Orebaugh / Pinkard | Nmap in the Enterprise | E-Book | www.sack.de
E-Book

E-Book, Englisch, 264 Seiten, Format (B × H): 191 mm x 235 mm

Orebaugh / Pinkard Nmap in the Enterprise

Your Guide to Network Scanning
Erscheinungsjahr 2011
ISBN: 978-0-08-055874-5
Verlag: Morgan Kaufmann
Format: EPUB
Kopierschutz: 6 - ePub Watermark

Your Guide to Network Scanning

E-Book, Englisch, 264 Seiten, Format (B × H): 191 mm x 235 mm

ISBN: 978-0-08-055874-5
Verlag: Morgan Kaufmann
Format: EPUB
Kopierschutz: 6 - ePub Watermark



Orebaugh / Pinkard Nmap in the Enterprise jetzt bestellen!

Zielgruppe


Network administrators, security professionals, penetration testers, and digital forensic investigators

Weitere Infos & Material


Chapter 1: Introducing Network Scanning. This chapter will cover the fundamentals of network scanning and how it works and why it is used. It will also include the necessary TCP/IP and networking background for a beginning user.
Chapter 2: Introducing Nmap. This chapter will provide an overview of the nmap tool including the main features, basic functionality, history, and other resources. This chapter will also cover the uses of nmap such as security auditing, policy compliance testing, network inventory, and asset management.
Chapter 3: Using Nmap. This chapter will cover downloading and installing nmap and cover its basic usage including command line options for scanning techniques, ping options, OS fingerprinting, logging, and other options. It should also include a section on Windows only options.
Chapter 4: Fingerprinting with Nmap. This chapter will cover the fundamentals of operating system fingerprinting and version detection. It will provide details on how nmap performs fingerprinting. This chapter will also include related tools such as IP Personality and Morph that are used to defeat nmap fingerprinting.
Chapter 5: Detection and Evasion with Nmap. This chapter will provide an overview of the methods used to detect nmap scans, such as Snort signatures. It will also cover Nmap evasion techniques that are used to evade detection.
Chapter 6: Scanning in the Real World. This chapter will provide several examples of nmap scanning and the results of the scan. It will be written so the user can follow along as if he/she is performing the scan, thus mimicking a real life scenario or lab work. A good example to include would be using nmap to audit a firewall.
Chapter 7: Tooling Around with Nmap. This chapter will cover a variety of tools that either use nmap or work with nmap to perform various network and security-related functionality. Tools may include Remote nmap (Rnmap), Bilbo, NDiff, nlog, Sawmill, and Nmap-Parser.


Orebaugh, Angela
Angela Orebaugh (, GCIA, GCFW, GCIH, GSEC, CCNA) is a Senior Scientist in the Advanced Technology Research Center of Sytex, Inc. where she works with a specialized team to advance the state of the art in information systems security. She has over 10 years experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. She has a Masters in Computer Science, and is currently pursuing her Ph.D. with a concentration in Information Security at George Mason University.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.