Home page logo

pen-test logo Penetration Testing mailing list archives

Review: NMAP Network Scanning -- Fyodor Vaskovich
From: Jon Kibler <Jon.Kibler () aset com>
Date: Mon, 15 Dec 2008 11:26:20 -0500

Hash: SHA1

Everything You Wanted to Know About NMAP But Were Afraid to Ask

(Fyodor provided me a pre-release copy of the book and asked that I
write a review. The following is the review that I posted to Amazon.)

This book is clearly THE definitive guide to nmap. It has everything you
could possibly want to know about using nmap, and much more. If you use
nmap, this book is a mandatory must have, must read. Even if you are
only an occasional nmap user, this book is full of information that will
show you how to get better results using nmap than you would without it.

In this book, Fyodor does an outstanding job covering everything from
the most basic use of nmap, through advanced topics, such as evading
detection and tweaking the nmap configuration files. Explanations are
clearly written, and real world examples are provided. Not only does the
book cover the specifics of using nmap, it also presents a very clear
methodology for getting the most out of nmap. It explains not only the
results produced by nmap, but also explains why nmap produced those
results. It provides many excellent examples of how to use advanced nmap
options to help figure out seemingly conflicting or otherwise confusing
results when they occur.

The material on advanced topics is really great. The “Nmap Scripting
Engine” chapter provides fantastic detail on NSE and has everything you
need to start working with scripting. The “Detecting and Subverting
Firewalls and Intrusion Detection Systems” chapter covers a lot of
information pen testers using nmap really need to know. The chapter
“Defenses Against Nmap” details what a network administrator should be
doing to detect nmap scans. Plus, the “Nmap Reference Guide” does a
great job of summarizing all that is nmap.

This book is not the type that you can read once and absorb everything
you need to know. You need to sit down with the book and play with nmap
in your sandbox. Even if you already consider yourself an nmap expert,
to really learn the material in this book will take a lot of
experimentation. It is a book that you will be constantly referring to
as you use nmap.

Finally, the production quality of this book is first rate. For a
self-published book, the quality is simply outstanding. The editing is
actually a lot better than in many technical books produced by the big
publishing houses. The layout is simplistic and clean, and you don’t
have to use a microscope to read the text or examples. I am as impressed
by the production qualities of the book as I am its contents. This is
clearly a first rate book on all counts.

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253

Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org


Filtered by: TRUSTEM.COM's Email Filtering Service
No Spam. No Viruses. Just Good Clean Email.

This list is sponsored by: Cenzic

Security Trends Report from Cenzic
Stay Ahead of the Hacker Curve!
Get the latest Q2 2008 Trends Report now


  By Date           By Thread  

Current thread:
  • Review: NMAP Network Scanning -- Fyodor Vaskovich Jon Kibler (Dec 15)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]