On Sun, Jul 25, 2004 at 04:58:12PM +0100, mark bell wrote:
> Its possible using a command line switch (-D) to decoy your IP from an
> Nmap scan. I can't find how this is possible from within Nessus; or
> indeed find anywhere within nessus or its embedded products to do this
> or even put in a proxy to route thru. Can anyone help please?

I don't really see the point to implement that in Nessus : the plugins
perform full three-ways handshakes to the remote hosts (while a decoy IP
won't do it). So it's more than trivial to distinguish the decoys from
the IP used by nessusd.


                                -- Renaud
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to