Harkaran Bedi wrote:
While the nessus client provides options to evade NIDS, has anyone used Nessus & been able to successfully evade stateful packet filtering firewalls?
Not that I know of. Could be there is something though?
On a recent scan I found that Nessus was able to discover more ports/services accessible than with a couple of nmap scans (with different options). Whether the additional ports & services are false positives I have not confirmed. I just have a doubt if some Nessus scans got through the firewall (PIX).
Try to run the nmap with the same options as nessus does. You can se the exact line, by doing a 'ps' when the nmap part of the Nessus scan is running.
I found this interesting since nmap is built-in to Nessus & the results
were different.
I guess it could be some plugins in Nessus that that run, even though the nmap scan didn't repport the ports to be open.
--
Jesper S. Jensen Basisnet og Sikkerhed Uni-C - �rhus, Danmark +45 8937-6666 _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
