On Tue, 10 Dec 2002, Renaud Deraison wrote:

> On Tue, Dec 10, 2002 at 02:33:09PM -0600, [EMAIL PROTECTED] wrote:
> >
> >
> > I recently conducted an audit on a network which had active https (443)
> > and included an NMAP with the session but the port was missed.  After
> > doing some research, there's not very many known exploits/vulnerabilities
> > for https but I'm wondering why the port which was open, missed ?  Should
> > I try to set some delay in the scan timing ?
>
> Which scan settings did you set ?

Enabled all but dangerous plugins

In prefs:

Included an ICMP ping
UDP and RPC port scans
OS fingerprint
Identd info
Aggressive scan
All the brute force attacks

Options:

Did a reverse
Optimized
safe checks

Did not scan for tarpitted host's
Did select NMAP and SNMP port scan





=================================================
Travis
www.cyberabuse.org/crimewatch
Email: [EMAIL PROTECTED] | [EMAIL PROTECTED]
=================================================
/"\
\ /
 X   ASCII Ribbon Campaign
/ \  Against HTML Email

-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.

Reply via email to