Nmap Announce mailing list archives
Re: Overview of NMAP
From: Max Vision <vision () whitehats com>
Date: Fri, 20 Aug 1999 22:56:44 -0700 (PDT)
Hello! Excellent writeup - I noticed you still had the decoy question though. I had made a little webpage showing the decoys in action: http://whitehats.com/nmap/ To summarize, decoy scans work perfectly! I know it's a little old now, but I believe the data is still valid. I didn't mention the randomized TTL foo, but it just strengthens the anonymity. I saw you had posted about alternate methods of tracing decoys scans, but don't recall if they have been addressed in the new nmap.. have fun! Max Vision On Fri, 20 Aug 1999, Lamont Granquist wrote:
I thought I'd post this URL again: http://raven.genome.washington.edu/security/nmap.txt It's a fairly comprehensive overview of what NMAP can do and how to use it, and its more advanced than any other write-up I've seen on NMAP. I'd like to get feedback on it, particularly if I made any mistakes. Also, any useful tips to incorporate that I've missed would be appreciated... -- Lamont Granquist lamontg () genome washington edu Dept. of Molecular Biotechnology (206)616-5735 fax: (206)685-7344 Box 352145 / University of Washington / Seattle, WA 98195 PGP pubkey: finger lamontg () raven genome washington edu | pgp -fka
Current thread:
- Potential source of randomness on the systems that do not have one built in. Stanislav N. Vardomskiy (Jul 29)
- Overview of NMAP Lamont Granquist (Aug 20)
- Re: Overview of NMAP Max Vision (Aug 20)
- Overview of NMAP Lamont Granquist (Aug 20)