if you would like to go low and test at the packet level, use: hping2 as you can generate packets with different flags set to test the actual integrity of the firewall ruleset.

goto: http://packetstoem.securify.com and search for hping2 as i dont have the official site on hand.

-D

Benjamin Scott wrote:

On Mon, 9 Jul 2001, James R. Van Zandt wrote:
> 1) Are there other sites that offer more thorough tests?

  Your best bet is to try scanners and tools like nmap, Nessus, and the like.
These are the tools the bad guys use, and they are the cutting edge.

> 2) After finishing the scan, Gibson's site displays a note claiming he has
> discovered a way to test all 65536 ports nearly instantaneously.  Any
> ideas what that is all about?

  Gibson claims to have "discovered" and "invented" a lot of things he hasn't.
His continued dubious and unjustified claims are what has put him in bad light
in the security community.  He is not stupid, and his tools actually do valid
things, they just aren't the breakthroughs he claims they are.

--
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do not |
| necessarily represent the views or policy of any other person, entity or  |
| organization.  All information is provided without warranty of any kind.  |

**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

-- 
------------------------------
    Christopher M Downs
Network Security Administrator
   Skillsoft Corporation
    [EMAIL PROTECTED]
"Micro$oft typed backwards
      spells "c:\duh /?"
------------------------------
 


Reply via email to