Book Image

Mastering Nmap [Video]

By : Fotios Chantzis
Book Image

Mastering Nmap [Video]

By: Fotios Chantzis

Overview of this book

You will learn how to use this tool to implement a wide variety of practical tasks related to pentesting and network monitoring. The tutorial will start with installation techniques and then explain Nmap fundamentals. Moving on, we will cover the advanced functionalities of Nmap Scripting Engine (NSE) such as libraries, scripts, APIs, and so on. You will be able to perform custom tasks, the fundamentals of Lua programming, scanning mail servers, scanning databases, windows machines, SCADA systems, and large networks.
Table of Contents (7 chapters)
Chapter 7
Mapping and Owning the Network
Content Locked
Section 1
Remote Enumeration and Exploitation
We learn how use Nmap and its accompanying tools (Nping, Ncat, Ncrack) in real-world scenarios. - First, we use Nmap to map the whole network for vulnerable targets - Then, we leverage Ncrack to crack an SSH service - Finally, we run remote code on a vulnerable server by exploiting the Shellshock bug