Page 1087 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1087
FIGURE 15.2 Default Apache server page running on the server
scanned in Figure 15.1
In this example, we used nmap to scan a single system, but the tool
also allows scanning entire networks for systems with open ports. The
scan shown in Figure 15.3 scans across the 192.168.1.0/24 network,
including all addresses in the range 192.168.1.0–192.168.1.255.
The fact that you can run a network discovery scan doesn’t
mean that you may or should run that scan. You should only scan
networks where you have explicit permission from the network
owner to perform security scanning. Some jurisdictions consider
unauthorized scanning a violation of computer abuse laws and may
prosecute individuals for an act as simple as running nmap on a
coffee shop wireless network.

