官术网_书友最值得收藏!

Introduction

In recent years, Nmap has become the de facto tool for network exploration, leaving all other scanners far behind. Its popularity comes from having a vast number of features that are useful to penetration testers and system administrators. It supports several ping and port scanning techniques applied to host and service discovery, correspondingly.

Hosts protected by packet filtering systems, such as firewalls or intrusion prevention systems sometimes cause incorrect results because of rules that are used to block certain types of traffic. The flexibility provided by Nmap in these cases is invaluable, since we can easily try an alternate host discovery technique (or a combination of them) to overcome these limitations. Nmap also includes a few very interesting features to make our traffic less suspicious. For this reason, learning how to combine these features is essential if you want to perform really comprehensive scans.

System administrators will gain an understanding of the inner workings of different scanning techniques, and hopefully motivate them to harden their traffic filtering rules to make their hosts more secure.

This chapter introduces the supported ping scanning techniques—TCP SYN, TCP ACK, UDP, IP, ICMP, and broadcast. Other useful tricks are also described, including how to force DNS resolution, randomize a host order, append random data, and scan IPv6 addresses.

Don't forget to also visit the reference guide for host discovery, hosted at http://nmap.org/book/man-host-discovery.html.

主站蜘蛛池模板: 郧西县| 留坝县| 宿松县| 屏东县| 方山县| 景德镇市| 航空| 崇文区| 宁津县| 吉安县| 特克斯县| 兴义市| 新丰县| 锦屏县| 南木林县| 乌鲁木齐市| 临夏县| 綦江县| 西吉县| 綦江县| 宁陵县| 兴安盟| 嘉定区| 景洪市| 竹溪县| 双柏县| 津南区| 东山县| 绥江县| 社会| 兴城市| 江达县| 无极县| 定日县| 张北县| 平罗县| 旬阳县| 鲁甸县| 南靖县| 卢龙县| 泌阳县|