Secrets of Network Cartography By James Messer

Secrets of Network Cartography By James Messer
Secrets of Network Cartography By James Messer

Book Title: Secrets of Network Cartography By James Messer
Author's: James Messer
Page's: 152
DOWNLOAD: (SERVER - 1) | (SERVER - 2) | (SERVER - 3) | (TORRENT)


Table of Contents
INTRODUCTION
What is nmap?
Windows Operating Systems and nmap
Is nmap Good or Evil?
About This Book
How This Book is Organized
Conventions Used in This Book

Chapter 1: THE BASICS
Internet Protocol
Transmission Control Protocol (TCP)
TCP Ports
The TCP Handshake
User Datagram Protocol (UDP)
UDP Ports
The Non-existent UDP Handshake
Internet Control Message Protocol (ICMP)
The Basics of nmap
The Nmap Scanning Process
Using nmap from the Command Line
Nmap Target Specifications
Privileged Access
Nmap Support Files
Locating the Support Files
Using the Support Files
nmap-mac-prefixes
nmap-os-fingerprints
nmap-protocols
nmap-rpc
nmap-service-probes
nmap-services

Chapter 2: NMAP SCANNING TECHNIQUES
Nmap Scan Summary
TCP SYN Scan (-sS)
TCP connect() Scan (-sT)
Stealth Scanning – The FIN Scan (-sF), Xmas Tree Scan (-sX), and Null Scan (-sN)
The FIN Scan (-sF)
The Xmas Tree Scan (-sX)
The Null Scan (-sN)
Stealth Scanning Summary
Ping Scan (-sP)
Version Detection (-sV)
UDP Scan (-sU)
IP Protocol Scan (-sO)
ACK Scan (-sA)
Window Scan (-sW)
RPC Scan (-sR)
List Scan (-sL)
Idlescan (-sI <zombie host:[probeport]>)
How Idlescan REALLY Works
Idlescan Preparation
Deconstructing the Idlescan Process
Idlescan Summary
FTP Bounce Attack (-b)
FTP Bounce Attack Operation
FTP Bounce Attack Summary

Chapter 3: NMAP'S PING OPTIONS
Ping Options
ICMP Echo Request and TCP ACK Ping (-PB)
ICMP Echo Request Ping (-PE)
TCP ACK Ping ( -PA [portlist] )
TCP SYN Ping ( -PS [portlist] )
UDP Ping ( -PU [portlist] )
ICMP Timestamp Ping (-PP)
ICMP Address Mask Ping (-PM)
Don't Ping Before Scanning (-P0)
Require Reverse DNS (-R)
Disable Reverse DNS (-n)

Chapter 4: OPERATING SYSTEM FINGERPRINTING
Operating System Fingerprinting (-O) Operation
The nmap-os-fingerprints Support File
nmap-os-fingerprints: Fingerprint
nmap-os-fingerprints: Class
nmap-os-fingerprints: TSeq
TSeq: The Class Attribute
TSeq: The IPID Attribute
TSeq: Timestamp Option Sequencing
nmap-os-fingerprints: Test 1 (T1) through Test 7 (T7)
The T1 to T7 Attributes
nmap-os-fingerprints: The Port Unreachable Test (PU)
The Operating System Fingerprinting Process
Advantages of Operating System Fingerprinting
Disadvantages of Operating System Fingerprinting
When to use Operating System Fingerprinting
Limit Operating System Scanning (--osscan_limit)
More Guessing Flexibility (--osscan_guess, --fuzzy)
Additional, Advanced, and Aggressive (-A)

Chapter 5: HOST AND PORT OPTIONS
Exclude Targets (--exclude <host1 [,host2] [,host3]...>)
Exclude Targets in File (--excludefile <exclude_file>)
Read Targets from File (-iL <inputfilename>)
Pick Random Numbers for Targets (-iR <numhosts> )
Randomize Hosts (--randomize_hosts, -rH)
No Random Ports (-r)
Source Port (--source_port or -g)
Specify Protocol or Port Numbers (-p <port range>)
Fast Scan Mode (-F)
Create Decoys (-D <decoy1 [,decoy2][,ME],...>)
   o The Danger of Decoy-Initiated SYN Floods
Source Address (-S<IP_address>)
Interface (-e <interface>)

Chapter 6: LOGGING OPTIONS
Normal Format (-oN <logfilename>)
XML Format (-oX <logfilename>)
  o Stylesheet (--stylesheet <filename>)
  o No Stylesheet (--no-stylesheet)
Grepable Format (-oG <logfilename>)
All Formats (-oA <basefilename>)
Script Kiddie Format (-oS <logfilename>)
HTML Format (-oH)
Resume Scan (--resume <logfilename>)
Append Output (--append_output)

Chapter 7: REAL-TIME INFORMATION OPTIONS
Verbose Mode (--verbose, -v)
Version Trace (--version_trace)
Packet Trace (--packet_trace)
Debug Mode (--debug, -d)
Interactive Mode (--interactive)
Noninteractive Mode (--noninteractive)

Chapter 8: TUNING AND TIMING OPTIONS
Nmap Packet Tuning
   o Time to Live (--ttl <value>)
   o Use Fragmented IP Packets (-f, -ff)
   o Maximum Transmission Unit (--mtu <databytes>)
   o Data Length (--data_length <databytes>)
Nmap Timing Options
   o Host Timeout (--host_timeout <milliseconds>)
   o Round Trip Time
Initial Round Trip Time Timeout (--initial_rtt_timeout)
Minimum Round Trip Time Timeout (--min_rtt_timeout)
Maximum Round Trip Time Timeout (--max_rtt_timeout)
   o Parallel Host Scanning
Maximum Parallel Hosts per Scan (--max_hostgroup)
Minimum Parallel Hosts per Scan (--min_hostgroup)
   o Parallel Port Scanning
Maximum Number of Parallel Scans (--max_parallelism)
Minimum Number of Parallel Scans (--min_parallelism)
   o Delay
Minimum Delay Between Probes (--scan_delay)
Maximum Delay Between Probes (--max_scan_delay)
   o Timing Policies (-T)

Chapter 9: WINDOWS-ONLY OPTIONS
• Help for Windows (--win_help)
• List All Network Interfaces (--win_list_interfaces)
• Disable Raw Socket Support (--win_norawsock)
• Try Raw Sockets Even on non-W2K Systems (--win_forcerawsock)
• Disable WinPcap Support (--win_nopcap)
• Test NT 4.0 Route Code (--win_nt4route)
• Test Response to Lack of iphlpapi.dll (--win_noiphlpapi)
• Trace Through Raw IP Initialization (--win_trace)
• Skip Windows IP Initialization (--win_skip_winip_init)

Chapter 10: MISCELLANEOUS OPTIONS
• Quick Reference Screen (--help, -h)
• Nmap Version (--version, -V)
• Data Directory (--datadir)
• Quash Argument Vector (-q)
• Define Custom Scan Flags (--scanflags[flagval])
• (Uriel) Maimon Scan (-sM)
• IPv6 Support (-6)

Chapter 11: USING NMAP IN THE "REAL WORLD"
Identifying the Remnants of a Virus Outbreak or Spyware Infestation
Vulnerability Assessments
Security Policy Compliance Testing
• Asset Management
• Firewall Auditing
• Perpetual Network Auditing

Comments