Penetration Testing mailing list archives

Re: faster scans? (nmap)


From: "wirepair" <wirepair () roguemail net>
Date: Mon, 03 Jun 2002 10:17:37 -0700

Thanks for the responses:
- The -PT option is great, if you know the host is listening on that specific port, otherwise it's kinda of useless. Remember a firewall is most likely sitting infront intercepting these packets, if the IP does not exist the firewalls going to drop (and not send a rst) the packet. This gives us no information to work from heh. - The -T Insane (5) -T Aggressive (4) Options don't exactly help either, Insane gives up after 75 seconds if no response is seen, (keep in mind a machine that may have a service listening on port 23592, this would never get picked up, nmap would quit after 75 seconds of scanning [unless it hit this by random]) So that rules this option out. Aggressive timed out in 300 seconds same deal as before with Insane. - strobe didn't seem to work any faster in this case, I tried that as well.
*sigh* people need to not disable icmp echo reply :)
Any other suggestions? (Thanks to all of you who did respond)
-wire
_____________________________
For the best comics, toys, movies, and more,
please visit <http://www.tfaw.com/?qt=wmf>


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: