SearchSecurity.com

Nmap Technical Manual

Nmap is a well-known open source tool that has found a home in the hearts of hackers, both white and black alike. Though it was first created in the late 1990s, it leapt into the pop culture consciousness in 2003 when, in the motion picture The Matrix Reloaded, the character Trinity made use of Nmap to disable an electrical plant's security measures, taking down the local power grid.

In real life, it's most often used to locate available hosts and services on a network, determine the operating systems and versions utilized by machines on a network and pinpoint a network's open ports. While it's a valuable tool used by security pros for performing a network inventory or a vulnerability assessment, some fear that a Maxtix-like scenario is not as far fetched as it seems, as it is also a tool in some malicious hackers' arsenals, used to help find open ports running services vulnerable to attack.

In collaboration with security expert Michael Cobb, SearchSecurity.com has produced an Nmap Tutorial, offering up all the guidance information security professionals need to learn how to install, configure, run and evaluate Nmap in the enterprise, both on Windows and Linux platforms. Browse through the technical tips below and learn how this free tool can help make your organization more secure.

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement