do you find yourself constantly searching for low cost and no cost tools to add to your cybersecurity toolbox?
If you're like me, the answer is definitely yes.
The problem is, some of these tools don't deserve to be there because they either don't do what they claim to D'Oh or what they do simply isn't that important?
I'm here to show you that the end map software suite is one of those few tools that will exceed your expectations.
Throughout this course, I hope to prove to you that end map deserves a spot in your toolbox.
My name's Rob Thurston.
Thanks for coming along on this journey with me,
according to the official and Map website, and Map stands for network Mapper.
But I don't think that gives it enough credit.
It's a free and open source utility for network discovery and security auditing
and map crafts, and sends I P packets onto the wire
that helped to discover and interrogate devices on private networks and on the Internet.
And Map was originally developed in 1997 by Gordon Lion, who is best known as Theodore on the Web, and conferences like Def Con Worldwide
in this course, I refer to end map as a suite of products because it comes with some other cool tools that can be used independently.
Zen map is the graphical user interface for N. Map will go through that later.
NP Cap is in maps Packet capture library
similar to win, Peek out for Windows and Live P cap for Lennox and UNIX based systems
and Cat and Ping An End. If all work behind the scenes to help and map do its thing,
I personally consider and map the cybersecurity Swiss Army knife.
The reason why it's simple. It's one tool that could do a lot of things.
It can create a network inventory,
monitor, host and service up time.
Identify open ports Running service's and their version
determined. The operating system versions. Inspect firewalls and the rule sets and produce both searchable and report quality output.
If you haven't already, I strongly suggest you put n map into your cybersecurity toolbox.
So we've gone over what end map is and how it could be used.
So why is it so important?
The fact is, every real hacker, no matter the color of their hat, uses it
and almost every certification test on cybersecurity, especially ethical hacking and penetration testing will require some knowledge of it.
No matter what role you serve as a part of a nightie or cyber security team, you really need to know I'm Matt
and map is flexible,
meaning you can use it for a variety of purposes using a lot of techniques.
It's powerful not only because of how many things that could do, but because of how quickly and efficiently it could do them.
And it's portable.
It will run on almost any operating system and could be easily removed
without a trace,
even though, and map could do so many things getting started with it is also very easy.
Whether you prefer a command line or a gooey
and map can execute a scan of an entire network in 16 characters, you'll see this later.
Maybe the best thing about it is that it is completely free.
But this doesn't mean that it doesn't have value
finally, and Map is acclaimed and popular.
Besides winning many awards and being featured in a lot of tech journals and even research papers and map has appeared in magazines, books, movies and even a comic book.
If you want to see an example, go to YouTube and search for Trinity uses and map.
You'll see Trinity from the Matrix performing an end map scan before launching an attack,
and map is an important tool for you to learn
in this lesson. I've basically done my best to sell you on any map and on the value of this course.
I hope it worked.
We talked about what and map is what it does and why it's important.
I can't tell you how excited I am that you've chosen to take this course.
Use it in whatever way you see fit.
I hope it provides value to you and increases your knowledge, skills and abilities.
Please use those things for good.
Thanks so much for spending your valuable time with me and I'll talk to you on the next video.