Nmap Announce mailing list archives
Re: Examples of legit nmap usage?
From: Joel Eriksson <jen () ettnet se>
Date: Sat, 18 Sep 1999 12:07:29 +0200
On Fri, Sep 17, 1999 at 05:25:11PM -0400, Bennett Todd wrote:
Perhaps I overstate, it's in my nature I'll admit. But that's the kind of horror you need to fear when casting nmap far and wide. There are boxes out there that will crash when nmap with the right settings casts its gaze their way, and the users of those boxes are _never_ amused when it happens.
In other words, let's wait until some script kiddie scans the network and let him take the blame instead. :-) Well, I understand your point of view, but boxes that vulnerable shouldn't be connected to any network, or get fixed. When _you_ were the one scanning, at least you know what happened..
-Bennett
-- Joel Eriksson jen () ettnet se
Current thread:
- Examples of legit nmap usage? Foust, Adam G. (Sep 17)
- Re: Examples of legit nmap usage? Bennett Todd (Sep 17)
- Re: Examples of legit nmap usage? David Carmean (Sep 17)
- Re: Examples of legit nmap usage? Joel Eriksson (Sep 18)
- Re: Examples of legit nmap usage? Bennett Todd (Sep 20)
- Re: Examples of legit nmap usage? Andreas Kostyrka (Sep 20)
- Re: Examples of legit nmap usage? Bennett Todd (Sep 20)
- Re: Examples of legit nmap usage? Bennett Todd (Sep 17)
- Re: Examples of legit nmap usage? Lamont Granquist (Sep 20)
- Re: Examples of legit nmap usage? Max Vision (Sep 21)
- IP fragment overwriting bug exploitation Lamont Granquist (Sep 21)
- reverse frag scanning patch Lamont Granquist (Sep 22)