MESSAGE
DATE | 2015-03-06 |
FROM | Ruben
|
SUBJECT | Subject: [LIU Comp Sci] networking class
|
From owner-learn-outgoing-at-mrbrklyn.com Fri Mar 6 12:23:29 2015 Return-Path: X-Original-To: archive-at-mrbrklyn.com Delivered-To: archive-at-mrbrklyn.com Received: by mrbrklyn.com (Postfix) id 073B21612FD; Fri, 6 Mar 2015 12:23:29 -0500 (EST) Delivered-To: learn-outgoing-at-mrbrklyn.com Received: by mrbrklyn.com (Postfix, from userid 28) id E4A831612FF; Fri, 6 Mar 2015 12:23:28 -0500 (EST) Delivered-To: learn-at-mrbrklyn.com Received: from mailbackend.panix.com (mailbackend.panix.com [166.84.1.89]) by mrbrklyn.com (Postfix) with ESMTP id E7A351612FD for ; Fri, 6 Mar 2015 12:23:04 -0500 (EST) Received: from [10.0.0.17] (unknown [96.57.23.82]) by mailbackend.panix.com (Postfix) with ESMTPSA id 0F90410F06 for ; Fri, 6 Mar 2015 12:23:03 -0500 (EST) Message-ID: <54F9E338.6060907-at-panix.com> Date: Fri, 06 Mar 2015 12:26:16 -0500 From: Ruben User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: learn-at-mrbrklyn.com Subject: [LIU Comp Sci] networking class Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-learn-at-mrbrklyn.com Precedence: bulk Reply-To: learn-at-mrbrklyn.com
http://www.linuxjournal.com/content/nmap%E2%80%94not-just-evil
I kwon a lot of you guys are taking the networking class so I ran into this article this morning which might be useful or interesting. ~~~~~~~~~~~~~~~~~~~~~
http://www.linuxjournal.com/content/nmap%E2%80%94not-just-evil
If SSH is the Swiss Army knife of the system administration world, Nmap is a box of dynamite. It's really easy to misuse dynamite and blow your foot off, but it's also a very powerful tool that can do jobs that are impossible without it.
When most people think of Nmap, they think of scanning servers, looking for open ports to attack. Through the years, however, that same ability is incredibly useful when you're in charge of the server or computer in question. Whether you're trying to figure out what kind of server is using a specific IP address in your network or trying to lock down a new NAS device, scanning networks is incredibly useful.
Figure 1 shows a network scan of my QNAP NAS. The only thing I use the unit for is NFS and SMB file sharing, but as you can tell, it has a ton of ports wide open. Without Nmap, it would be difficult to figure out what the machine was running.
Figure 1. Network Scan
Another incredibly useful way to use Nmap is to scan a network. You don't even have to have root access for that, and it's as simple as specifying the network block you want to scan. For example, typing:
nmap 192.168.1.0/24
|
|