Nmap in the enterprise your guide to network scanning

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific service...

Descripción completa

Detalles Bibliográficos
Autor principal: Orebaugh, Angela (-)
Otros Autores: Pinkard, Becky
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress Publishing c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627560706719
Tabla de Contenidos:
  • Front Cover; Nmap in the Enterprise Your Guide to Network Scanning; Copyright Page; Authors; Technical Editor; Contents; Chapter 1: Introducing Network Scanning; Introduction; What is Network Scanning?; Networking and Protocol Fundamentals; Explaining Ethernet; Understanding the Open Systems Interconnection Model; Layer 1: Physical; Layer 2: Data Link; Layer 3: Network; Layer 4: Transport; Layer 5: Session; Layer 6: Presentation; Layer 7: Application; Carrier Sense Multiple Access/Collision Detection (CSMA/CD); The Major Protocols: IP, TCP, UDP, and ICMP; IP; Internet Control Message Protocol
  • TCPThe TCP Handshake; TCP Sequence; UDP; Network Scanning Techniques; Host Discovery; Port and Service Scanning; OS Detection; Optimization; Evasion and Spoofing; Common Network Scanning Tools; Who Uses Network Scanning?; Detecting and Protecting; Network Scanning and Policy; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Introducing Nmap; Introduction; What is Nmap?; History of Nmap; Nmap Features; Nmap's User Interface; Additional Nmap Resources; Using Nmap in the Enterprise; Using Nmap for Compliance Testing; Using Nmap for Inventory and Asset Management
  • Using Nmap for Security AuditingUsing Nmap for System Administration; Securing Nmap; Executable and End-User Requirements; System Environment; Security of scan results; Optimizing Nmap; Advanced Nmap Scanning Techniques; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Getting and Installing Nmap; Introduction; Getting Nmap; Platforms and System Requirements; Installing Nmap on Windows; Installing Nmap from Windows Self-Installer; Installing Nmap from the Command-line Zip files; Installing Nmap on Linux; Installing Nmap from the RPMs; Installing Nmap RPMs Using YUM
  • Installing Nmap on Mac OS XInstalling Nmap on Mac OS X from Source; Installing Nmap on Mac OS X Using MacPorts; Installing Nmap on Mac OS X Using Fink; Installing Nmap from Source; Using the configure Script; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Using Nmap; Introduction; Starting Nmap Scanning; Target Specification; Discovering Hosts; Port Scanning; Basic Port Scanning; Advanced Port Scanning; Specifying Ports; Detecting Operating Systems; Detecting Service and Application Versions; Other Scanning Options; Nmap Scripting Engine; Performance and Optimization
  • Evasion and SpoofingOutput Logging; Miscellaneous; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: Using Zenmap; Introduction; Running Zenmap; Managing Zenmap Scans; Building Commands with the Zenmap Command Wizard; Managing Zenmap Profiles; Managing Zenmap Results; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6: Nmap OS Fingerprinting; Introduction; What is OS fingerprinting?; The Mechanics of Nmap OS Fingerprinting; Nmap OS Fingerprint Scan as an Administrative Tool; Nmap to the Rescue! Tool for Crisis?; Saving Hard Money with the Nmap OSFS
  • Security Audits and Inventory