Penetration Testing mailing list archives

Re: nmap results


From: Fósforo <fosforo () gmail com>
Date: Sun, 11 Sep 2005 21:57:13 -0300

maybe some kind of IPS, you should also try the option --data_length
xx (where xx is an arbitrary number of bytes) - this can work to
bypass some basic tools/scripts.

t+

2005/9/10, Mohamed Abdel Kader <makster12 () hotmail com>:
Hello All,
I have recently been doing some scans and in some cases nmap returns many
ports to be open. the weird thing is that the ports are sequential.
i know many of you might be tempted to say its a honeypot but i know for a
fact its not. does anyone know why does this happen and how?

Thanks in advance.

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------





------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: