Page 1087 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1087

FIGURE 15.2 Default Apache server page running on the server
               scanned in Figure 15.1

               In this example, we used nmap to scan a single system, but the tool

               also allows scanning entire networks for systems with open ports. The
               scan shown in Figure 15.3 scans across the 192.168.1.0/24 network,
               including all addresses in the range 192.168.1.0–192.168.1.255.



                             The fact that you can run a network discovery scan doesn’t


                  mean that you may or should run that scan. You should only scan
                  networks where you have explicit permission from the network
                  owner to perform security scanning. Some jurisdictions consider
                  unauthorized scanning a violation of computer abuse laws and may
                  prosecute individuals for an act as simple as running nmap on a
                  coffee shop wireless network.
   1082   1083   1084   1085   1086   1087   1088   1089   1090   1091   1092