Nmap is an incredibly useful tool, but it’s even more useful if you understand the results of an Nmap scan. After a scan is complete, Nmap will categorize each scanned port into one of six states. This tutorial describes Nmap’s possible outcomes and shows how each disposition is derived.
Nmap 4.5 introduced a number of new features, and this video provides an overview of the latest and greatest. In this tutorial, you’ll learn about Nmap’s new traceroute feature, the addition of the Zenmap graphical interface, Nmap’s exclusive new OS fingerprinting engine, the new port disposition explanations, and an exciting new Nmap scripting engine!
Fyodor has released the tenth-anniversary edition of Nmap! Version 4.50 hit the Internet on December 12th, and it includes hundreds of tweaks, enhancements, and feature additions since the last major release a year ago. Even with all of these new features, there are a handful that shine a bit brighter than others. If you've already…
“The network is slow!” Almost everyone in Information Technology has heard the cries of the end user community when their important application begins crawling. Because of the complexities associated with modern application infrastructures, technology professionals are often challenged to determine the source of the slowdown. Is the application sluggishness related to the network, security configuration, the end-user workstations, the server, or the application?
In the last mini-training course lesson, we learned about the different methods of gathering the network traffic created during our Nmap scans. In this lesson, we’ll go through our trace file and see exactly what happens when Nmap hits the network.