Using the master tool of network mapping – Nmap
First, let's start by understanding the importance of network mapping tools.
Cyber attacks are normally composed of five phases in which network mapping is the core of the second phase, known as scanning. To better understand this, let's take a quick look at those five phases of a cyber attack.
Phases of a cyber attack
These phases were not created as a set of best practices that attackers need to follow; instead, they were designed by cybersecurity professionals to categorize the most common steps that an attacker will be most likely to follow when performing a cyber attack.
Let me explain those stages by telling the story of an attacker that wants to gather some data from a fictional company called Bravix.
Phase 1 – Reconnaissance
First, the attacker needs to acquire some basic information about Bravix, such as web page name, type of security, basic structure, web services in use, and so on...