Other Sellers on Amazon
+ Free Shipping
Nmap in the Enterprise: Your Guide to Network Scanning 1st Edition
|New from||Used from|
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Customers who viewed this item also viewed
Customers who bought this item also bought
- Item Weight : 1.21 pounds
- Paperback : 264 pages
- ISBN-10 : 9781597492416
- ISBN-13 : 978-1597492416
- Dimensions : 7.46 x 0.66 x 9.08 inches
- Publisher : Syngress; 1st edition (March 14, 2008)
- Language: : English
- ASIN : 1597492418
- Best Sellers Rank: #5,828,311 in Books (See Top 100 in Books)
- Customer Reviews:
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
If you're going to make "Enterprise" part of the title for NITE, I would expect more attention paid to one of the biggest problems in enterprise scanning: data management. You can scan all you want, but the real problem is doing something intelligent with the output. With about 21 pages of text, Ch 7 (Tooling Around With Nmap) is the closest NITE comes to saying something about managing Nmap output beyond the single, smallish scan scenario. Unfortunately, the chapter is not up to the task.
Some might consider it unfair to criticize the book if there really is no enterprise-quality Nmap support application available. If that is the case, I have two replies. First, change the focus. Second, implement that application, and include it in the book. If you think the second is too much work, consider my reviews of the Hacking Exposed titles on Wireless, VoIP, or Cisco. All three author teams wrote specific tools to address shortcomings in each of their subject areas, and then included them in their three books. Not all authors can do this, but that level of effort really contributes to an outstanding book.
Turning to NSE, I hoped to learn about how to use Lua scripting with Nmap. The section on NSE is less than three full pages (pp 116-118) and basically concludes with a reference to the Nmap home page for more information. In the one place where the newest book on Nmap could have differentiated itself from its predecessors (many other Syngress books, Osborne's Anti-Hacker Toolkit or Hacking Exposed, and so on), NITE avoids the issue.
Aside from these issues, NITE is a good book for those with basic or perhaps intermediate experience with Nmap. Most of the items I found useful could have been gleaned from the Nmap man page or changelog, but I'll mention a few here. P 96 shows using the --reason switch to give more detail on responses from targets. PP 97-99 show using the -sL switch for list scans and -PN as the replacement for -P0. Note that Table 4.2 says -sN replaces -P0; it should say -PN replaces -P0 due to confusion with -PO (used for Internet Protocol enumeration). I liked the --osscan-limit switch on p 111 to only perform OS identification against targets offering at least one open and one closed port. P 127 reminded me of runtime interaction commands, like v/V for verbosity, d/D for debugging, and p/P for packet tracing. P 129 demonstrated the value of using --log-errors.
Ch 6 (Nmap OS Fingerprinting) was my favorite chapter. I liked the explanation of the components of an OS fingerprint. I hadn't seen this so thoroughly explained elsewhere, although it might exist. Overall, I should mention that the book was much better written than the average Syngress title. I credit the two (and only) authors for this level of quality.
If you have no other references for Nmap, and you use the tool in limited engagements, you should buy this book. If you're looking for help with real enterprise use or advanced Nmap usage, keep looking. Perhaps a second edition will address these issues?