O'Reilly logo

Defend I.T.: Security by Example by Scott Laliberte, Ajay Gupta

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Getting to Know the Enemy: Nmap the Target Network

Before actually breaking into a network, hackers—at least the good ones—spend a bit of time (and sometimes more than just a bit) getting to know the target network, mapping it out. The more information they can gather about the network, the better they will know how to break into it—and whether or not they really want to try.

This first chapter discusses such activity. There is no actual break-in in this case study; instead it looks at the preliminary activities that a hacker engages in before staging a break-in. After evaluating a network, sometimes a hacker decides that breaking in will require too much time and effort, and therefore simply moves on to another target. That’s the desired ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required