Nmap Announce mailing list archives

Re: Overview of NMAP


From: Max Vision <vision () whitehats com>
Date: Fri, 20 Aug 1999 22:56:44 -0700 (PDT)

Hello!

Excellent writeup - I noticed you still had the decoy question though.  I
had made a little webpage showing the decoys in action:

http://whitehats.com/nmap/

To summarize, decoy scans work perfectly!  I know it's a little old now,
but I believe the data is still valid. I didn't mention the randomized TTL
foo, but it just strengthens the anonymity.  I saw you had posted about
alternate methods of tracing decoys scans, but don't recall if they have
been addressed in the new nmap..

have fun!
Max Vision

On Fri, 20 Aug 1999, Lamont Granquist wrote:

I thought I'd post this URL again:

http://raven.genome.washington.edu/security/nmap.txt

It's a fairly comprehensive overview of what NMAP can do and how to use
it, and its more advanced than any other write-up I've seen on NMAP.  I'd
like to get feedback on it, particularly if I made any mistakes.  Also,
any useful tips to incorporate that I've missed would be appreciated...

-- 
Lamont Granquist                       lamontg () genome washington edu
Dept. of Molecular Biotechnology       (206)616-5735  fax: (206)685-7344
Box 352145 / University of Washington / Seattle, WA 98195
PGP pubkey: finger lamontg () raven genome washington edu | pgp -fka





Current thread: