Nmap Technical Guide

Nmap is a well-known open source tool that has found a home in the hearts of hackers, both white and black alike. Though it was first created in the late 1990s, it leapt into the pop culture consciousness in 2003 when, in the motion picture The Matrix Reloaded, the character Trinity made use of Nmap to disable an electrical plant's security measures, taking down the local power grid.

In real life, it's most often used to locate available hosts and services on a network, determine the operating systems and versions utilized by machines on a network and pinpoint a network's open ports. While it's a valuable tool used by security pros for performing a network inventory or a vulnerability assessment, some fear that a Maxtix-like scenario is not as far fetched as it seems, as it is also a tool in some malicious hackers' arsenals, used to help find open ports running services vulnerable to attack.

In collaboration with security expert Michael Cobb, SearchSecurity.com has produced an Nmap Technical Guide, offering up all the guidance information security professionals need to install, configure, run and evaluate Nmap in the enterprise, both on Windows and Linux platforms. Browse through the technical tips below and learn how this free tool can help make your organization more secure.

    Requires Free Membership to View


  Nmap: A valuable open source tool for network security
  Installing and configuring Nmap on Windows
  Installing and configuring Nmap on Linux
  Scanning ports and services
  Nmap: More port scanning techniques
  Firewall configuration testing
  Techniques for improving scan times
  Interpreting and acting on Nmap results
  Nmap parsers and interfaces
  Nmap and the open source debate

About the author:
Michael Cobb, CISSP-ISSAP is the founder and managing director of Cobweb Applications Ltd., a consultancy that offers IT training and support in data security and analysis. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Mike is the guest instructor for SearchSecurity's Web Security School and, as a SearchSecurity.com site expert, answers user questions on application and platform security.

This Technical Guide originally appeared on SearchSecurity.com.

This was first published in November 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.