Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

Price: $49.99 $48.69
Product prices and availability are accurate as of 2018-09-20 14:01:24 UTC and are subject to change. Any price and availability information displayed on http://www.amazon.com/ at the time of purchase will apply to the purchase of this product.
You Save: $1.30 (3%)
Availability: In Stock
Usually ships in 24 hours
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

Manufacturer Description

Over 100 practical recipes related to network and application security auditing using the powerful Nmap

About This Book

  • Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers.
  • Learn the latest and most useful features of Nmap and the Nmap Scripting Engine.
  • Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems.
  • Learn to develop your own modules for the Nmap Scripting Engine.
  • Become familiar with Lua programming.
  • 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description

Who This Book Is For

The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools.

What You Will Learn

  • Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine
  • Master basic and advanced techniques to perform port scanning and host discovery
  • Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers
  • Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology
  • Learn how to safely identify and scan critical ICS/SCADA systems<

Write a Review