Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in today’s technology ecosystems.
The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more.
By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information.

1141871283
Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in today’s technology ecosystems.
The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more.
By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information.

43.99 In Stock
Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

by Paulino Calderon
Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

by Paulino Calderon

eBook

$43.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in today’s technology ecosystems.
The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more.
By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information.


Product Details

ISBN-13: 9781838640781
Publisher: Packt Publishing
Publication date: 09/13/2021
Sold by: Barnes & Noble
Format: eBook
Pages: 436
File size: 5 MB

About the Author

Paulino Calderon is the co-founder of Websec, a company offering information security consulting services based in Mexico and Canada. When he is not traveling to a security conference or conducting on-site consulting for Fortune 500 companies, he spends peaceful days in Cozumel, a beautiful small island in the Caribbean, learning new technologies, developing new tools, and finding bugs in software.
Paulino's contributions are used by millions of professionals in the cybersecurity industry. In 2011, Paulino joined the Nmap team during the Google Summer of Code to work on the project as an NSE developer. He focused on improving the web scanning capabilities and vulnerability detection in Nmap in past years.

Table of Contents

  1. Nmap Fundamentals
  2. Getting familiar with Nmap's family
  3. Network Exploration
  4. Reconnaissance Tasks
  5. Scanning web servers
  6. Scanning databases
  7. Scanning Mail Servers
  8. Scanning Windows systems
  9. Scanning ICS SCADA Systems
  10. Scanning mainframes
  11. Optimizing Scans
  12. Generating Scan Reports
  13. Writing Your Own NSE Scripts
  14. Exploiting Vulnerabilities With The Nmap Scripting Engine
  15. Appendix A - HTTP, HTTP Pipelining, and Web Crawling Configuration Options
  16. Appendix B - Brute Force Password Auditing Options
  17. Appendix C - NSE Debugging
  18. Appendix D - Additional Output Options
  19. Appendix E - Introduction to Lua
  20. Appendix F - References and Additional Reading
From the B&N Reads Blog

Customer Reviews