Ankit Kumar
Berry9 It Services
•Host discovery
•Port scanning
•Version detecting
•OS detection
•Scriptable interaction with the target
•Runs on Linux, Windows, Mac OS X and other smaller operating systems
•GUI options:
•Zenmap
•XNMap
•NmapFE
•DNS lookup- matches name with IP
•NMap pings the remote target with 0 byte packets to each port
•If packets are not received back, port is open
•If packets are received, port is closed
•Sends different packets with different timing to determine filtered/unfiltered, version, etc.
•Firewalls can interfere with this process
•When run through command prompt or terminal, entry fields are:
•Program
•Constraints on run
•Target
•Ex. > nmap –sS scanme.nmap.org
•Ex. > nmap -Db ftp.pathetic.net secret.pathetic.net
•Can be used for hacking- to discover vulnerable ports
•System admins can use it to check that systems meet security standards
•Unauthorized use of Nmap on a system could be illegal. Make sure you have permission before using this tool
•https://nmap.org/download.html
•Perform ping scans and port scans using any IP range.
•Use a text file to extract addresses from.
•Scan any port range from a built-in list or any given range.
•View responses from connected hosts.
•Modify the port list and port descriptions using the built in editor.
•Merge port lists to build new ones.
•Connect to any discovered open port using user-specified "helper" applications.
•Assign a custom helper application to any port.
•Save the scan list to a text file.
•Transmission speed control.
•User friendly interface.
•Comprehensive help file.
• Fast network scanner, Automatic network discovery
• TCP/IP scanner, Wake on lan functionality
• Multi-threaded Scanner, Port scanner
• Low surcharge on the network, VNC Client
• Telnet Client, SNMP scanner
• Simultaneous subnetworks scans without human intervention
• Realtime detection of any connected equipment
• Supervision of any equipment (router, server, firewall...)
• Supervision of any network service (smtp, http, pop, ...)
• Automatic detection of known operatic system (brand and version), you can also add any unknown equipment to the database
• The graphical interface can connect one or more scanner agents (local or remote)
• Scanner agents could be deployed all over the network to scan through any type of equipment (router, NAT, etc)
• Network Intruders detection (in intruders detection mode, all new equipments blacklisted)
• Complete network tree can be saved in a XML file.
• Privileged account is not required
•http://autoscan-network.com/download/
•Splunk is an tool which collects data (any data!) of any amount, any location and any source. Since there is no upfront schema defined for Splunk you can really import any data you like. This is as Splunk tries to tell us the strength of their product. Splunk indexes all the data in receives on so called indexers and via a search-head you are able to search or view the data via a Dashboard. This can be done via basis search strings or via advanced graphs and/or apps.
•Download Link:- http://www.splunk.com/en_u/download.html?r=header
uChange management and control