- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 614字
- 2021-07-02 23:30:53
What is network sniffing?
Network sniffing is a collection of packet data that is transmitted throughout the network. Network sniffing is also known as packet analysis. There are different types of network sniffers. Two of the most common are Ethernet sniffers and wireless sniffers. A network sniffer is a piece of software or hardware that can capture and log network traffic.
Nmap is a popular network sniffing tool used by many cyber security professionals. Before using this tool, you must learn how to install it. You also need to be able to check the version and locate the user manual. It is recommended that you use Kali Linux as the operating system when using Nmap. Kali Linux comes with many pre-installed tools such as Nmap and Wireshark. If you are using a version of Linux without pre-installed tools, you must perform a fresh install. The best and most efficient way to install Nmap is to clone the repository location directly from GitHub. First, open Firefox in Kali Linux and navigate to a search engine such as Google. In the search bar, type Nmap github. The link you want will be https://github.com/nmap/nmap. You can also type the link into the URL address bar instead of using a search engine. On the GitHub page, click on the green button that says Clone or download. This button is located on the right side, towards the top of the page. The following screenshot displays where the Clone or download button is located:

When you click on the green Clone or download button, a text box will appear with a URL, namely https://github.com/nmap/nmap.git. This is the location of the repository, which also includes the branches and tags. The cloning install method automates the file compilation process, saving time, and making sure everything is in place. Open a terminal in Kali Linux and type, git clone https://github.com/nmap/nmap.git to begin the cloning process. After this command is entered, the tool will be downloaded and installed automatically.
After the install is complete, you will need to confirm that you are using the latest version of Nmap. To check which version of Nmap you have type, nmap -V. If you want to see a list of Nmap commands, type -h to bring up the help menu. According to www.namp.org, the primary documentation for using Nmap is the Nmap reference guide. It is also the basis for the Nmap manual page. The manual page can be found using the URL https://nmap.org/book/man.html. If you want to install Nmap from the source code using Linux, you will need to download it from https://nmap.org/download.html. The files will be compressed and offered in two formats. The first format will be .tar.bz2 and the second format will be .tgz. The compressed files are also known as tarballs. A tarball or TAR file is used to combine lots of files into a single archive. This is similar to the .zip files found in Windows. After the Nmap tarball is downloaded, you will need to decompress it by typing the command bzip -cd nmap-<VERSION>.tar.bz2 | tar xvf -. Next, you will need to change into the recently created directory by typing cd nmap-<VERSION>. Now you need to configure the build system by typing ./configure while still in the nmap directory. Next, you will build Nmap by typing make. If the make command doesn't work type gmake. The next step is making sure you have the correct user privileges for a system-wide install by typing su root. The final step is installing the support files for Nmap by typing make install. Both install methods can be applied to other tools that you will need to install in the future.
- Kali Linux CTF Blueprints
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 安全技術運營:方法與實踐
- 工業物聯網安全
- Python Penetration Testing Cookbook
- Kali Linux Network Scanning Cookbook(Second Edition)
- 硬黑客:智能硬件生死之戰
- API安全技術與實戰
- 數據安全領域指南
- 學電腦安全與病毒防范
- 信息安全導論(第2版)
- 電腦安全與攻防入門很輕松(實戰超值版)
- End to End GUI Development with Qt5
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理