funsec mailing list archives

Everything You Wanted to Know About NMAP But Were Afraid to Ask


From: Jon Kibler <Jon.Kibler () aset com>
Date: Mon, 15 Dec 2008 11:31:10 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Review: NMAP Network Scanning -- Fyodor Vaskovich

(Fyodor provided me a pre-release copy of the book and asked that I
write a review. The following is the review that I posted to Amazon.)

This book is clearly THE definitive guide to nmap. It has everything you
could possibly want to know about using nmap, and much more. If you use
nmap, this book is a mandatory must have, must read. Even if you are
only an occasional nmap user, this book is full of information that will
show you how to get better results using nmap than you would without it.

In this book, Fyodor does an outstanding job covering everything from
the most basic use of nmap, through advanced topics, such as evading
detection and tweaking the nmap configuration files. Explanations are
clearly written, and real world examples are provided. Not only does the
book cover the specifics of using nmap, it also presents a very clear
methodology for getting the most out of nmap. It explains not only the
results produced by nmap, but also explains why nmap produced those
results. It provides many excellent examples of how to use advanced nmap
options to help figure out seemingly conflicting or otherwise confusing
results when they occur.

The material on advanced topics is really great. The “Nmap Scripting
Engine” chapter provides fantastic detail on NSE and has everything you
need to start working with scripting. The “Detecting and Subverting
Firewalls and Intrusion Detection Systems” chapter covers a lot of
information pen testers using nmap really need to know. The chapter
“Defenses Against Nmap” details what a network administrator should be
doing to detect nmap scans. Plus, the “Nmap Reference Guide” does a
great job of summarizing all that is nmap.

This book is not the type that you can read once and absorb everything
you need to know. You need to sit down with the book and play with nmap
in your sandbox. Even if you already consider yourself an nmap expert,
to really learn the material in this book will take a lot of
experimentation. It is a book that you will be constantly referring to
as you use nmap.

Finally, the production quality of this book is first rate. For a
self-published book, the quality is simply outstanding. The editing is
actually a lot better than in many technical books produced by the big
publishing houses. The layout is simplistic and clean, and you don’t
have to use a microscope to read the text or examples. I am as impressed
by the production qualities of the book as I am its contents. This is
clearly a first rate book on all counts.

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224
http://www.linkedin.com/in/jonrkibler

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklGhk4ACgkQUVxQRc85QlNX8ACfQJmCB9SMEegJiTmgL69/7XYT
wyIAn04bCtdnVAuCW31PnOObtvDg9Rww
=bTA3
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Current thread: