
Ultimate Penetration Testing with Nmap
Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap (English Edition)
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Ultimate Penetration Testing with Nmap
Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap (English Edition)
About this book
Master one of the most essential tools a professional pen tester needs to know.
Book DescriptionThis essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.
This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester's arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.
With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.
Table of Contents1. Introduction to Nmap and Security Assessments2. Setting Up a Lab Environment For Nmap3. Introduction to Attack Surface Mapping4. Identifying Vulnerabilities Through Reconnaissance and Enumeration5. Mapping a Large Environment6. Leveraging Zenmap and Legion7. Advanced Obfuscation and Firewall Evasion Techniques8. Leveraging the Nmap Scripting Engine9. Best Practices and Considerations APPENDIX A. Additional Questions APPENDIX B. Nmap Quick Reference Guide Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Technical Reviewer
- Acknowledgements
- Preface
- Get a Free eBook
- Errata
- Table of Contents
- 1. Introduction to Nmap and Security Assessments
- 2. Setting Up a Lab Environment For Nmap
- 3. Introduction to Attack Surface Mapping
- 4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
- 5. Mapping a Large Environment
- 6. Leveraging Zenmap and Legion
- 7. Advanced Obfuscation and Firewall Evasion Techniques
- 8. Leveraging the Nmap Scripting Engine
- 9. Best Practices and Considerations
- APPENDIX A. Additional Questions
- APPENDIX B. Nmap Quick Reference Guide
- Index