MitiBox: camouflage and deception for network scan mitigation
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Idle port scanning and non-interference analysis of network protocol stacks using model checking
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
DNCOCO'10 Proceedings of the 9th WSEAS international conference on Data networks, communications, computers
A hybrid approach to operating system discovery based on diagnosis
International Journal of Network Management
Enforcing security with behavioral fingerprinting
Proceedings of the 7th International Conference on Network and Services Management
Absolute pwnage: a short paper about the security risks of remote administration tools
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
A hands-on look at active probing using the IP prespecified timestamp option
PAM'12 Proceedings of the 13th international conference on Passive and Active Measurement
ShadowNet: an active defense infrastructure for insider cyber attack prevention
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Spying in the dark: TCP and tor traffic analysis
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Mining your Ps and Qs: detection of widespread weak keys in network devices
Security'12 Proceedings of the 21st USENIX conference on Security symposium
WAFFle: fingerprinting filter rules of web application firewalls
WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies
Statistical cross-language Web content quality assessment
Knowledge-Based Systems
Fragmentation Considered Vulnerable
ACM Transactions on Information and System Security (TISSEC)
Load balancer discovery for the data center: a holistic approach
Proceedings of the 8th International Conference on Network and Service Management
Network fingerprinting: TTL-based router signatures
Proceedings of the 2013 conference on Internet measurement conference
Cover your ACKs: pitfalls of covert channel censorship circumvention
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
An overview of the parallax BattleMind v1.5 for computer network defence
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
A flexible framework for detecting IPv6 vulnerabilities
Proceedings of the 6th International Conference on Security of Information and Networks
ZMap: fast internet-wide scanning and its security applications
SEC'13 Proceedings of the 22nd USENIX conference on Security
K-p0f: a high-throughput kernel passive OS fingerprinter
ANCS '13 Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems
A systematic approach for detecting and clustering distributed cyber scanning
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X. Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http://nmap.org/book for more information and sample chapters.