Chapter 8

Nmap Scanning in the Real World

Introduction

Now that you have learned how Nmap works and how to use it, you are armed and ready to perform real world scans and analyze the results. In this chapter we discuss real-world network scanning scenarios that you could encounter on your systems or network. It is also possible that you may be called upon to perform some of the advanced and stealthier types of scans in your environment, whether to see how your security measures react ...

Get Nmap in the Enterprise now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.