CyberWire Daily - NMAP (noun) [Word Notes]

Episode Date: August 11, 2020

A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon..., a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Thank you. Learn more at zscaler.com slash security. Spelled N as in Neo, M as in Morpheus, A as in Apocalypse, and P as in Persephone. Definition. Nmap is a network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names, and versions. Example sentence, Trinity fired up Nmap on her MacBook to see what other devices were
Starting point is 00:02:18 listening on the city's electrical grid network. Origin and history. city's electrical grid network. Origin and History. Written and maintained by Gordon Lyon, aka Theodore, Nmap is a free and open-source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades. In the Matrix Reloaded movie that debuted in 2003, Trinity, played by Carrie Ann Moss, needed to hack the city power grid. She runs Nmap version 2.54 beta 2.5, searching for a vulnerable host on the target network. Nmap discovers an unpatched Secure So socket shell server, or SSH server. Trinity then compromised that server by running a real-world piece of exploit code that was invented in 2001 against it.
Starting point is 00:03:16 She used Nmap to discover a vulnerable host and then compromised that host with exploit code that she had in her hacker toolkit. And now a message from Black Cloak. Did you know the easiest way for cyber criminals to bypass your company's defenses is by targeting your executives and their families at home? Black Cloak's award-winning digital executive protection platform secures their personal devices,
Starting point is 00:03:56 home networks, and connected lives. Because when executives are compromised at home, your company is at risk. In fact, over one-third of new members discover they've already been breached. Protect your executives are compromised at home, your company is at risk. In fact, over one-third of new members discover they've already been breached. Protect your executives and their families 24-7, 365, with Black Cloak. Learn more at blackcloak.io.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.