While the nessus client provides options to evade NIDS, has anyone used
Nessus & been able to successfully evade stateful packet filtering
firewalls?

On a recent scan I found that Nessus was able to discover more
ports/services accessible than with a couple of nmap scans (with
different options). Whether the additional ports & services are false
positives I have not confirmed. I just have a doubt if some Nessus scans
got through the firewall (PIX).

I found this interesting since nmap is built-in to Nessus & the results
were different. 

Thanks for any insight in this regard,

Harkaran.
 
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to