- Network Scanning Cookbook
- Sairam Jetty
- 384字
- 2021-08-13 15:14:16
What this book covers
Chapter 1, Introduction to Network Vulnerability Scanning, introduces basic network components and their architecture. It also explains the methods and methodologies of network vulnerability scanning and the complexities involved in it, and looks at mitigation planning for identified vulnerabilities.
Chapter 2, Understanding Network Scanning Tools, consists of recipes that will give you a basic understanding of the Nessus and Nmap tools, including the technical requirements to install these tools and the details of their workings. The chapter then dives into the installation and removal instructions for Nessus and Nmap.
Chapter 3, Port Scanning, consists of recipes on techniques for performing port scanning. It begins with instructions and details regarding host discovery, moving to open ports, scripts, and version scanning. It also gives insights into evading network protection systems while performing port scans.
Chapter 4, Vulnerability Scanning, consists of recipes on managing the features of Nessus, such as policies, settings, and user accounts. You will also get get to grips with the steps for performing a network vulnerability scan using Nessus before then managing the scan results.
Chapter 5, Configuration Audit, consists of recipes for performing configuration audits and gap analyses on multiple platforms using Nessus. It takes you through a step-by-step process for creating, selecting, and configuring policies to perform configuration audits on operating systems, databases, and web applications.
Chapter 6, Report Analysis and Confirmation, will teach you how to create effective reports by analyzing the results from Nmap and Nessus scans. The recipes in this chapter will give a detailed insight into the supported report types and the level of customization these tools allow. It also gives details on some techniques for confirming vulnerabilities reported by Nessus and Nmap using various tools.
Chapter 7, Understanding the Customization and Optimization of Nessus and Nmap, teaches you about the creation of custom scripts and audit files for Nmap and Nessus. These recipes provide step-by-step procedures for replicating the method for the customization of audit files.
Chapter 8, Network Scanning for IoT, SCADA, and ICS, consists of recipes for understanding the network scanning procedure for SCADA and ICS systems. The recipes outline methods for using Nmap and Nessus to perform port scanning and network vulnerability scanning by ensuring the high availability of these critical systems.
- 通信工程辦公實(shí)務(wù)
- 數(shù)字電路知識(shí)與實(shí)踐課堂
- 室內(nèi)分布系統(tǒng)規(guī)劃設(shè)計(jì)手冊(cè)
- MPLS在SDN時(shí)代的應(yīng)用
- 信號(hào)與系統(tǒng)習(xí)題指導(dǎo)
- 對(duì)話物聯(lián)網(wǎng)
- 天線測(cè)量實(shí)用手冊(cè)(第2版)
- 5G無(wú)線網(wǎng)絡(luò)及關(guān)鍵技術(shù)
- IPv6網(wǎng)絡(luò)部署實(shí)戰(zhàn)
- 5G系統(tǒng)觀:從R15到R18的演進(jìn)之路
- 5G賦能智能制造
- 嵌入式系統(tǒng)及其在無(wú)線通信中的應(yīng)用開(kāi)發(fā)
- LTE射頻技術(shù)及設(shè)備檢測(cè)
- 電磁兼容設(shè)計(jì)與整改對(duì)策及案例分析
- 等離子彩電開(kāi)關(guān)電源速修圖解