Summary
In this chapter, we discussed the basics of TCP/IP and how its different attributes can be used for port scanning techniques as well as for remote OS detection. We also discussed how to operate an Nmap tool on different operating systems and how to carry out packet capture analysis using Wireshark. Good hackers know how to crack a system, but a great network administrator knows how to fend off those attacks.
"The best defense is a good offense"
In the next chapter, we will discuss the fundamentals of SSL, why this is important for web-based applications, and what security considerations are required before we secure applications.