Book Image

Practical Network Scanning

By : Ajay Singh Chauhan
Book Image

Practical Network Scanning

By: Ajay Singh Chauhan

Overview of this book

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Network threat detection


In order to protect information, organizations need to change the way they think. Administrators need to stop thinking that the firewall, IPS, IDS, and antivirus suites will be able to protect their system from all types of cyber threats. Most traditional security detection models are old and outdated and even they cannot differentiate between malware and regular network traffic. An organization's data security programs can ideally stop a majority of known threats. However, there are many unknown, evil threats that an organization aims to detect and has not encountered before. This can be a result of brand new methods and technologies.

Detection methods

Network intrusion detection systems themselves are not perfect, and are always bombarded with both false positive and false negative notifications and warnings. Consequently, any threat detection system needs both a human element and a technical element. The human element may come in with security analysts who analyze...