• Complain

Paulino Calderon - Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

Here you can read online Paulino Calderon - Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Packt Publishing, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Paulino Calderon Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips
  • Book:
    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2021
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiasts

Key Features
  • Learn how to use Nmap and other tools from the Nmap family with the help of practical recipes
  • Discover the latest and most powerful features of Nmap and the Nmap Scripting Engine
  • Explore common security checks for applications, Microsoft Windows environments, SCADA, and mainframes
Book Description

Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in todays technology ecosystems.

The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more.

By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information.

What you will learn
  • Scan systems and check for the most common vulnerabilities
  • Explore the most popular network protocols
  • Extend existing scripts and write your own scripts and libraries
  • Identify and scan critical ICS/SCADA systems
  • Detect misconfigurations in web servers, databases, and mail servers
  • Understand how to identify common weaknesses in Windows environments
  • Optimize the performance and improve results of scans
Who this book is for

This Nmap cookbook is for IT personnel, security engineers, system administrators, application security enthusiasts, or anyone who wants to master Nmap and its scripting engine. This book is also recommended for anyone looking to learn about network security auditing, especially if theyre interested in understanding common protocols and applications in modern systems. Advanced and seasoned Nmap users will also benefit by learning about new features, workflows, and tools. Basic knowledge of networking, Linux, and security concepts is required before taking up this book.

Table of Contents
  1. Nmap Fundamentals
  2. Getting familiar with Nmaps family
  3. Network Exploration
  4. Reconnaissance Tasks
  5. Scanning web servers
  6. Scanning databases
  7. Scanning Mail Servers
  8. Scanning Windows systems
  9. Scanning ICS SCADA Systems
  10. Scanning mainframes
  11. Optimizing Scans
  12. Generating Scan Reports
  13. Writing Your Own NSE Scripts
  14. Exploiting Vulnerabilities With The Nmap Scripting Engine
  15. Appendix A - HTTP, HTTP Pipelining, and Web Crawling Configuration Options
  16. Appendix B - Brute Force Password Auditing Options
  17. Appendix C - NSE Debugging
  18. Appendix D - Additional Output Options
  19. Appendix E - Introduction to Lua
  20. Appendix F - References and Additional Reading

Paulino Calderon: author's other books


Who wrote Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips? Find out the surname, the name of the author of the book and a list of all author's works by series.

Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Nmap Network Exploration and Security Auditing Cookbook Third Edition Network - photo 1
Nmap Network Exploration and Security Auditing Cookbook
Third Edition

Network discovery and security scanning at your fingertips

Paulino Calderon

BIRMINGHAMMUMBAI Nmap Network Exploration and Security Auditing Cookbook Third - photo 2

BIRMINGHAMMUMBAI

Nmap Network Exploration and Security Auditing Cookbook
Third Edition

Copyright 2021 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author(s), nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Wilson D'souza

Publishing Product Manager: Rahul Nair

Senior Editor: Arun Nadar

Content Development Editor: Mrudgandha Kulkarni

Technical Editor: Shruthi Shetty

Copy Editor: Safis Editing

Project Coordinator: Ajesh Devavaram

Proofreader: Safis Editing

Indexer: Rekha Nair

Production Designer: Vijay Kamble

First published: November 2012

Second edition: May 2017

Third edition: August 2021

Production reference: 1200721

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-83864-935-7

www.packt.com

Special thanks to Fyodor for mentoring me back in the first GSoC program and to all the dev team, from whom I have learned a lot and who I now have the pleasure of knowing personally. Omar and Yael, for always supporting me and not only being my hermanos but also my brothers. Martha, for helping me be the best version of myself.Nothing but love to all my friends. It is impossible to list all of you, but know that I appreciate all your love and support.

Contributors
About the author

Paulino Calderon (@calderpwn on Twitter) is a published author and international speaker with over 10 years of professional experience in network and application security. He cofounded Websec in 2011, a consulting firm securing applications, networks, and digital assets operating in North America. When he isn't traveling to security conferences or consulting for Fortune 500 companies with Websec, he spends peaceful days enjoying the beach in Cozumel, Mexico. His contributions have reached millions of users through Nmap, Metasploit, OWASP Mobile Security Testing Guide (MSTG), OWASP Juice Shop, and OWASP IoT Goat.

To my father, Dr. Paulino Calderon Medina, who taught me that our only limitations are the ones we set up in our minds, and my mother, Edith Pale Perez, who supported me unconditionally and always believed in me.

About the reviewer

Nikhil Kumar has more than 7 years of experience in cyber security with national and multinational companies. His core expertise and passions are information security, vulnerability assessment, penetration testing on network/infrastructure, and DAST/SAST/IAST on web and mobile applications.

He is an avid blogger and regular speaker on cyber-related topics at many colleges and private and government firms.

To reach his blogs or LinkedIn, visit the following sites:

https://www.linkedin.com/in/nikhil-kumar-bb7a0590

https://blogs4all2017.blogspot.com

https://iot4all2017.blogspot.com

He is a postgraduate in computer science and holds numerous cyber certifications, including Certified Ethical Hacker from the EC Council, ISO 27001 Lead Auditor from the IRCA, Certified 365 Security Administrator from Microsoft, Certified Azure Security Engineer Associate from Microsoft, Cyber Crime Intervention Officer from ISAC India, and Network Security Expert from FORTINET.

I would like to thank my family, who have always motivated me to grow in my life and career. I would like to thank my friends and employers, who have always stood by me. My friends, Aphin Alexander, Rajdeep Gogoi, Prafull Kurekar, and Kanchan Jhangiani, have always been there for me. I would also like to thank Anubhav Kumar Lal and Ravali Vangala for giving me a reason to continue learning and growing.

Table of Contents
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips»

Look at similar books to Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips»

Discussion, reviews of the book Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.