Nmap Announce mailing list archives
Re: Safe scanning
From: "Jonathan Day" <jd9812 () my-Deja com>
Date: Tue, 21 Mar 2000 16:44:47 -0800
On Tue, 21 Mar 2000 21:33:03 Teolicy wrote:
#include <stdthanks.h> // to Fyodor the man
In which case, that leaves me with: #include <non/stdthanks.h> <snip>
Alek O.K.'s recent post (subj: "Setting nmap host_timeout too low may cause DoS on inetd (?)") kinda spooked me.
<snip> Teolicy's question reminded me of something I have been meaning to ask, for some time. Is there any way of striping an nmap scan across a range of hosts? (In other words, instead of sending a whole load of scans to one host, then moving on to the next, run the first scan on each in turn, followed by the second, etc.) I really should dig through the code more thoroughly before asking such dumb questions, as there probably -is- a way to do that. It just seems that it would solve the DoS problem, at least for wide-area scans. It might also duck under more primitive threshold-based IDS systems. (IMHO, if an IDS system can't spot a striped scan, it's just wasting resources.) --== Sent via Deja.com http://www.deja.com/ ==-- Share what you know. Learn what you don't.
Current thread:
- Safe scanning Teolicy (Mar 21)
- Re: Safe scanning andy lowton (Mar 21)
- Re: Safe scanning Bruce Fraser (Mar 21)
- <Possible follow-ups>
- Re: Safe scanning Jonathan Day (Mar 21)
- Re: Safe scanning Alek O. Komarnitsky (Mar 21)
- Re: Safe scanning James D. Watson (Mar 21)