In a message dated: Sun, 17 Feb 2002 13:15:29 EST "Kenneth E. Lussier" said:
>> 2. use nessus or something like that to then scan the live >> IP addresses for open ports. > >DON'Y USE NESSUS!! So what exactly are you trying to say here? > Nessus is for security auditing and vulnerability >assessment. Use nmap. Nmap is command-line friendly, faster, and is >more targeted to the job at hand. Nessus is extreme over-kill. Not to >mention the fact that it might just take down your router, or any >Windows boxen that get in it's way ;-) Can you explain a little more about the differences between nessus and nmap. (I actually meant nmap above, but couldn't think of the name, and nessus is all that came to mind :) >You could also do a comparison of response times to estimate relative >physical position of the system in relation to the system the program >is running on. This, of course, would be highly unreliable, but it >could be done. Ahm, yeah, and a lot more mathematically challenging than anyone would *really* be interested in tackling, I'd bet :) >This requires the router/gateway to be running snmp. Given the recent >talk of the evils of snmp, this could be a problem. Yeah, right, sure. And no one out there is running Exchange/Outlook anymore because of all the recent discussion of why *that* combination is evil :) ***************************************************************** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *****************************************************************
