文档介绍:CHAPTER 1: THE BASICS
I Protocol
T ransmission Control Protocol (TCP)
T CP Ports
T he TCP Handshake
Us er Datagram Protocol (UDP)
UD P Ports
T he Non-existent UDP Handshake
I Control Message Protocol (ICMP)
T he Basics of nmap
T he Nmap Scanning Process
Us ing nmap from mand Line
N map Target Specifications
P rivileged Access
N map Support Files
L ocating the Support Files
Us ing the Support Files
nmap-mac-prefixes
nmap-os-fingerprints
nmap-protocols
nmap-rpc
nmap-service-probes
nmap-services
CHAPTER 2: NMAP SCANNING TECHNIQUES
N map Scan Summary
T CP SYN Scan ( -sS )
T CP connect() Scan ( -sT )
S tealth Scanning – The FIN Scan ( -sF ) , Xmas Tree Scan ( -sX ) , and Null Scan ( -sN )
T he FIN Scan ( -sF )
T he Xmas Tree Scan ( -sX )
T he Null Scan ( -sN )
S tealth Scanning Summary
P ing Scan ( -sP )
V ersion Detection ( -sV )
UD P Scan ( -sU )
I P Protocol Scan ( -sO )
A CK Scan ( -sA )
Wi ndow Scan ( -sW )
R PC Scan ( -sR )
L ist Scan ( -sL )
I dlescan ( -sI <zombie host:[probeport]> )
H ow Idlescan REALLY Works
I dlescan Preparation
D econstructing the Idlescan Process
I dlescan Summary
F TP Bounce Attack ( -b )
F TP Bounce Attack Operation
F TP Bounce Attack Summary
CHAPTER 3: NMAP'S PING OPTIONS
P ing Options
I CMP Echo Request and TCP ACK Ping ( -PB )
I CMP Echo Request Ping ( -PE )
T CP ACK Ping ( -PA [portlist] )
T CP SYN Ping ( -PS [portlist] )
UD P Ping ( -PU [portlist] )
I CMP Timestamp Ping ( -PP )
I CMP Address Mask Ping ( -PM )
D on't Ping Before Scanning ( -P0 )
R equire Reverse DNS ( -R )
D isable Reverse DNS ( -n )
CHAPTER 4: OPERATING SYSTEM FINGERPRINTING
O perating System Fingerprinting ( -O ) Operation
T he nmap-os-fingerprints Support File
nma