- About the Author
- About the Technical Editor
- Credits
- Acknowledgments
- Foreword
- Introduction
- CHAPTER 1 Fundamental Networking and Security Tools
- CHAPTER 2 Troubleshooting Microsoft Windows
- CHAPTER 3 Nmap—The Network Mapper
- CHAPTER 4 Vulnerability Management
- CHAPTER 5 Monitoring with OSSEC
- CHAPTER 6 Protecting Wireless Communication
- CHAPTER 7 Wireshark
- CHAPTER 8 Access Management
- CHAPTER 9 Managing Logs
- CHAPTER 10 Metasploit
- CHAPTER 11 Web Application Security
- CHAPTER 12 Patch and Configuration Management
- CHAPTER 13 Securing OSI Layer 8
- CHAPTER 14 Kali Linux
- CHAPTER 15 CISv7 Controls and Best Practices
Zenmap
Everything in this chapter thus far has been done through the command line or terminal interface. As Nmap has matured, so has the interface. Zenmap is the GUI of Nmap. It is a multiplatform, free, and open source application. There are some benefits to Zenmap that the good old command‐line Nmap cannot do, such as building topology, creating interactive maps, showing comparisons between two scans, keeping and tracking the results of a scan, and making the scan duplicable. Zenmap's goal is to make scanning easy and free for beginners and experts alike. You only have to identify your target and hit the Scan button, as you see in Figure 3.5 .
As you can see, this scan is the exact previous scan, just done in a GUI. If you clicked the tabs across the middle, you would see a list of all ports open, the network topology, the host details, and the history of scans of this asset, as you see in Figure 3.6 .
To save an individual scan to a file, choose the Scan menu and select Save Scan from the drop‐down. If there is more than one scan, you will be asked which one to save. You have a choice of saving in
or .xml
format. The .txt
format can only be opened and used again by Zenmap. By default, all scans are saved automatically, but only for 60 days..xml
Before you install Nmap or Zenmap, you will want to make sure it isn't already installed. There are several operating systems (including most Linux systems) that have Nmap packages embedded but not installed. Type the following at a command prompt:
nmap --version
This will display the version of Nmap that is installed. If you get an error message such as
, then Nmap is not installed on your system.nmap: command not found
Zenmap is found in the executable Windows installer. The latest stable release will be on the www.nmap.org/download
page. To download the executable file, click the link shown in Figure 3.7 .
As with most executable files for Windows, the file is saved by default in the Downloads folder. Double‐click the executable to start the install process. Click Next through the windows, keeping all the defaults, until you get to Finish. Once the install has completed, open the Start menu on your taskbar and begin typing Nmap . At the top of your menu, you should see Nmap‐Zenmap GUI. Click the application, define the target assets, and click Scan to launch.
The white paper “CIS Controls Implementation Guide for Small‐ and Medium‐Sized Enterprises (SMEs)” published at www.cisecurity.org
breaks down into these three phases:
- Know your environment.
- Protect your assets.
- Prepare your organization.
In phase 1, Nmap is described as a famous multipurpose network scanner, and Zenmap is described as an easy‐to‐use graphic user interface for Nmap. You must know your environment better than an attacker and use that attacker's mind‐set in key controls to develop your security program.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论