Jump to ratings and reviews
Rate this book

Nmap 6: Network exploration and security auditing Cookbook

Rate this book
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth. Overview What will you learn Aproach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who is this book written for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine. Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering.

318 pages, Paperback

First published January 1, 2012

4 people are currently reading
30 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
10 (45%)
4 stars
9 (40%)
3 stars
1 (4%)
2 stars
2 (9%)
1 star
0 (0%)
Displaying 1 - 8 of 8 reviews
Profile Image for Eepica.
3 reviews1 follower
February 25, 2013
Initiate this note thanking Paulino Calderon Packt and blog "Neobits", for giving me the digital version of the book Nmap 6: Network Exploration and Security Auditing Cookbook.

Then try to summarize my views on the book, chapter by chapter as will be much easier.

Chapter 1: Many Kindle users are used to having the first chapter for free, so you can review this chapter without any commitment. Now, in this chapter you will find a complete introduction to using Nmap: installation, tools and basic use of Nmap. Be knowledgeable about the subject or not, I recommend you do not stop reading this.
Chapter 2: In this chapter you will discover that Nmap is not just a network mapping tool, also discover why it is a favorite of sysadmins and hackers.
Chapter 3: In this chapter you will learn about some additional tools Nmap, such as geolocation and analysis of malicious activity (malware) from an IP, you can also list active email accounts in mail servers, you can learn to identify vulnerabilities in services identified. In general you can learn about many options available in nmap, I recommend you take note.
Chapters 4, 5 and 6: These were my favorite chapters! The main topics are Web servers, databases and mail servers. In these chapters you will learn how to identify and exploit vulnerabilities in the services listed above. You learn how to use Nmap Script Engine (NSE). If you want to have fun, use a test environment to replicate the examples. You will not regret!
Chapter 7: In this chapter I discovered DNmap! <3
Chapter 8: Not everything can be fun. For people who work in ethical hacking and vulnerability analysis, report generation and display of evidence is very important. In this chapter you will find everything related to reporting.
Chapter 9: If you had fun with Chapters 4, 5 and 6, with this chapter you can not sleep. Here you will learn how to modify, adapt and create. Nse as needed. I recommend you take the time to read this, also to practice a lot.

Finally I can summarize my reading as enriching and very entertaining. I recommend this book to people who are learning, experienced people and experts. Yes! For all!

By.
Eepica.

PD1: My rating for this book is 5 stars.
PD2: I apologize for my English is not the best.
8 reviews3 followers
February 27, 2014


Another Cookbook I am very grateful to be reviewing provided by PactPublishing, The Nmap 6 Cookbook is 9 chapters long of recipes that will teach you how to use Nmap.

So what is Nmap? Well after reading this book I can tell you exactly what Nmap is and what it is used for. Nmap is known as Network Mapper. It is a free and open source utility for network discovery and security auditing. It is also useful for tasks like Network Inventory, managing service upgrade schedules and monitoring host or service up-time. So in a nutshell it is a program that has many uses for both Computer Forensics and Network Administrators.

This cookbook will teach you from the very basics to more advanced techniques. But be warned, this book is not for a complete noob to the subject. immediately it goes into advanced things that you may never have heard of such as the downloading procedure. I recommend getting a Linux distro for this or go straight for Backtrack or Kali as it already has Nmap setup from the get go.

This book covers topics such as Gelocating IP Addresses, getting information from WHOIS Records, Checking to see if a host is known for malicious activities and collecting valid email accounts. This is only half way in through the first chapter. There are still 8 more to explore.

It is a very interesting read and covers some very interesting things like Bruteforcing DNS records, it certainly is more advanced then some other things you might have done in the past. However since this is a cookbook there is no reason why you cannot learn it.

The recipes are well written, step by step guides to Nmap and whichever subject you happen to be studying. Also because it is so well laid out you can easily skip to a chapter and read it for example if you just want to know how to brute force a DNS record I can go to Chapter 1 page 91 and there we go, I can read it and follow along with it.

In conclusion, I recommend this book for anyone who wants to learn Nmap through experimentation. It’s a good read and it is well laid out. Give it a try!
Profile Image for Hecky.
1 review
February 1, 2013
It's an amazing Book. If you want to learn from basics to advanced topics of nmap, this is the book you need.

It has a lot of examples and you'll learn nice tricks...Also you will learn how NSE works, and you'll able to make your own scripts.

You must have this book in your security collection library.

It's avaliable in many versions and its cheap :)

http://www.packtpub.com/network-mappe...
1 review
February 15, 2013
This book is well written and provides an excellent way to learn and understand nmap and how to use it. I like the way the chapters are laid out and the how to sections coupled with explanations on what is happening. It has given me a better understanding of nmap and what commands to use in certain situations. I would recommend this book to anyone considering using nmap for network scanning.
http://www.packtpub.com/network-mappe...
1 review
February 20, 2013
It’s a great book. It’s like a cookbook for people that know and work with nmap. You can also use it if want increase own knowledge and learn to use the NSE (Nmap Scripting Engine).
Furthermore it is a simple and focused book for the people that start to use nmap, with a lot of example and tricks.
I like the semplicity and the terse style of the book and the practical approach.

http://www.packtpub.com/network-mappe...
Profile Image for عَبدُالكَرِيمْ .
207 reviews3 followers
January 29, 2013
Assuming you know what you're doing and you're familiar with nmap techniques this book is defiantly a good 'fast-reference' for nmap usage.

Do not read it before knowing the basics of nmap because it will seem like Chinese to you
Profile Image for Fuat .
22 reviews
August 4, 2014
Suggesting this book for system administrators and security professionals. Nmap is a must have tool
Displaying 1 - 8 of 8 reviews

Can't find what you're looking for?

Get help and learn more about the design.