In some cases we are using nmap with settings like this: -sS -sR -P0 -T Insane -p1-65535 -f and running its instances many times. It will not only return some information on open ports, but will also allow to test any filtering rules and reliability of tested host. It works fine as long as you have the at least same bandwidth as checked host. Running to many instances on attacking host can also help you DoS it and check how much load it can hold ;-) Such setup also allows testing NIDS systems especially when nmap decoy option is being used. It can also be used in conjunction with other tools, like stick or whisker with on of its anti-ids tactics. There are also some additional interesting scan types like -sN or Xmas scan. Regards Aleksander Czarnowski AVET INS ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Mon Sep 10 2001 - 07:54:45 PDT