Table of Contents
1. Introduction to Nmap and Security Assessments
2. Setting Up a Lab Environment For Nmap
3. Introduction to Attack Surface Mapping
4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
5. Mapping a Large Environment
6. Leveraging Zenmap and Legion
7. Advanced Obfuscation and Firewall Evasion Techniques
8. Leveraging the Nmap Scripting Engine
9. Best Practices and Considerations
APPENDIX A. Additional Questions
APPENDIX B. Nmap Quick Reference Guide
Index
2. Setting Up a Lab Environment For Nmap
3. Introduction to Attack Surface Mapping
4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
5. Mapping a Large Environment
6. Leveraging Zenmap and Legion
7. Advanced Obfuscation and Firewall Evasion Techniques
8. Leveraging the Nmap Scripting Engine
9. Best Practices and Considerations
APPENDIX A. Additional Questions
APPENDIX B. Nmap Quick Reference Guide
Index