I don't see any tool like that in my tools folder. I know there is the
PINGER tool, which can be used to build host tables.



-----Original Message-----
From: MacFadden, David (ISS Atlanta) [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 05, 2003 7:18 AM
To: Evans, Mark (Contractor); Gonzalez, Jesus M; [EMAIL PROTECTED]
Subject: RE: [ISSForum] ISS - Stealth - IP Sweep




Hello Mark & Jesus,

Internet Scanner has a stand-alone utility: "C:\Program
Files\ISS\Scanner6\Tools\checker.exe". Checker will:

1. scan a range of IP's and log the results in a log file
2. does not increment the device count in the license
3. will save the list of IP's that it found to a designated file which can
then be used for a scan session.  


Thank you,
=================================================
Dave Mac Fadden
Technical Support Engineer

Internet Security Systems: http://www.iss.net
Phone:  (404) 236-2700  or  (888) 447-4861
Technical Support email: [EMAIL PROTECTED] 
-----Original Message-----
From: Evans, Mark (Contractor) [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 04, 2003 10:57 AM
To: 'Gonzalez, Jesus M'; '[EMAIL PROTECTED]'
Subject: RE: [ISSForum] ISS - Stealth - IP Sweep


Why would you need it to be "stealth" to find machines on the network? IS
performs ICMP echo request as the basic discovery tool.
You can tailor a policy or use the inventory policy that comes with IS and
look for services that are turned on to help determine what device it is
that is responding.
Perhaps using NMAP and building a host table would better suit your needs.

regards,
Mark


 -----Original Message-----
From: Gonzalez, Jesus M
[mailto:[EMAIL PROTECTED]]
Sent: Monday, February 03, 2003 4:06 PM
To: '[EMAIL PROTECTED]'
Subject: [ISSForum] ISS - Stealth - IP Sweep


Can ISS run a stealth IP sweep to find the items mentioned below.  If so,
how is it done?  ( I'm not referring to the stealth port scan in the
vulnerability db)


I need to determine what devices (IP's) are on the network before scanning
them.  Can ISS do this? 
 1.  If so, how and what information is echoed back to the scanning machine?

 2.  If so, is it possible to distinguish the responding devices to be
firewalls, routers, or switches? 
Thank you, 
Marc 
_______________________________________________
ISSForum mailing list
[EMAIL PROTECTED]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to 
https://atla-mm1.iss.net/mailman/listinfo

Reply via email to