Doug DePeppe is the Founder of eosEdge Legal, a First-of-Kind cyberlaw and...
Dear Hakin9 followers:
This month we have decided to devote the current issue to Nmap. Some of you have most likely used Nmap sometime or another, while others use it on a daily basis for network discovery and security auditing. Besides those functions, there are many more useful options that come with this utility. Our authors have attempted to extensively describe what can be done with Nmap and how it can be done. This month: Ali Hadi will take you on a journey through Nmap – from basic to advanced techniques. While David Harrison and Sherri Davidoff will discuss network forensics. Avery Buffington will describe the different techniques in Nmap, Ncat, and Nping. Sahil Khan will give you a detailed description of Nmap and its most important features. While Matthew Conley will give you an overview of when to use Nmap and what vulnerabilities can be observed.
We hope that you will enjoy reading this issue as much as the authors enjoyed writing their articles.
Come on and Get Hakin9!
NOTE: This issue is available in both .pdf and .epub formats and has been compressed into a .rar file.