Security Basics mailing list archives

RE: An Nmap Command to Remember


From: "Jeremi Gosney" <Jeremi.Gosney () motricity com>
Date: Fri, 20 Feb 2009 12:33:56 -0800

I don't mean to stray off the current topic, but since this is a "Security Basics" list -- Kev, you really shouldn't be 
subscribed to these lists as 'root,' and I especially wouldn't have my server's root account tied to Windows Live Mail. 
Just a thought.
 

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Root - 
VulnerabilityAssessment
Sent: Thursday, February 19, 2009 11:51 PM
To: Daniel Miessler; security-basics () securityfocus com
Subject: Re: An Nmap Command to Remember

Daniel,

The only thing I have issues with this is a full UDP scan can take 18 hours plus to finish, whereas a syn scan can be 
done in minutes, not really an effective use of the tool possibly

Just a thought

Rgds

Kev

--------------------------------------------------
From: "Daniel Miessler" <daniel () dmiessler com>
Sent: Thursday, February 19, 2009 8:21 PM
To: <security-basics () securityfocus com>
Subject: An Nmap Command to Remember

This nmap command will verbosely scan all 65,535 ports, both tcp and 
udp, using service probing and operating system detection, and output 
the results to nmap, greppable, and xml formats.

nmap -vv -p0- -sSUV -O -oA $outputfile $target

--
Daniel R. Miessler
W: http://dmiessler.com/
E: daniel () dmiessler com
P: 510 585 9143
G: 0xD4A8FFF6




No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.0/1959 - Release Date: 02/18/09 
20:55:00


Current thread: