diff --git a/CloudComputing_Lab/modules/ROOT/images/nmapscan.png b/CloudComputing_Lab/modules/ROOT/images/nmapscan.png new file mode 100644 index 0000000..b73f182 Binary files /dev/null and b/CloudComputing_Lab/modules/ROOT/images/nmapscan.png differ diff --git a/CloudComputing_Lab/modules/ROOT/pages/c.adoc b/CloudComputing_Lab/modules/ROOT/pages/c.adoc index f7763eb..caaf5d3 100644 --- a/CloudComputing_Lab/modules/ROOT/pages/c.adoc +++ b/CloudComputing_Lab/modules/ROOT/pages/c.adoc @@ -17,10 +17,11 @@ On modern operating systems, ports are numbered addresses for network traffic. D For example, normal web traffic uses Port 80, while POP3 email uses Port 110. One of the ways that a firewall works is by allowing or restricting traffic over a particular port. -Because the ports into your computer can cause a security risk, it’s critical to know which ports are open and which are blocked. +Because the ports can cause a security risk, it’s critical to know which ports are open and which are blocked. http://docs.swarmlab.io/SwarmLab-HowTos/swarmlab/docs/build/site/swarmlab_sec-intro/docs/index.html[Network Scanning] +iimage:./nmapscan.png[width=500,float="right"] Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.