Chapter 7
Mapping and Owning the Network
Section 1
Remote Enumeration and Exploitation
We learn how use Nmap and its accompanying tools (Nping, Ncat, Ncrack) in real-world scenarios. - First, we use Nmap to map the whole network for vulnerable targets - Then, we leverage Ncrack to crack an SSH service - Finally, we run remote code on a vulnerable server by exploiting the Shellshock bug