Larry Hosken: New: Book Report: Nmap Network Scanning

I just got back from a 9-day tour of various western USA places as the Grand Tetons, Yellowstone, Kodachrome, and Zion National Park. Along the way, I busted my travel laptop, so I haven't been updating this blog. But now that I'm home again, I can post this Book Report for Nmap Network Scanning.

I bought this book because it was an Amazon recommendation. This taught me... to be skeptical of Amazon recommendations.

nmap is a computer security tool. Or a computer hacking tool. It's a port scanner. That is, if there are a bunch of machines on a network, each of which might be listening on one or more ports, this tool will scan each of those ports on each of those machines, reporting back on who was listening.

nmap is especially interesting because it's set up as a framework; it's pretty easy to add new ways to scan. E.g., if you don't want those other machines to know where all of these network probes are coming from, nmap can take advantage of an idle server. nmap crafts network packets to look like they came from the idle server and sends those packets to the target machine. The target machine "responds" by sending information back to the idle server. (Maybe the target's sysadmin gets suspicious—but they might blame the idle server.) A little while later, nmap asks the idle server if it's seen any packets lately. Since the idle server is usually idle, probably the only packets it sees is stuff from the target machine. Neat: TCP Idle Scan. Normally, you'd expect to have to set up a separate program for this, but nmap has it as just another way to scan.

There's interesting stuff in this book, but I won't use it. I didn't finish it. I'm not a network security administrator. I'm not trying to break into computers, either. nmap is a pretty feature-rich program, and I'm too lazy to learn a bunch of features that I'll never get around to using.

Tags: book capabilities unfinished
blog comments powered by Disqus