While the nessus client provides options to evade NIDS, has anyone used Nessus & been able to successfully evade stateful packet filtering firewalls?
On a recent scan I found that Nessus was able to discover more ports/services accessible than with a couple of nmap scans (with different options). Whether the additional ports & services are false positives I have not confirmed. I just have a doubt if some Nessus scans got through the firewall (PIX). I found this interesting since nmap is built-in to Nessus & the results were different. Thanks for any insight in this regard, Harkaran. _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
