Nmap In the Enterprise: Your Guide to Network Scanning

  • 3h 36m
  • Angela Orebaugh, Becky Pinkard
  • Elsevier Science and Technology Books, Inc.
  • 2008

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.

  • Understand Network Scanning: Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies.
  • Get Inside Nmap: Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques.
  • Install, Configure, and Optimize Nmap: Deploy Nmap on Windows, Linux, Mac OS X, and install from source.
  • Take Control of Nmap with the Zenmap GUI: Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results.
  • Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions
  • Raise those Fingerprints: Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan.
  • "Tool" around with Nmap: Learn about Nmap add-on and helper tools: NDiff—NRNmap—Remote Nmap, Bilbo, Nmap-parser.
  • Analyze Real-World Nmap Scans: Follow along with the authors to analyze real-world Nmap scans.
  • Master Advanced Nmap Scanning Techniques: Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.

About the Author

Angela Orebaugh is an information security technologist, scientist, and author with a broad spectrum of expertise in information assurance. She synergizes her 15 years of hands-on experiences within industry, academia, and government to advise clients on information assurance strategy, management, and technologies. Ms. Orebaugh is involved in several security initiatives with the National Institute of Standards and Technology (NIST) including technical Special Publications (800 series), the National Vulnerability Database (NVD), Security Content Automation Protocol (SCAP), and secure eVoting.

Ms. Orebaugh is an adjunct professor at George Mason University where she performs research and teaching in intrusion detection and forensics. Her research includes peer-reviewed publications in the areas of intrusion detection and prevention, data mining, attacker profiling, user behavior analysis, and network forensics.

Ms. Orebaugh is the author of the Syngress best seller's Wireshark and Ethereal Network Protocol Analyzer Toolkit and Ethereal Packet Sniffing. She has also co-authored the Snort Cookbook and Intrusion Prevention and Active Response. She is a frequent speaker at a variety of security conferences and technology events, including the SANS Institute and the Institute for Applied Network Security.

Ms. Orebaugh holds a Masters degree in Computer Science and a Bachelors degree in Computer Information Systems from James Madison University. She is currently completing her dissertation for her Ph.D. at George Mason University, with a concentration in Information Security.

Becky Pinkard got her start in the information technology industry in 1996, answering phones and configuring dial-up networking for GTE Internetworking. She is currently a senior security manager with a Fortune 20 company where she is lucky enough to work with security technology on a daily basis.

Becky is a SANS Certified Instructor and has taught with the SANS Institute since 2001. She has participated as a GIAC GCIA advisory board member and on the Strategic Advisory Council for the Center for Internet Security. She is a co-author of the Syngress book, Intrusion Prevention and Active Response, Deploying Network and Host IPS. Becky also enjoys speaking at technical conferences, conventions and meetings. Basically anywhere security geeks can get together and have a few laughs while learning something cool! Additionally, Becky has setup enterprise intrusion detection systems, designed patch, vulnerability and firewall strategies, performed network and web security audits, led forensics cases, and developed security awareness training in small and large environments.

In this Book

  • Introducing Network Scanning
  • Introducing Nmap
  • Getting and Installing Nmap
  • Using Nmap
  • Using Zenmap
  • Nmap OS Fingerprinting
  • Tooling Around with Nmap
  • Nmap Scanning in the Real World

YOU MIGHT ALSO LIKE

Rating 4.4 of 58 users Rating 4.4 of 58 users (58)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)