Nmap From an Ethical Hacker's Point of View 115
ddonzal notes a new tutorial that introduces Nmap from the viewpoint of an ethical hacker. (Part 1 of 2 parts is up now.) The author is Kirby Tucker, who writes: "After completing this 2 Part Series and having practiced the techniques described, one should not only be able to sit at a 'roundtable' with advanced security professionals and 'hold their own' in a discussion concerning Nmap, but also utilize this great tool in protecting their own network."
Why the adjective? (Score:3, Insightful)
Re:Why the adjective? (Score:5, Insightful)
Re: (Score:2, Redundant)
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2, Informative)
So, an "ethical burglar" would be a locksmith, I guess. Someone who knows how to use the tools, yet refrains from
Re: (Score:2)
Re: (Score:3, Funny)
James Bond?
Re: (Score:2)
Re: (Score:2)
Why am I being an ass? Because language is important. Every time you use hacker in a sentence and mean "smart guys having fun doing nerdy stuf
Re: (Score:2)
This sounds like a troll, but going by your UID, I don't think it's meant to be. I think you're actually serious. That's frightening. The word his been misused and abused by the media in an effort to sensationalize. It's true definition in relation to computers has nothing to do with unethical behavior. So you, sir, please do not bastardize the
Re: (Score:2)
The "media" had no agenda w
Re: (Score:2)
Re: (Score:1)
Do some research before you spew shite, Sally.
http://en.wikipedia.org/wiki/Hacker [wikipedia.org]
http://en.wikipedia.org/wiki/Hacker_(computer_sec
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Insightful)
We need to come up with a new 'leet' name for programmers.
Re: (Score:3, Insightful)
Hacker = supergenius who writes virii, breaks into systems, and terrorizes the entire country from a moving tractor-trailer.
Cracker = pejorative term for white people.
Any other definitions have been obsolesced. Geez, this ranting's been going on since the late 90's, please *everyone* get over it.
Re: (Score:1)
Now even though this is slashdot, if the name of the article was "Nmap from a hacker's point of view" - I'm sure a large number of people even from here, will think of a Black Hat Hacker. Even though they know what the term 'hacker' really means, they'll assume if the word hacker is being used, it's being used in the context that 99% of the world u
Re: (Score:1)
Re: (Score:1)
Ethnical Hacker? Bleh. (Score:4, Insightful)
Re:Ethnical Hacker? Bleh. (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
It should have been called "On Nmap".
It's a scanning utility. Its command line options hardly change based on the intent of the user.
Re: (Score:1)
Re:Ethnical Hacker? Bleh. (Score:4, Insightful)
Sad, but true. You can blame this one on the media.
Re: (Score:2)
Plus, bad guys are cool.
Re: (Score:2)
Re:Ethnical Hacker? Bleh. (Score:5, Insightful)
Re: (Score:2)
Marketing at its finest.
How do you suggest overcoming the negative stereotype? "Ethical" hacking doesn't make the news because they don't do anything that's interesting to outsiders, as such, most people only know the word from negative connotations.
Re:Ethnical Hacker? Bleh. (Score:4, Funny)
Re: (Score:2)
Re: (Score:1)
in other news... (Score:5, Funny)
Re: (Score:3, Insightful)
In 2 parts hey? (Score:4, Insightful)
"Don't have time to study? Want another qualification? In just 2 easy parts, you too can be a l33t h4x0r and increase your salary by several multiples!"
More 'rich informing' alternative? (Score:4, Insightful)
If I go to http://localhost:9090/ [localhost] I get the HTML message 'Nice try...'. Nmap sais '9090/tcp open zeus-admin'.
Now it appears that it is from my bittorrent client.
Is there a more rich informed alternative that would say something like '9090/tcp open zeus-admin/transmission/appX/appY'?
It took quite some googling to find out what is was used for.
Re:More 'rich informing' alternative? (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:More 'rich informing' alternative? (Score:5, Informative)
Yes:
# netstat --numeric-hosts --listening --tcp --programs
Active Internet connections (only servers)
Proto Local Address Foreign Address State PID/Program name
tcp 0.0.0.0:svn 0.0.0.0:* LISTEN 1678/xinetd
tcp 0.0.0.0:netbios-ssn 0.0.0.0:* LISTEN 1703/smbd
tcp 0.0.0.0:sunrpc 0.0.0.0:* LISTEN 1531/portmap
tcp 0.0.0.0:http 0.0.0.0:* LISTEN 2580/lighttpd
etc.
Re: (Score:3, Informative)
those switches are for gnu only! (Score:1, Informative)
$ netstat --numeric-hosts --listening --tcp --programs
netstat: unknown option -- -
usage: netstat [-Aan] [-f address_family] [-M core] [-N system]
netstat [-bdgilmnqrstu] [-f address_family] [-M core] [-N system]
netstat [-bdn] [-I interface] [-M core] [-N system] [-w wait]
net
Re: (Score:2)
netstat -nltp
There. Still doesn't work on your system, but now you have no idea what the hell it's doing because it's no longer self-documenting. You're welcome.
Re: (Score:3, Informative)
fuser 9090/tcp, lsof -i
Re:More 'rich informing' alternative? (Score:4, Informative)
Re: (Score:3, Informative)
After TCP and/or UDP ports are discovered using one of the other scan methods, version detection interrogates those ports to determine more about what is actually running. The nmap-service-probes database contains probes for querying various services and match expressions to recognize and parse responses.
A paper documenting the workings, usage, and customization of version detection is available at http://insecure.org/nmap/vscan/ [insecure.org].
Re: (Score:1)
lsof -iTCP@localhost:9090
Hacker wannabe's more like (Score:5, Insightful)
Now Fyodor, the author of nmap. There's a hacker.
Re: (Score:2)
Yeah. Seriously.
Re: (Score:2)
Psych
In particular the -sI feature (Score:2)
Re: (Score:2)
Thanks for clearing it up!"
Both snort and nmap have developers named Fyodor, and people get them confused all the time.
Ethics of slashdotting? (Score:1, Insightful)
in case it's slashdotted... (Score:5, Funny)
$man nmap
Instead of modding me -1 Flamebait, please mod me +1 inciteful
Re: (Score:1, Redundant)
Since there's no overhead of a TCP handshake, the UDP scan is inherently less "noisy."
Yeah right.
If you don't have nmap installed, just go here - http://insecure.org/nmap/man/ [insecure.org]
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
what I gathered from the article (Score:3, Insightful)
I'm not sure you should be called a hacker after you finish that class, you should be called a hacker, when you understand the information systems, in and out. This would involve the network, and how to exploit the software. Maybe this ethical class covers this, but it seems to me, it covers only enough (or certifies) you can download some exploit and run it.
Personally I feel I have a strong grasp of the networking systems, because I've been networking for quite some time. Now it's time to learn the application stuff, and the hardware more thouroughly. Why? because it's fun
"Ethical" Hacker (Score:5, Insightful)
I think a real security professional, one that has a solid background (like in C and Assembly) in coding and networking would avoid using this term.
Re:"Ethical" Hacker (Score:4, Interesting)
-- Gray Hat Hacking, The Ethical Hacker's Handbook
(Do I have to say more?)
Re: (Score:2)
Yes, you need to say more (Score:2)
Re: (Score:2)
Screw security... (Score:3, Interesting)
Then again, in the age of DRM, all debuggers are apparently hacking tools.
Is plagiarism ethical? (Score:1)
Re: (Score:3, Informative)
Fyodor has led a great development effort over the last ten years, and part of Nmap's appeal is how such a free and "simp
Re: (Score:2)
Useless Complaining (Score:5, Insightful)
"But hacker already meant something noble! There should only be a modifier for 'evil hacking'!"
Yes, well, no one cares. No one will care. It's debatable whether or not anyone should care. When you talk to your nerd buddies, you can use "hacker" all you like in the "correct" manner and that's okay; when it's a different audience, these days, you have to make what you mean clearer than that. And that's okay. Most people just don't have time or interest to worry about the origin of the word.
In fact, I'm going out on a limb and stating that having this "ethical" modifier is a good thing for the community. Take a moment to look at the phrasing here objectively. If the masses have already decided that "hackers" are bad, and that word is locked in their minds as the dark underbelly of the Internet--terrorists whose only goal is to harm you, your family, your company, and your government--then perhaps by seeing and hearing "ethical hackers", they'll begin to understand that not only is it possible to have good hackers, but that they actually exist.
It's just a good article on the basics of hacking (Score:2)
Hacking is knowing about a lot of stuff: system administration, network engineering, programming, database administration and social skills, and the writer has done a great job introducing some of these compl
Re: (Score:2)
article availability (Score:1)