![]() ![]() ![]() Identifying open ports on a target host in preparation for auditing.Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses. Scriptable interaction with the target – using Nmap Scripting Engine (NSE) and Lua programming language.TCP/IP stack fingerprinting – Determining the operating system and hardware characteristics of network devices based on observations of network activity of said devices.Version detection – Interrogating network services on remote devices to determine application name and version number.Port scanning – Enumerating the open ports on target hosts.For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open. Host discovery – Identifying hosts on a network.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |