Cargando…

Nmap 6 : network exploration and security auditing Cookbook /

In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gather...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Pale, Paulino Calderon
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2012.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn825076489
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 130124s2012 enka ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d MERUC  |d N$T  |d COO  |d OCLCQ  |d IDEBK  |d DEBSZ  |d OCLCQ  |d YDXCP  |d TEFOD  |d OCLCQ  |d FEM  |d JBG  |d OCLCQ  |d ZCU  |d OCLCF  |d VTS  |d CEF  |d ICG  |d OCLCQ  |d UKMGB  |d OCLCQ  |d STF  |d AGLDB  |d DKC  |d AU@  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
016 7 |a 018014815  |2 Uk 
019 |a 821180862  |a 968008464  |a 969002666 
020 |a 9781849517492  |q (electronic bk.) 
020 |a 1849517495  |q (electronic bk.) 
029 1 |a AU@  |b 000050492143 
029 1 |a DEBBG  |b BV041120897 
029 1 |a DEBBG  |b BV043045187 
029 1 |a DEBBG  |b BV044188904 
029 1 |a DEBSZ  |b 396758088 
029 1 |a DEBSZ  |b 39744477X 
029 1 |a DEBSZ  |b 421305649 
029 1 |a UKMGB  |b 018014815 
035 |a (OCoLC)825076489  |z (OCoLC)821180862  |z (OCoLC)968008464  |z (OCoLC)969002666 
037 |a CL0500000182  |b Safari Books Online 
037 |a 02E4962E-B6DF-466E-BD2C-EC5297C0912F  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .P35 2012 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Pale, Paulino Calderon. 
245 1 0 |a Nmap 6 :  |b network exploration and security auditing Cookbook /  |c Paulino Calderón Pale. 
260 |a Birmingham :  |b Packt Pub.,  |c 2012. 
300 |a 1 online resource (1 volume) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community experience distilled 
500 |a "Quick answers to common problems"--Cover. 
500 |a "A complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators"--Cover. 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from cover (Safari, viewed Jan. 22, 2013). 
520 |a In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering. Approach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who this book is for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine. 
505 0 |a Intro -- Nmap 6: Network Exploration and Security Auditing Cookbook -- Table of Contents -- Nmap 6: Network Exploration and Security Auditing Cookbook -- Credits -- About the Author -- Acknowledgement -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Nmap Fundamentals -- Introduction -- Downloading Nmap from the official source code repository -- Getting ready -- How to do it... -- How it works... -- There's more... -- Experimenting with development branches -- Keeping your source code up-to-date -- See also -- Compiling Nmap from source code -- Getting ready -- How to do it... -- How it works... -- There's more... -- OpenSSL development libraries -- Configure directives -- Precompiled packages -- See also -- Listing open ports on a remote host -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged -- Port states -- Port scanning techniques supported by Nmap -- See also -- Fingerprinting services of a remote host -- How to do it... -- How it works... -- There's more... -- Aggressive detection -- Submitting service fingerprints -- See also -- Finding live hosts in your network -- How to do it... -- How it works... -- There's more... -- Traceroute -- NSE scripts -- See also -- Scanning using specific port ranges -- How to do it... -- How it works... -- There's more... -- See also -- Running NSE scripts -- How to do it... -- How it works... -- There's more... -- NSE script arguments -- Adding new scripts -- NSE script categories -- See also -- Scanning using a specified network interface. 
505 8 |a How to do it... -- How it works... -- There's more... -- Checking a TCP connection -- See also -- Comparing scan results with Ndiff -- Getting ready -- How to do it... -- How it works... -- There's more... -- Output format -- Verbose mode -- See also -- Managing multiple scanning profiles with Zenmap -- How to do it... -- How it works... -- There's more... -- Editing and deleting a scan profile -- See also -- Detecting NAT with Nping -- How to do it... -- How it works... -- There's more... -- Nping Echo Protocol -- See also -- Monitoring servers remotely with Nmap and Ndiff -- How to do it... -- How it works... -- There's more... -- Monitoring specific services -- See also -- 2. Network Exploration -- Introduction -- Discovering hosts with TCP SYN ping scans -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged TCP SYN ping scan -- Firewalls and traffic filters -- See also -- Discovering hosts with TCP ACK ping scans -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged TCP ACK ping scan -- Selecting ports in TCP ACK ping scans -- See also -- Discovering hosts with UDP ping scans -- How to do it... -- How it works... -- There's more... -- Selecting ports in UDP ping scans -- See also -- Discovering hosts with ICMP ping scans -- How to do it... -- How it works... -- There's more... -- ICMP types -- See also -- Discovering hosts with IP protocol ping scans -- How to do it... -- How it works... -- There's more... -- Supported IP protocols and their payloads -- See also -- Discovering hosts with ARP ping scans -- How to do it... -- How it works... -- There's more... -- MAC address spoofing -- See also -- Discovering hosts using broadcast pings -- How to do it... -- How it works... -- There's more... -- Target library -- See also -- Hiding our traffic with additional random data. 
505 8 |a How to do it... -- How it works... -- There's more... -- See also -- Forcing DNS resolution -- How to do it... -- How it works... -- There's more... -- Specifying different DNS nameservers -- See also -- Excluding hosts from your scans -- How to do it... -- How it works... -- There's more... -- Excluding a host list from your scans -- See also -- Scanning IPv6 addresses -- How to do it... -- How it works... -- There's more... -- OS detection in IPv6 scanning -- See also -- Gathering network information with broadcast scripts -- How to do it... -- How it works... -- There's more... -- Target library -- See also -- 3. Gathering Additional Host Information -- Introduction -- Geolocating an IP address -- Getting ready -- How to do it... -- How it works... -- There's more... -- Submitting a new geo-location provider -- See also -- Getting information from WHOIS records -- How to do it... -- How it works... -- There's more... -- Disabling cache and the implications of this -- See also -- Checking if a host is known for malicious activities -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Collecting valid e-mail accounts -- Getting ready -- How to do it... -- How it works... -- There's more... -- NSE script arguments -- HTTP User Agent -- See also -- Discovering hostnames pointing to the same IP address -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Brute forcing DNS records -- How to do it... -- How it works... -- There's more... -- Target library -- See also -- Fingerprinting the operating system of a host -- How to do it... -- How it works... -- There's more... -- OS detection in verbose mode -- Submitting new OS fingerprints -- See also -- Discovering UDP services -- How to do it... -- How it works... -- There's more... -- Port selection -- See also. 
505 8 |a Listing protocols supported by a remote host -- How to do it... -- How it works... -- There's more... -- Customizing the IP protocol scan -- See also -- Discovering stateful firewalls by using a TCP ACK scan -- How to do it... -- How it works... -- There's more... -- Port states -- See also -- Matching services with known security vulnerabilities -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Spoofing the origin IP of a port scan -- Getting ready -- How to do it... -- How it works... -- There's more... -- The IP ID sequence number -- See also -- 4. Auditing Web Servers -- Introduction -- Listing supported HTTP methods -- How to do it... -- How it works... -- There's more... -- Interesting HTTP methods -- HTTP User Agent -- HTTP pipelining -- See also -- Checking if an HTTP proxy is open -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- See also -- Discovering interesting files and directories on various web servers -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- HTTP pipelining -- See also -- Brute forcing HTTP authentication -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- HTTP pipelining -- Brute modes -- See also -- Abusing mod_userdir to enumerate user accounts -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- HTTP pipelining -- See also -- Testing default credentials in web applications -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- See also -- Brute-force password auditing WordPress installations -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- Brute modes -- See also -- Brute-force password auditing Joomla! installations -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- Brute modes -- See also. 
505 8 |a Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- HTTP pipelining -- See also -- Detecting possible XST vulnerabilities -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- See also -- Detecting Cross Site Scripting vulnerabilities in web applications -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- HTTP pipelining -- See also -- Finding SQL injection vulnerabilities in web applications -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- HTTP pipelining -- See also -- Detecting web servers vulnerable to slowloris denial of service attacks -- How to do it... -- How it works... -- There's more... -- HTTP User Agent -- See also -- 5. Auditing Databases -- Introduction -- Listing MySQL databases -- How to do it... -- How it works... -- There's more... -- See also -- Listing MySQL users -- How to do it... -- How it works... -- There's more... -- See also -- Listing MySQL variables -- How to do it... -- How it works... -- There's more... -- See also -- Finding root accounts with empty passwords in MySQL servers -- How to do it... -- How it works... -- There's more... -- See also -- Brute forcing MySQL passwords -- How to do it... -- How it works... -- There's more... -- Brute modes -- See also -- Detecting insecure configurations in MySQL servers -- How to do it... -- How it works... -- There's more... -- See also -- Brute forcing Oracle passwords -- How to do it... -- How it works... -- There's more... -- Brute modes -- See also -- Brute forcing Oracle SID names -- How to do it... -- How it works... -- There's more... -- See also -- Retrieving MS SQL server information -- How to do it... -- How it works... -- There's more... -- Force scanned ports only in NSE scripts for MS SQL -- See also. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Monitoring  |x Computer programs. 
650 0 |a Computer networks  |x Security measures  |x Computer programs. 
650 6 |a Réseaux d'ordinateurs  |x Surveillance  |x Logiciels. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Logiciels. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |x Computer programs  |2 fast 
776 0 8 |i Print version:  |a Pale, Paulino Calderon.  |t Nmap 6 : Network exploration and security auditing Cookbook.  |d Birmingham : Packt Publishing, ©2012  |z 9781849517485 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1085230  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849517485/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26944062 
938 |a EBSCOhost  |b EBSC  |n 507352 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24586481 
938 |a YBP Library Services  |b YANK  |n 9939515 
994 |a 92  |b IZTAP