Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
6Activity
0 of .
Results for:
No results containing your search query
P. 1
Discovery With NMAP

Discovery With NMAP

Ratings:

4.0

(1)
|Views: 134 |Likes:
Published by opexxx

More info:

Published by: opexxx on Jun 27, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/28/2010

pdf

text

original

 
 Host Discovery with nmap
By: Mark Wolfgangmoonpie@moonpie.orgNovember 2002
 
3
1. Introduction
 As a Computer Security Engineer that regularly conducts external penetrationtests, a recurring challenge seems to arise when assessing organizations with alarge allocation of IP address space. What does one do when faced with multipleclass B’s, a few class C’s, and a limited amount of time? Do you stick all of theaddress space in your favorite scanner and hit the
Go 
button, wait till it’s doneand hope the results are accurate? How can you be sure that your scannerfound all the hosts that are accessible? Do you even know the method yourscanner uses to discover which hosts are alive?This document attempts to answer the above questions, and will illustrate (at avery technical level) the methodology that I use to accurately discover whichhosts are accessible prior to conducting port scanning or a vulnerabilityassessment.Note: Some may say that unless one performs a scan on all 65535 TCP and UDPports on every possible IP address in the range, that the penetration tester isn’tbeing thorough enough. While I do agree that in order to be completelythorough, one must perform a scan as stated, but I have rarely, if ever had theluxury of performing such a scan, as it usually takes a considerable amount of time. An underlying theme about Information Security is about striking abalance and weighing the pros and cons. If being absolutely thorough and timeis of no consideration, you’ll more than likely want to run a full, blind scan on allIP addresses. If however, a balance can be struck between being thorough andcompleting the project on time, read on – you may learn some techniques toimprove both the accuracy and efficiency of your scans.

Activity (6)

You've already reviewed this. Edit your review.
1 hundred reads
rafaila42 liked this
aman_manu2003 liked this
dk2202 liked this
fcukzone liked this
fillupSD liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->