09.12.2012 Views

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mixing It Up<br />

Nmap also supports a number of performance and reliability features, such as dynamic<br />

delay time calculations, packet time-out and retransmission, parallel port scanning, and<br />

detection of down hosts via parallel pings. Nmap also offers flexible target and port<br />

specification, decoy scanning, determination of TCP sequence predictability, characteristics,<br />

and output <strong>to</strong> machine-perusable or human-readable log files.<br />

With that said, you can also mix and match the Nmap options. For example, take a<br />

look at the following syntax:<br />

nmap -v -v -sS -O 172.16.22.1-50<br />

The above syntax will initiate Nmap with maximum output verbosity, in a stealth<br />

mode scan, plus operating system detection on all (live) systems between 172.16.22.1<br />

and 172.16.22.50.<br />

As another example, take a look at the following syntax:<br />

nmap -sS -p 21,80 -oN webservices.log 172.16.22.1-50<br />

Nmap 391<br />

The above syntax will have Nmap search for systems offering the Web services, FTP<br />

and HTTP, in stealth mode between IP addresses 172.16.22.1 and 172. What’s more, the<br />

output will be ported <strong>to</strong> a log file, webservices.log.<br />

Nmap has become a defac<strong>to</strong> standard for security auditing, especially with the<br />

newest flavors for Windows and Mac OS X platforms. For more information and<br />

download links on these, visit www.TigerTools.net on the Web.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!