ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Pruebas De Penetración


Enviado por   •  29 de Junio de 2013  •  238 Palabras (1 Páginas)  •  292 Visitas

Networks are the Wild West of the modern age. The network population is much like that of a

frontier town. There’s the usual local townsfolk who keep their head down and work amongst

themselves, the occasional drifters who come into town and then disappear into the sunset, and

there’s always at least one black-hat-wearing bad guy who shows up to rob the bank, shoot up

the saloon, or just cause a ruckus.

And then, there’s the Sheriff. That’s you.

In today’s modern network, the Sheriff needs more than just a pair of spurs and a six-shooter.

Today’s network professional requires an eclectic mix of network analyzers, security tools, and

multi-functional gadgets. Just like the Wild West, the Sheriff must always stay one step ahead of

the bad guys.

Nmap is used every day by thousands of network professionals to keep their systems secure.

Nmap’s documentation describes itself as a “network exploration tool and security scanner,” and

it has excelled at these complex capabilities. Nmap tracks down the Wild West town’s citizens,

identifies each person, and checks them over for potential security gaps. All of these scans are

configured, launched, and recorded using nmap’s built-in capabilities. With nmap, the Wild

West’s network becomes a safer and more comfortable place to live.

Nmap is an extremely powerful tool, and one of the most popular security utilities in the open

source community. It’s written and maintained by “Fyodor” from his web site at

http://www.insecure.org/nmap/. The nmap web page is a highly recommended read for its

wealth of great security information.

Secrets

...

Descargar como (para miembros actualizados) txt (2 Kb)
Leer 1 página más »
Disponible sólo en Clubensayos.com