Nmap: Network Exploration and Security Auditing Cookbook - Second Edition
eBook - ePub

Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

Paulino Calderon

  1. 416 pagine
  2. English
  3. ePUB (disponibile sull'app)
  4. Disponibile su iOS e Android
eBook - ePub

Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

Paulino Calderon

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

Over 100 practical recipes related to network and application security auditing using the powerful NmapAbout This Book• Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers.• Learn the latest and most useful features of Nmap and the Nmap Scripting Engine.• Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. • Learn to develop your own modules for the Nmap Scripting Engine.• Become familiar with Lua programming.• 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments descriptionWho This Book Is ForThe book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools.What You Will Learn• Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine• Master basic and advanced techniques to perform port scanning and host discovery• Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers• Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology• Learn how to safely identify and scan critical ICS/SCADA systems• Learn how to optimize the performance and behavior of your scans• Learn about advanced reporting• Learn the fundamentals of Lua programming• Become familiar with the development libraries shipped with the NSE• Write your own Nmap Scripting Engine scriptsIn DetailThis is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Zenmap. The Nmap Scripting Engine is thoroughly covered through security checks used commonly in real-life scenarios applied for different types of systems. New chapters for Microsoft Windows and ICS SCADA systems were added and every recipe was revised. This edition reflects the latest updates and hottest additions to the Nmap project to date. The book will also introduce you to Lua programming and NSE script development allowing you to extend further the power of Nmap.Style and approachThis book consists of practical recipes on network exploration and security auditing techniques, enabling you to get hands-on experience through real life scenarios.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Nmap: Network Exploration and Security Auditing Cookbook - Second Edition di Paulino Calderon in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Computer Science e Cyber Security. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Anno
2017
ISBN
9781786461537
Edizione
2

Nmap Fundamentals

In this chapter, we will cover the following recipes:
  • Building Nmap's source code
  • Finding live hosts in your network
  • Listing open ports on a target host
  • Fingerprinting OS and services running on a target host
  • Using NSE scripts against a target host
  • Reading targets from a file
  • Scanning an IP address ranges
  • Scanning random targets on the Internet
  • Collecting signatures of web servers
  • Monitoring servers remotely with Nmap and Ndiff
  • Crafting ICMP echo replies with Nping
  • Managing multiple scanning profiles with Zenmap
  • Running Lua scripts against a network connection with Ncat
  • Discovering systems with weak passwords with Ncrack
  • Launching Nmap scans remotely from a web browser using Rainmap Lite

Introduction

Network Mapper (Nmap) was originally released by Gordon Fyodor Lyon in the infamous Phrack magazine Vol 7 Issue 51 (https://nmap.org/p51-11.html). It is acclaimed today as one the best tools for network reconnaissance and security auditing in the information security industry. The first public version was introduced as an advanced port scanner along with a paper describing research on techniques for port discovery, but it has become so much more. It has evolved into an essential, fully featured tool that includes several other great subprojects, such as Ncrack, Ncat, Nping, Zenmap, and the Nmap Scripting Engine (all of them are available at https://nmap.org/). Nmap is described as follows in the official website:
"Nmap (Network Mapper) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X."
Other tools in the project were created to meet the specific needs of users. Nping (https://nmap.org/nping/) specializes in network packet crafting. Ncrack (https://nmap.org/ncrack/) focuses on network authentication cracking. Ncat (https://nmap.org/ncat/) is an enhanced version of Netcat and allows users to read, write, redirect, and modify network data. Zenmap (https://nmap.org/zenmap/) is a cross-platform GUI focused on usability. Finally, the Nmap Scripting Engine (https://nmap.org/book/nse.html) takes scanned information obtained from targets and provides an interface for users to script additional tasks.
Nmap's community is very active, so I encourage you to always keep up with the releases and latest patches. Announcements and discussions take place on the development mailing list, so if you would like to contribute to the project, I recommend you subscribe to it.
This first chapter is for newcomers. Starting with building Nmap, we will become familiar with all the tools of the Nmap project. In just a few recipes, you will learn how flexible and powerful Nmap really is, but as we move through chapters, we will go deep into the internals to learn not only how to use the tools but to extend them and create your own. The practical tasks chosen for this chapter will help you fingerprint local and remote systems, map networks, craft custom network packets, and even identify systems with weak passwords.

Building Nmap's source code

Throughout the following recipes, we will use the tools included with the Nmap project, so it is a good idea to install the latest versions now. This recipe will show how to download the latest copy of the source code from the development repositories and install Nmap and related tools in your UNIX-based system.
We always prefer working with the very latest stable version of the repository because precompiled packages take time to prepare and we may miss a patch or a new NSE script. The following recipe will show the process of configuring, building, and maintaining an up-to-date copy of the Nmap project in your arsenal.

Getting ready

Before continuing, you need to have a working Internet connection and access to a subversion client. Unix-based platforms come with a command-line client named subversion (svn). To check whether it's already installed in your system, just open a terminal and type the following command:
 $ svn 
If the command was not found, install svn using your favorite package manager or build it from source code. The instructions to build svn from source code are out of the scope of this book, but they are widely documented online. Use your favorite search engine to find specific instructions for your system.
When building Nmap, we will also need additional libraries such as the development definitions from OpenSSL or the make command. In Debian based systems, try the following command to install the missing dependencies:
 #apt-get install libssl-dev autoconf make g++ 
Note that OpenSSL is optional, and Nmap can be built without it; however, Nmap will be crippled as it uses OpenSSL for functions related to multiprecision integers, hashing and encoding/decoding for service detection, and the Nmap Scripting Engine.

How to do it...

  1. First, we need to grab a copy of the source code from the official repositories. To download the latest version of the development branch, we use the checkout (or co) command:
 $svn co --username guest https://svn.nmap.org/nmap 
  1. Now you should see the list of downloaded files and the message Checked out revision <Revision number>. A new directory containing the source code is now available in your working directory. After ...

Indice dei contenuti

  1. Title Page
  2. Copyright
  3. Credits
  4. About the Author
  5. Acknowledgments
  6. About the Reviewer
  7. www.PacktPub.com
  8. Customer Feedback
  9. Preface
  10. Nmap Fundamentals
  11. Network Exploration
  12. Reconnaissance Tasks
  13. Scanning Web Servers
  14. Scanning Databases
  15. Scanning Mail Servers
  16. Scanning Windows Systems
  17. Scanning ICS SCADA Systems
  18. Optimizing Scans
  19. Generating Scan Reports
  20. Writing Your Own NSE Scripts
  21. HTTP, HTTP Pipelining, and Web Crawling Configuration Options
  22. Brute Force Password Auditing Options
  23. NSE Debugging
  24. Additional Output Options
  25. Introduction to Lua
  26. References and Additional Reading
Stili delle citazioni per Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

APA 6 Citation

Calderon, P. (2017). Nmap: Network Exploration and Security Auditing Cookbook - Second Edition (2nd ed.). Packt Publishing. Retrieved from https://www.perlego.com/book/527158/nmap-network-exploration-and-security-auditing-cookbook-second-edition-pdf (Original work published 2017)

Chicago Citation

Calderon, Paulino. (2017) 2017. Nmap: Network Exploration and Security Auditing Cookbook - Second Edition. 2nd ed. Packt Publishing. https://www.perlego.com/book/527158/nmap-network-exploration-and-security-auditing-cookbook-second-edition-pdf.

Harvard Citation

Calderon, P. (2017) Nmap: Network Exploration and Security Auditing Cookbook - Second Edition. 2nd edn. Packt Publishing. Available at: https://www.perlego.com/book/527158/nmap-network-exploration-and-security-auditing-cookbook-second-edition-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Calderon, Paulino. Nmap: Network Exploration and Security Auditing Cookbook - Second Edition. 2nd ed. Packt Publishing, 2017. Web. 14 Oct. 2022.