Hackers about hacking techniques in our IT Security Magazine


Dear Hakin9 followers:

This month we have decided to devote the current issue to Nmap. Some of you have most likely used Nmap sometime or another, while others use it on a daily basis for network discovery and security auditing. Besides those functions, there are many more useful options that come with this utility. Our authors have attempted to extensively describe what can be done with Nmap and how it can be done. This month: Ali Hadi will take you on a journey through Nmap – from basic to advanced techniques. While David Harrison and Sherri Davidoff will discuss network forensics. Avery Buffington will describe the different techniques in Nmap, Ncat, and Nping. Sahil Khan will give you a detailed description of Nmap and its most important features. While Matthew Conley will give you an overview of when to use Nmap and what vulnerabilities can be observed.

We hope that you will enjoy reading this issue as much as the authors enjoyed writing their articles.

Come on and Get Hakin9!

NOTE: This issue is available in both .pdf and .epub formats and has been compressed into a .rar file.


August 28, 2014

1 Responses on THE GUIDE TO NMAP 02/2012"

  1. This article is a _masterpiece_ I have been struggling to get to grips with DICKS for some time now and with this expose I’ve managed to penetrate new areas. However, it is important to point out one particular error the authors made:

    “Had we prototyped our heterogeneous cluster, as opposed to simulating it in courseware, we would have seen degraded results.”

    This is not neccesarily true. In general prototyping a heterogeneous cluster CAN lead to degraded results but only if you’re running the older version of SCO on your PDP-11 (as they apparently were). Using the newer Alpha hardware running NT will mitigate the performance issues to a large degree. Also, the John Mcarthy model is dated – the new Reagonomics beowulf cluster model is the de facto basis for all modern genoming.

    Report user

Leave a Message

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>