Harkaran Bedi wrote:

While the nessus client provides options to evade NIDS, has anyone used
Nessus & been able to successfully evade stateful packet filtering
firewalls?

Not that I know of. Could be there is something though?

On a recent scan I found that Nessus was able to discover more
ports/services accessible than with a couple of nmap scans (with
different options). Whether the additional ports & services are false
positives I have not confirmed. I just have a doubt if some Nessus scans
got through the firewall (PIX).

Try to run the nmap with the same options as nessus does. You can se the exact line, by doing a 'ps' when the nmap part of the Nessus scan is running.


I found this interesting since nmap is built-in to Nessus & the results
were different.

I guess it could be some plugins in Nessus that that run, even though the nmap scan didn't repport the ports to be open.



--

  Jesper S. Jensen
Basisnet og Sikkerhed
Uni-C - �rhus, Danmark
   +45 8937-6666
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to