Chapter 1. Getting to Know the Enemy: Nmap the Target Network

Before actually breaking into a network, hackers—at least the good ones—spend a bit of time (and sometimes more than just a bit) getting to know the target network, mapping it out. The more information they can gather about the network, the better they will know how to break into it—and whether or not they really want to try.

This first chapter discusses such activity. There is no actual break-in in this case study; instead it looks at the preliminary activities that a hacker engages in before staging a break-in. After evaluating a network, sometimes a hacker decides that breaking in will require too much time and effort, and therefore simply moves on to another target. That’s the desired ...

Get Defend I.T.: Security by Example now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.