O'Reilly logo

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks by Mike O’ Leary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5

image

Scanning the Network

Introduction

The web browser attacks of Chapter 2 require the victim to visit a web site controlled by the attacker. In more realistic scenarios, the attacker needs to know some details of the target network before being able to launch attacks that have a reasonable chance of success.

This chapter introduces NMap, the premier tool for host detection and network scanning. When launched, NMap sends packets to one or more targets and awaits the response. This allows NMap to determine if the target systems are responsive to network traffic, and on which ports. By examining the traffic characteristics in detail, NMap ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required