About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 44. Chapters: Packet analyzer, Ping, Traceroute, Tcpdump, Nmap, Network intelligence, Wireshark, Metasploit Project, SolarWinds, Openkore, Netcat, Pcap, Capsa, Nagios, PacketTrap, PathPing, NetCrunch, OmniPeek, Nessus, Shinken, Nimsoft, Carnivore, SAINT, Ngrep, Plixer International, DSniff, Ettercap, Core Impact, WhatsUp Gold, Multi Router Traffic Grapher, Network Security Toolkit, Accelops, MTR, Aircrack-ng, Monitor mode, W3af, Packet crafting, Promiscuous mode, Kismet, Paping, Ipswitch, Inc., KisMAC, ActionPacked! Networks, Packetsquare, Refense Technologies, Microsoft Network Monitor, Fiddler, AdRem Software, TCP Gender Changer, Security Administrator Tool for Analyzing Networks, FlowMon, OpenVAS, Ntop, Prefix WhoIs, Isyvmon, Xymon, PRTG Network Monitor, Pirni, Layer four traceroute, Audit Record Generation and Utilization System, Zx Sniffer, Weplab, Paessler, WarVOX, SNMPTT, Paessler Router Traffic Grapher, AirSnort, Telecom network protocol analyzer, Snoop, Panorama9, Retina Vulnerability Assessment Scanner, SQLFilter, University Toolkit, Tcptrace, Lorcon, URL Snooper. Excerpt: Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. Unlike many simple port scanners that just send packets at some predefined constant rate, Nmap accounts for the network conditions (latency fluctuations, network congestion, the target interference with the scan) during the run. Also, owing to the large and active user community providing feedback on its features and contributing back, Nmap has succeeded to extend its discovery capabilities beyond basic host being...