Cybersecurity â Attack and Defense Strategies - Third Edition by Yuri Diogenes & Dr. Erdal Ozkaya
Author:Yuri Diogenes & Dr. Erdal Ozkaya
Language: eng
Format: epub
Publisher: Packt
Published: 2022-01-15T00:00:00+00:00
Use of clever tricks
The use of clever tricks can help you defend your network against Nmap scanning. The Nmap scan tool, just like many other probe tools, relies on information it obtains from the target network devices or ports. It then interprets the information while organizing it into useful reports based on which the ethical hackers can infiltrate the system. However, the use of clever tricks is a common practice, especially where the administrators take an offensive approach to being scanned and create fake responses to the Nmap scans. These clever tricks are meant to confuse and slow down the Nmap scan tool. These clever tricks are effective at solving the problem and defending a network from malicious scans. However, it has been identified that they end up causing more problems than they solve within a network. These slowing tricks are often written without any security considerations and can be used by attackers to gain valuable information about the system. The clever tricks can work in many instances and can be effective at keeping the attackers at bay. In some cases, unfortunately, the use of these tricks may be counterproductive and may end up benefitting the hackers more than the network administrators.
Here are some examples of clever tricks for Nmap:
Disable DNS name resolution:
nmap -p 80 -n 192.168.1.1
Scan for top ports:
nmap --top-ports 100 192.168.1.1
Get a list of servers with a specific port open:
nmap -sT -p 8080 192.168.1.* | grep open
Scan your network for rogue access points:
nmap -A -p1-85,113,443,8080-8100 -T4 âmin-hostgroup 50 âmax-rtt-timeout 2000 âinitial-rtt-timeout 300 âmax-retries 3 âhost-timeout 20m âmax-scan-delay 1000 -oA RogueAPScan 192.168.0.0/8
Test if the target is vulnerable to DoS attacks:
nmap --script dos -Pn 192.168.1.1
Run a full vulnerability test:
nmap -Pn --script vuln 192.168.1.1
This way you can run a full vulnerability test against your target using Nmapâs scripting engine (NSE).
Launch brute force attacks:
nmap -p 1433 --script ms-sql-brute --script-args userdb=usersFile.txt,passdb=passwordsFile.txt 192.168.1.1
Detect malware-infected hosts:
nmap -sV --script=http-malware-host 192.168.1.1
Nmap is able to detect malware and backdoors by running extensive tests on a few popular OS services like Identd, Proftpd, Vsftpd, IRC, SMB, and SMTP.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(5859)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5553)
Machine Learning Security Principles by John Paul Mueller(5530)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5202)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5191)
Solidity Programming Essentials by Ritesh Modi(3640)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3274)
Mastering Python for Networking and Security by José Manuel Ortega(3233)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3227)
Future Crimes by Marc Goodman(3221)
Blockchain Basics by Daniel Drescher(3190)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2789)
Learn Computer Forensics - Second Edition by William Oettinger(2785)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2747)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2680)
The Code Book by Simon Singh(2614)
The Art Of Deception by Kevin Mitnick(2508)
Incident Response with Threat Intelligence by Roberto Martínez(2479)
