nanog mailing list archives

RE: Port scanning legal


From: Dan Hollis <goemon () sasami anime net>
Date: Tue, 19 Dec 2000 12:26:16 -0800 (PST)


On Tue, 19 Dec 2000, Roeland Meyer wrote:
I've pinged IP addrs that I later found out were MIL addrs. Nothing
happened. Duh!

Cool. Care to portscan a couple .mil /16's and get back to me?

There are a LOT of IP addrs that aren't in the DNS. How is one to know?

Hmm. whois perhaps?

connecting to whois.arin.net [192.149.252.21:43] ...
HQ 7th Signal Command (NETBLK-ARMY-C) NETBLK-ARMY-C198.49.183.0 - 198.49.192.0
INFORMATION SYSTEMS COMMAND (NET-NSMCNET) NSMCNET198.49.185.0 - 198.49.185.255

Naah, that makes too much sense. Can't have that now can we.

I don't know about you, but I flunked telepathy in High School and did
worse in clarvoyance.

One might argue its not the only thing you flunked.

Could it be, that is why ping and traceroute were invented?

ping and traceroute are a far cry from nmap. I dont recall ping and
traceroute having a 'decoy host' option, or 'stealth' option for example,
nor any option to scan entire nets and ranges of ports.

The argument against port-scanning applies equally well to just about every
diagnostic tool we use.

Only by the most convoluted thinking.

-Dan




Current thread: