'NMAP'에 해당되는 글 4건

  1. 2009.07.17 Nmap 5.0 릴리즈
  2. 2008.09.12 nmap 동영상
  3. 2007.12.05 nmap 에 이런 기능도 있었군요.
  4. 2006.04.15 네트워크 스캔닝 -NMAP

포트 스캐닝의 대표주자격인 nmap 이 5.0 릴리즈 되었다는 소식입니다..



자세한 것은 http://nmap.org/5/#changes 참고 하시구요...간단히 삺펴 보면 다음과 같네요.

  1. The new Ncat tool. It will do data transfer, redirection, and debugging.
  2. Ndiff is a scan comparison tool. It will make it easy to automatically scan your network daily and report on any changes
  3. Nmap’s 5.0 performance has improved dramatically.
  4. Nmap Network Scanning, the official Nmap guide to network discovery and security scanning.
  5. The Nmap Scripting Engine (NSE) . It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more.

 

Posted by 엔시스
TAG IT, NMAP, nmap 5.0

nmap 동영상

Security Movie 2008.09.12 09:38


NMAP 에 대한 프리젠테이션 동영상인데  1시간 정도 강의를 하는데 ...쩝 ....간단히 분위기만 파악할수 있겠군요..혹시 영어 듣기에 자신 있으신 분들은 들으면 도움이 되겠습니다....영어 공부 ..영원한 숙제입니다...

http://www.irongeek.com/i.php?page=videos/nmap-louisville-issa


'Security Movie' 카테고리의 다른 글

cain & abel 동영상  (0) 2008.10.16
[실제상황] 중국인의 보이스피싱  (0) 2008.09.19
nmap 동영상  (0) 2008.09.12
요즘 뜨는 경제학 강의 동영상  (0) 2008.07.20
How to spoof a MAC address  (0) 2008.07.15
개인정보보호의 달인  (0) 2008.07.14
Posted by 엔시스
TAG NMAP, TCP/IP

포트 스캔중에 오픈 소스로 가장 많이 사용하는 것중에 nmap이 있죠..그런데 약간 특이한 기능도 있군요..

아래 참고 하시면 되겠습니다..


Having recently spent some time working with Nmap for an upcoming course, I noticed that there is room for speed improvements in many of our Nmap commands. For example, the following command:

nmap -A -p 80 192.168.1.0/24

can be run in a similar manner, but in half the time. The goal of the above command is to gather the service fingerprint of all web servers in your environment. This is valuable information, and especially useful when looking for "interesting" services running on port 80, like botnet controllers. So, as a speed test lets run the above command against the most port scanned system in the world:

# nmap -A -p 80 scanme.insecure.org

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2006-11-20 13:41 EST
Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port
Interesting ports on scanme.nmap.org (205.217.153.62):
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.2 ((Fedora))
Too many fingerprints match this host to give specific OS details

Nmap finished: 1 IP address (1 host up) scanned in 14.204 seconds

The first command option "-A" tells Nmap to execute an OS fingerprint in addition to a service fingerprint for all ports specified. In this case we are specifying port 80 with the "-p 80" option. Since we only told Nmap to detect one port, it will only ever find one port to be open, hence the complaint from the OS fingerprinting engine "OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port". To cut the scan time in half, use the following command:

# nmap -sV -T4 -n -p 80 scanme.insecure.org

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2006-11-20 13:54 EST
Interesting ports on 205.217.153.62:
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.2 ((Fedora))

Nmap finished: 1 IP address (1 host up) scanned in 6.948 seconds

The first change we made was replace the "-A" with "-sV". This tells Nmap to only do service fingerprinting and not OS fingerprinting. We then added the "-T4" command option, which tells Nmap to use "aggressive" timing options. The "-T4" is really like a macro for other, more advanced, Nmap command line options such as "--max-rtt-timeout" which refers to how much time Nmap will wait for responses. The "-T4" is a good place to start to speed up a scan. The "-n" flag tells Nmap to ignore host name resolution (even though it will do this much faster since 3.97-Shmoo). We can see that by making these three small changes our scan time went from "14.204 seconds" to just "6.948 seconds". This is a HUGE time saving when attempting to scan a class C or class B network.

링크: http://www.pauldotcom.com/2006/11/20/nmap_for_speed_freaks.html

80 포트를 통하여 A 옵션을 사용하면 봇넷 같은 것도 찾을수 있나 봅니다...-T4 옵션은 타임아웃을 설정 할수 있어 스피드를 더 높일수 있습니다.. 참고 하시기 바랍니다..

Posted by 엔시스
보안 점검을 위한 포트 스캐닝하는 대표적인 툴.
최근 3.45 이후부터는 버전 스캐닝 기능(열린 포트의 데몬명과 버전)도 있습니다.

지금 최근 버전은 4.01 버전입니다

http://www.insecure.org/nmap/

가장 많이 사용하는 툴에 하나로 업데이트 또한 꾸준히 되고 있습니다.
결국, 개발하지 못하는 이상 우리는 얼마나 도구를 잘 다루느냐에 따라
수훨하게 관리할수 있는가 하는 문제하고도 연관이 있겠군요^^;

항상 모든 도구는 양날의 검과 같습니다. 부질한 짓을 하지 마시길..
요즘, 법이 무섭습니다..

'Security Utility' 카테고리의 다른 글

Backtrack 스샷  (0) 2006.06.16
John the Ripper 1.7.2 릴리즈  (0) 2006.05.29
네트워크 스캔닝 -NMAP  (0) 2006.04.15
웹가아드 -웹변조 막음  (0) 2006.04.10
이미지 백업 툴-dd  (0) 2006.04.10
취약점 스캐너  (0) 2006.04.05
Posted by 엔시스
TAG NMAP