Nmap Development mailing list archives
Re: Excessive traffic in -PS/PA/PU ping scans
From: cybernmd <cybernmd () gmail com>
Date: Tue, 20 Mar 2007 14:00:33 -0700
Thanks for the help, Good thing I've asked, because I have wrongfully assumed that -P[SAU] argument can stand by itself when in reality it is just a modifier to an already existing scan. So nmap was doing exactly what I've asked it to do: perform default scan with SYN ping to discover hosts and of course it wasn't doing SYN ping for local hosts when it could just do ARP ping thus ignoring the port in -PS443 argument ... silly me =) So just like Eddie said what i really wanted was indeed: sudo nmap -sP -PS443 192.168.1.1 Thanks again, -Peter _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Excessive traffic in -PS/PA/PU ping scans cybernmd (Mar 20)
- Re: Excessive traffic in -PS/PA/PU ping scans Brandon Enright (Mar 20)
- Re: Excessive traffic in -PS/PA/PU ping scans Eddie Bell (Mar 20)
- Re: Excessive traffic in -PS/PA/PU ping scans Professor Messer (Mar 20)
- <Possible follow-ups>
- Re: Excessive traffic in -PS/PA/PU ping scans cybernmd (Mar 20)
- Re: Excessive traffic in -PS/PA/PU ping scans Hans Nilsson (Mar 21)