CHAPTER 5

image

Scanning the Network

Introduction

The web browser attacks of Chapter 2 require the victim to visit a web site controlled by the attacker. In more realistic scenarios, the attacker needs to know some details of the target network before being able to launch attacks that have a reasonable chance of success.

This chapter introduces NMap, the premier tool for host detection and network scanning. When launched, NMap sends packets to one or more targets and awaits the response. This allows NMap to determine if the target systems are responsive to network traffic, and on which ports. By examining the traffic characteristics in detail, NMap ...

Get Cyber Operations: Building, Defending, and Attacking Modern Computer Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.