I've been working on getting my CEH and I took a break from one of the guides to concentrate on some tool related books. So of course I picked up the Nm@p guide written by the creator of the program (filter won't let me type it out). First, he goes into crazy detail about Nm@p and all the different types of scans/uses for it. I'm on Chapter 5 and really wish I had picked up this book earlier (had it for about a month or two). Great book that I think everyone should read!
The reason I am posting this is because of something I did today. Reading through the book I decided to run some scans on my network. Everything looked good until I found a strange port open on my linux box. This port was 1337 and I got scared, especially since it was showing a program called waste running on this port. Googled the software and found out it is some form of private p2p. Then I got really worried because I assumed I got hacked, I have a decent pipe (20/20) and it might makes sense that someone might have gotten in and used it. So I run another scan with Nm@p, this time using the -A flag to get version information on the ports. Turns out it was software I installed (uShare) to view files on my xbox (dead

. Disaster averted thanks to Nm@p!