On Tue, 10 Dec 2002, Renaud Deraison wrote: > On Tue, Dec 10, 2002 at 02:33:09PM -0600, [EMAIL PROTECTED] wrote: > > > > > > I recently conducted an audit on a network which had active https (443) > > and included an NMAP with the session but the port was missed. After > > doing some research, there's not very many known exploits/vulnerabilities > > for https but I'm wondering why the port which was open, missed ? Should > > I try to set some delay in the scan timing ? > > Which scan settings did you set ?
Enabled all but dangerous plugins In prefs: Included an ICMP ping UDP and RPC port scans OS fingerprint Identd info Aggressive scan All the brute force attacks Options: Did a reverse Optimized safe checks Did not scan for tarpitted host's Did select NMAP and SNMP port scan ================================================= Travis www.cyberabuse.org/crimewatch Email: [EMAIL PROTECTED] | [EMAIL PROTECTED] ================================================= /"\ \ / X ASCII Ribbon Campaign / \ Against HTML Email - [EMAIL PROTECTED]: general discussions about Nessus. * To unsubscribe, send a mail to [EMAIL PROTECTED] with "unsubscribe nessus" in the body.
