Goodreads helps you keep track of books you want to read.
Start by marking “Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning” as Want to Read:
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Enlarge cover
Rate this book
Clear rating
Open Preview

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

4.31  ·  Rating details ·  331 ratings  ·  13 reviews
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking profe ...more
Paperback, 468 pages
Published January 1st 2009 by Nmap Project
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Nmap Network Scanning, please sign up.

Be the first to ask a question about Nmap Network Scanning

Community Reviews

Showing 1-30
4.31  · 
Rating details
 ·  331 ratings  ·  13 reviews

More filters
Sort order
Oct 29, 2012 rated it it was amazing
Shelves: hacking, penttest
the BEST book for nmap;
must read for all pen-testers, script kiddies, security professionals, and hackers.
I though I already know nmap very; but after this book I know much more details about it

a must read!
Jan 05, 2017 rated it it was amazing
Shelves: cs
This is the kind of book that was lent to a friend by a friend of a friend.. and has passed through many hacker hands. But now, for a moment, it sits of your desk, dog-eared and mangled, bookmarked and with esoteric notes scrawled all over, on its way to be lent to yet another growing hacker.

So yes, you need to do a few things: buy this book to support Lyon and the NMAP project. Read this book to learn how to do proper network reconnaissance. Pass this book to someone who is willing to listen a
John Nye
Aug 06, 2017 rated it it was amazing
Shelves: infosec
If you, like me, ever use the NMAP (network mapper) tool for assessments, discovery, or just for fun this book should be in your library (or at least on your Kindle). To be completely honest this is not a book I have read from front-to-back, while you could, I use it as a very worn reference. Whenever I use NMAP I pull out this book (ebook) and look for at least one new switch or script to use and have never been disappointed to date.

Besides, if you do internal penetration tests it is critical
Gilberto Soares
Oct 19, 2018 rated it it was amazing
Muito mais que um scanner de portas, a principal função e muito bem explorada nesse livro é o mapeamento de vulnerabilidades internas e externas
Feb 23, 2014 rated it it was amazing
Shelves: eu-traduzi
Sou o tradutor deste livro para o português brasileiro. Durante o trabalho de tradução, estive em constante contato com o autor, particularmente para dirimir dúvidas e mesmo para sugerir correções, quando encontrava equívocos na obra original, o que me deixou muitíssimo feliz, pois o Fyodor é bastante acessível be muito simpático.

O texto, em si, deixa muito a desejar quanto ao aspecto literário, mas a obra cumpre bem o seu papel de guia de uso da ferramenta de guia exame de redes.

No Brasil, o tí
John Dideriksen
Mar 22, 2016 rated it it was amazing
If you use nmap everyday or just occasionally, you should read this book. Fyoodor is a pretty clever guy! I know some chapters of this book is publicly available on But the book is still worth every cent you pay. Every scan is thoroughly explained, mostly with diagrams, and there's a ton of tips, tricks and tweaks.
Jan 25, 2014 rated it it was amazing
This is the definitive guide to using nmap. Years later it still holds up as the most valuable resource for using this versatile tool. The author obviously has a strong understanding of TCP/IP, and it is reflected in his explanations and how nmap takes advantage of the protocol to glean useful information from scanned targets.

If you want to learn how to use nmap, this is the book you need.
Ahmed Alkatheeri
Jun 19, 2015 rated it really liked it
It's big official resource from Nmap project to their users, it has very details of commands used in Nmap with examples, I you may learn some information about packets and their kinds and how they send to hosts, and how Firewall deal with them.
Jan 20, 2012 rated it really liked it
Lots of useful information about how to plan, prepare, optimize and launch a useful portscan. Obviously since the title carries the name of nmap this book is mainly about how to use that program efficiently but you can also find good information about portscanning in general.
Mark Hillick
Apr 02, 2016 rated it it was amazing
Definitive guide to nmap and its inner-workings, amazing book.

The detail and explanations of TCP/IP are superb.
Jan 29, 2016 rated it really liked it
An A-Z manual of Nmap. Everything that you need to know and could possibly know about Nmap is in there.
Aug 25, 2013 rated it really liked it
This is the book every open source project wishes they could have. Basic how to, FAQ, and development info.
Oct 17, 2013 rated it it was amazing
GREAT BOOK! Very informative and I still pick this book up from time to time to read about stuff I may have forgotten.
Mahmmad Chaudhari
rated it liked it
Apr 25, 2016
rated it liked it
Feb 07, 2017
Xavier Alexandre
rated it it was amazing
Mar 23, 2014
Abdullmalek Saket
rated it it was amazing
Oct 18, 2018
Mindaugas N.
rated it really liked it
Apr 08, 2015
John S. Hood
rated it it was amazing
Jan 10, 2018
Justas Cepenas
rated it liked it
Jan 01, 2019
rated it really liked it
Jun 13, 2016
Kelly Doyle
rated it really liked it
Nov 29, 2015
rated it really liked it
Aug 05, 2017
Diogo Monica
rated it it was amazing
Apr 07, 2018
rated it it was amazing
May 19, 2017
Zachary Henson
rated it it was amazing
Apr 17, 2017
rated it it was amazing
Apr 11, 2017
Ahmed Ben Fatma
rated it really liked it
Jan 31, 2015
rated it it was amazing
Nov 24, 2012
rated it liked it
May 26, 2014
« previous 1 3 4 5 6 7 8 9 10 11 12 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Metasploit: The Penetration Tester's Guide
  • Network Warrior
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • File System Forensic Analysis
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
  • Reversing: Secrets of Reverse Engineering
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Stealing the Network: How to Own a Continent
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Stealing the Network: How to Own an Identity
  • Red Team Field Manual (RTFM)
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
“Fixing a hole is far more effective than trying to hide it. That approach is also less stressful than constantly worrying that attackers may find the vulnerabilities.” 1 likes
More quotes…