Penetration Testing mailing list archives

Review: NMAP Network Scanning -- Fyodor Vaskovich


From: Jon Kibler <Jon.Kibler () aset com>
Date: Mon, 15 Dec 2008 11:26:20 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Everything You Wanted to Know About NMAP But Were Afraid to Ask

(Fyodor provided me a pre-release copy of the book and asked that I
write a review. The following is the review that I posted to Amazon.)

This book is clearly THE definitive guide to nmap. It has everything you
could possibly want to know about using nmap, and much more. If you use
nmap, this book is a mandatory must have, must read. Even if you are
only an occasional nmap user, this book is full of information that will
show you how to get better results using nmap than you would without it.

In this book, Fyodor does an outstanding job covering everything from
the most basic use of nmap, through advanced topics, such as evading
detection and tweaking the nmap configuration files. Explanations are
clearly written, and real world examples are provided. Not only does the
book cover the specifics of using nmap, it also presents a very clear
methodology for getting the most out of nmap. It explains not only the
results produced by nmap, but also explains why nmap produced those
results. It provides many excellent examples of how to use advanced nmap
options to help figure out seemingly conflicting or otherwise confusing
results when they occur.

The material on advanced topics is really great. The “Nmap Scripting
Engine” chapter provides fantastic detail on NSE and has everything you
need to start working with scripting. The “Detecting and Subverting
Firewalls and Intrusion Detection Systems” chapter covers a lot of
information pen testers using nmap really need to know. The chapter
“Defenses Against Nmap” details what a network administrator should be
doing to detect nmap scans. Plus, the “Nmap Reference Guide” does a
great job of summarizing all that is nmap.

This book is not the type that you can read once and absorb everything
you need to know. You need to sit down with the book and play with nmap
in your sandbox. Even if you already consider yourself an nmap expert,
to really learn the material in this book will take a lot of
experimentation. It is a book that you will be constantly referring to
as you use nmap.

Finally, the production quality of this book is first rate. For a
self-published book, the quality is simply outstanding. The editing is
actually a lot better than in many technical books produced by the big
publishing houses. The layout is simplistic and clean, and you don’t
have to use a microscope to read the text or examples. I am as impressed
by the production qualities of the book as I am its contents. This is
clearly a first rate book on all counts.

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224
http://www.linkedin.com/in/jonrkibler

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklGhSwACgkQUVxQRc85QlM3qQCgkhDSzINKYr+1khjsI+IKaqPP
i4oAn0SJA1hTcLweIc0dsdQVOVm46zEC
=ds84
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Security Trends Report from Cenzic
Stay Ahead of the Hacker Curve!
Get the latest Q2 2008 Trends Report now

www.cenzic.com/landing/trends-report
------------------------------------------------------------------------

Current thread: