-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 What is the purpose of both Queso and Nmap OS detection?
Regarding the "Hidden OS detection" option in Nessus (--osscan_guess), this seems particularly useful for what I'm trying to accomplish (audit only information, see previous e-mail). However, --osscan_limit (also listed in Fyodor's nmap e-mail regarding the guess feature) does not seem to be an option I can add to nmap via the nessus GUI. Also, there is an option for an "output" nmap file in the client; however, this file never seems to get churned out OR it gets deleted when nessus finishes. There is also no way to specify the Nmap format *type*. Right now, believe it or not, I've actually got nmap frontending nessus. I use nmap to do a quick sweep of the network, output to XML, create a nice little HTML top level web page, then fork a nessus vulnerability scan on the hosts that respond to ping. I'd rather chop out the two step process, but I don't have as much flexibility executing nmap from nessus as I would like *and* the "output" file from nmap won't materialize. Thanks, - --Randy -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBPIVHwyGJH83OL4I4EQIQuQCdGg9YxKblIrgekorjvDNFEAz16vYAoN80 GTnXSZjF+OaSAfu2RWbwKEc0 =+fC1 -----END PGP SIGNATURE-----
PGPexch.rtf.asc
Description: Binary data
