AFAIK, It means that nmap didn't or wasn't able to scan the target. Try running nmap 
manually against the target, that should give you more information.

-----Original Message-----
From: justin pratt [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, August 13, 2002 12:43 PM
To: [EMAIL PROTECTED]
Subject: nmap scan output


Hello,
We get the following output when we scanned a host :
Informational  general/tcp  Nmap only scanned 0 TCP
ports out of 65535.
Nmap did not do a UDP scan, I guess.

now, does this mean that nmap tried to connect via
ICMP(or some other means) and failed, and therefore
did not run the scan, or it ran the scan and did not
have any open ports?  this wording is very important
to my corporate security guy(legal stuff, you know in
case we go to trial, the lawyer can say "according to
this, you didn't even scan the server, therefore, you
are responsible for the attack").
If it is scanning and not showing any open ports, we
need to show that; not that nmap scanned 0 ports out
of 65535.

also, thank you all very, very much for all of your
efforts regarding the nessus tool.  it is my opinion
that no commercial scanner can touch it in regards to
usablitiy, functionality and flexibility. and besides
that, how many scanners can check servers running ssl?
none that I have seen!.
thanks,
Justin Pratt

__________________________________________________
Do You Yahoo!?
HotJobs - Search Thousands of New Jobs
http://www.hotjobs.com
-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.
-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.

Reply via email to