官术网_书友最值得收藏!

Introduction

In recent years, Nmap has become the de facto tool for network exploration, leaving all other scanners far behind. Its popularity comes from having a vast number of features that are useful to penetration testers and system administrators. It supports several ping and port scanning techniques applied to host and service discovery, correspondingly.

Hosts protected by packet filtering systems, such as firewalls or intrusion prevention systems sometimes cause incorrect results because of rules that are used to block certain types of traffic. The flexibility provided by Nmap in these cases is invaluable, since we can easily try an alternate host discovery technique (or a combination of them) to overcome these limitations. Nmap also includes a few very interesting features to make our traffic less suspicious. For this reason, learning how to combine these features is essential if you want to perform really comprehensive scans.

System administrators will gain an understanding of the inner workings of different scanning techniques, and hopefully motivate them to harden their traffic filtering rules to make their hosts more secure.

This chapter introduces the supported ping scanning techniques—TCP SYN, TCP ACK, UDP, IP, ICMP, and broadcast. Other useful tricks are also described, including how to force DNS resolution, randomize a host order, append random data, and scan IPv6 addresses.

Don't forget to also visit the reference guide for host discovery, hosted at http://nmap.org/book/man-host-discovery.html.

主站蜘蛛池模板: 武夷山市| 凤台县| 鹿邑县| 凤山市| 怀来县| 永康市| 东台市| 东丰县| 怀宁县| 静乐县| 黄浦区| 临澧县| 蓝田县| 根河市| 南汇区| 阿拉善盟| 巴林右旗| 棋牌| 吕梁市| 大名县| 余庆县| 获嘉县| 综艺| 高安市| 西安市| 如东县| 五原县| 巴南区| 大庆市| 尼玛县| 务川| 类乌齐县| 成武县| 沙田区| 巴楚县| 伊宁市| 泽普县| 开江县| 丰都县| 合阳县| 怀宁县|