-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

What is the purpose of both Queso and Nmap OS detection?

Regarding the "Hidden OS detection" option in Nessus
(--osscan_guess), this seems particularly useful for what I'm trying
to accomplish (audit only information, see previous e-mail). 
However, --osscan_limit (also listed in Fyodor's nmap e-mail
regarding the guess feature) does not seem to be an option I can add
to nmap via the nessus GUI.

Also, there is an option for an "output" nmap file in the client;
however, this file never seems to get churned out OR it gets deleted
when nessus finishes.  There is also no way to specify the Nmap
format *type*.

Right now, believe it or not, I've actually got nmap frontending
nessus.  I use nmap to do a quick sweep of the network, output to
XML, create a nice little HTML top level web page, then fork a nessus
vulnerability scan on the hosts that respond to ping.  I'd rather
chop out the two step process, but I don't have as much flexibility
executing nmap from nessus as I would like *and* the "output" file
from nmap won't materialize.



Thanks,



- --Randy


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPIVHwyGJH83OL4I4EQIQuQCdGg9YxKblIrgekorjvDNFEAz16vYAoN80
GTnXSZjF+OaSAfu2RWbwKEc0
=+fC1
-----END PGP SIGNATURE-----


Attachment: PGPexch.rtf.asc
Description: Binary data

Reply via email to