
Defining an Nmap script – script headers
Triggering functions – the rule
Defining a script's action
Summary

Authors

David Shaw

David Shaw has extensive experience in many areas of information security. He began working in the trenches of perimeter analysis and conducting external threat research for large financial institutions. After switching to offensive security, he joined Redspin to conduct application security assessments and network penetration tests.

David is currently the Chief Technology Officer and Vice President of Professional Services at Redspin, specializing in external and application security, and managing a team of highly skilled engineers. He has particular interests in complex threat modeling and unconventional attack vectors, and has been a speaker at THOTCON, NolaCon, ToorCon, LayerOne, DEF CON, BSides Las Vegas, BSides Los Angeles, and BSides Seattle.