Selasa, 30 Maret 2010

Syngress Nmap In The Enterprise Your Guide To Network Scanning Jan 2008


About ten years ago I was working as a Network Administrator managing a
medium size network. One of my first tasks in this position was to create a network
asset database for all network devices. We already had a high-priced, although
functionally deficient, network management tool that just wasn’t making the cut.
Using the output from the management tool as a starting point I began painstakingly
connecting to each network device, and documenting them to inventory the
network. This also involved a lot of hours physically traversing buildings, basements,
and wiring closets. Finally, it seemed that I had visited every nook and cranny and
identified every router, bridge, switch, hub, and archaic telecommunications device
retrofitted to the network. For security, I wrote a UNIX script to connect to the
known devices and disable physical ports that weren’t being used and enable security
features on the devices. This is when things started to get complicated. Suddenly
the help desk phones started ringing and people were complaining of lost network
connectivity. Alas, there were even more devices out there that we didn’t know
about! Luckily the UNIX script was easily reversible. After hearing my woes that
evening a “hacker” friend of mine pointed out a new tool for scanning networks
that he read about in Phrack magazine. It was a bit controversial, but it was free
and it looked like it could do the job. The next day became my first experience
with Nmap, a network scanner, and since that day it has been making my life a
whole lot easier.

Download Ebook Here

Tidak ada komentar:

Posting Komentar