Pruebas De Penetración
Enviado por ulfskarl • 29 de Junio de 2013 • 238 Palabras (1 Páginas) • 292 Visitas
Networks are the Wild West of the modern age. The network population is much like that of a
frontier town. There’s the usual local townsfolk who keep their head down and work amongst
themselves, the occasional drifters who come into town and then disappear into the sunset, and
there’s always at least one black-hat-wearing bad guy who shows up to rob the bank, shoot up
the saloon, or just cause a ruckus.
And then, there’s the Sheriff. That’s you.
In today’s modern network, the Sheriff needs more than just a pair of spurs and a six-shooter.
Today’s network professional requires an eclectic mix of network analyzers, security tools, and
multi-functional gadgets. Just like the Wild West, the Sheriff must always stay one step ahead of
the bad guys.
Nmap is used every day by thousands of network professionals to keep their systems secure.
Nmap’s documentation describes itself as a “network exploration tool and security scanner,” and
it has excelled at these complex capabilities. Nmap tracks down the Wild West town’s citizens,
identifies each person, and checks them over for potential security gaps. All of these scans are
configured, launched, and recorded using nmap’s built-in capabilities. With nmap, the Wild
West’s network becomes a safer and more comfortable place to live.
Nmap is an extremely powerful tool, and one of the most popular security utilities in the open
source community. It’s written and maintained by “Fyodor” from his web site at
http://www.insecure.org/nmap/. The nmap web page is a highly recommended read for its
wealth of great security information.
Secrets
...