Inicio > > Redes y comunicaciones informáticas > Nmap Network Exploration and Security Auditing Cookbook
Nmap Network Exploration and Security Auditing Cookbook

Nmap Network Exploration and Security Auditing Cookbook

Nmap Network Exploration and Security Auditing Cookbook

Paulino Calderon Pale

80,42 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2017
Materia
Redes y comunicaciones informáticas
ISBN:
9781786467454
80,42 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Over 100 practical recipes related to network and application security auditing using the powerful Nmap Key Features Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers.Learn the latest and most useful features of Nmap and the Nmap Scripting Engine.Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems.Learn to develop your own modules for the Nmap Scripting Engine.Become familiar with Lua programming.100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Book DescriptionThis is the second edition of ’Nmap 6: Network Exploration and Security Auditing Cookbook’. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations.The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Zenmap. The Nmap Scripting Engine is thoroughly covered through security checks used commonly in real-life scenarios applied for different types of systems. New chapters for Microsoft Windows and ICS SCADA systems were added and every recipe was revised. This edition reflects the latest updates and hottest additions to the Nmap project to date. The book will also introduce you to Lua programming and NSE script development allowing you to extend further the power of Nmap. What you will learnLearn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting EngineMaster basic and advanced techniques to perform port scanning and host discoveryDetect insecure configurations and vulnerabilities in web servers, databases, and mail serversLearn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technologyLearn how to safely identify and scan critical ICS/SCADA systemsLearn how to optimize the performance and behavior of your scansLearn about advanced reportingLearn the fundamentals of Lua programmingBecome familiar with the development libraries shipped with the NSEWrite your own Nmap Scripting Engine scripts

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...

Otros libros del autor