Quoting "Mansur, Warren" <[EMAIL PROTECTED]>:

> >  nmap scans hosts and reports if they are up, and what ports are open.
> 
> Just a quick question.  Does nmap rely on being able to connect to a
> particular website to download the TCP fingerprints, or are they
> included with the program when installed?  For some reason I can't seem
> to use nmap when I'm behind the corporate firewall, even on local nodes.

Nmap is completely self contained. It doesn't depend on anything other than it's own 
built-in code. If you are having trouble, there are a lot of things that can effect 
it. To have access to all of the features, you need to be logged in as root. Also, if 
you are scanning a system that is inside of the network, and all of the traffic is 
going through a switch, the switch may be effecting it. Try slowing down the speed of 
the scan, and randomizing the port order. Also, shut off ICMP ping, tcp ping, and 
"ping host before scanning". It is possible that a switch or firewall will block these 
things. If you are truing to scan a system ouside of the firewall, then it is most 
likly being blocked. 

FYI,
Kenny




---------------------------------------------------------
"There's nothing you shouldn't speak of if you've got 
 something to say, and there's no one to be scared of, 
 just get them out of your way."  -- The Alarm

*****************************************************************
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*****************************************************************

Reply via email to