Penetration Testing mailing list archives
Review: NMAP Network Scanning -- Fyodor Vaskovich
From: Jon Kibler <Jon.Kibler () aset com>
Date: Mon, 15 Dec 2008 11:26:20 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Everything You Wanted to Know About NMAP But Were Afraid to Ask (Fyodor provided me a pre-release copy of the book and asked that I write a review. The following is the review that I posted to Amazon.) This book is clearly THE definitive guide to nmap. It has everything you could possibly want to know about using nmap, and much more. If you use nmap, this book is a mandatory must have, must read. Even if you are only an occasional nmap user, this book is full of information that will show you how to get better results using nmap than you would without it. In this book, Fyodor does an outstanding job covering everything from the most basic use of nmap, through advanced topics, such as evading detection and tweaking the nmap configuration files. Explanations are clearly written, and real world examples are provided. Not only does the book cover the specifics of using nmap, it also presents a very clear methodology for getting the most out of nmap. It explains not only the results produced by nmap, but also explains why nmap produced those results. It provides many excellent examples of how to use advanced nmap options to help figure out seemingly conflicting or otherwise confusing results when they occur. The material on advanced topics is really great. The “Nmap Scripting Engine” chapter provides fantastic detail on NSE and has everything you need to start working with scripting. The “Detecting and Subverting Firewalls and Intrusion Detection Systems” chapter covers a lot of information pen testers using nmap really need to know. The chapter “Defenses Against Nmap” details what a network administrator should be doing to detect nmap scans. Plus, the “Nmap Reference Guide” does a great job of summarizing all that is nmap. This book is not the type that you can read once and absorb everything you need to know. You need to sit down with the book and play with nmap in your sandbox. Even if you already consider yourself an nmap expert, to really learn the material in this book will take a lot of experimentation. It is a book that you will be constantly referring to as you use nmap. Finally, the production quality of this book is first rate. For a self-published book, the quality is simply outstanding. The editing is actually a lot better than in many technical books produced by the big publishing houses. The layout is simplistic and clean, and you don’t have to use a microscope to read the text or examples. I am as impressed by the production qualities of the book as I am its contents. This is clearly a first rate book on all counts. Jon Kibler - -- Jon R. Kibler Chief Technical Officer Advanced Systems Engineering Technology, Inc. Charleston, SC USA o: 843-849-8214 c: 843-224-2494 s: 843-564-4224 http://www.linkedin.com/in/jonrkibler My PGP Fingerprint is: BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAklGhSwACgkQUVxQRc85QlM3qQCgkhDSzINKYr+1khjsI+IKaqPP i4oAn0SJA1hTcLweIc0dsdQVOVm46zEC =ds84 -----END PGP SIGNATURE----- ================================================== Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.
------------------------------------------------------------------------ This list is sponsored by: Cenzic Security Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report now www.cenzic.com/landing/trends-report ------------------------------------------------------------------------
Current thread:
- Review: NMAP Network Scanning -- Fyodor Vaskovich Jon Kibler (Dec 15)