Some scripts require a certain port to be open, so if your looking for something like vulnerable web servers on a random port, I think that'll be hard to do, since a script might call for port 80 to be open, and it might not be on port 80.
If you don't know what service is running, but know you want to search for particular vulnerabilities, i would just select those vulnerabilities you are looking for.
Or do a full scan :)
On Thursday, December 5, 2002, at 01:06 PM, Alec H. Peterson wrote:
--On Thursday, December 5, 2002 13:02 -0800 Doug Nordwall <[EMAIL PROTECTED]>
wrote:
> If you want to check for a ports existance, I would just use nmap -p
> <port> <host> and wrap it in a shell script to generate a random value
> for the port
>
> using nessus for this would be overkill, unless you were planning to an
> actual vulnerability scan. if you were planning on doing a vulnerability
> scan, I might suggest generating a nessusrc file that does what you want
> for a particular port, and then randomly changing the port. of course,
> this won't actually do proper vulnerability scans, since you would have
> to also change which plugins are available.
No.� I know what port is open, so I don't want to run the nmap scan.� I
just want to run nessus against a specific port that I know is open that
can vary from invocation to invocation.
Alec
--
Alec H. Peterson -- [EMAIL PROTECTED]
Chief Technology Officer
Catbird Networks, http://www.catbird.com
- [EMAIL PROTECTED]: general discussions about Nessus. * To unsubscribe, send a mail to [EMAIL PROTECTED] with "unsubscribe nessus" in the body.
