Foreword

Nessus and Nmap are among the most useful tools that a pentester relies on. However, it is difficult to find detailed information on how to use these tools and their rich set of features. This book covers all such aspects, ranging right from installation to configuration and execution. This book will help you gain mastery over some of the lesser known but very handy features of these tools, including how to use Nmap in a network with high latency and how to perform time-throttled scanning.

The book includes several real-life scenarios encountered by the author as part of his numerous ethical hacking assignments, making the content relevant and insightful for first-time users looking to gain confidence as well as those who are perhaps ...

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.