The other issue is this: I find it difficult to believe that this entire subnet is on one lan. Do you have the hosts segregated in different vlans and do you have firewalls in place? Are the firewall(s) {if present} identically configured? Depending on how the firewalls (if present) react to tcp connect or syn scan attempts, you would have to come up with a proper way to do this.

All work and no play makes Jack a dull boy --- Jack Torrance, The Shining
----- Original Message ----- From: "Karl Tatgenhorst" <[EMAIL PROTECTED]>
To: "Michel Arboi" <[EMAIL PROTECTED]>
Cc: "sanjeev sinha" <[EMAIL PROTECTED]>; "Frank OSborne" <[EMAIL PROTECTED]>; <[email protected]>
Sent: Friday, May 12, 2006 4:37 PM
Subject: Re: Missing hosts in scan



  nmap -sP was not what Sanjeev was suggesting, if I read his post
right. He added at the end to "not ping them" so my interpretation of
that would be to use nmap -s[STU] (only one :-) and possibly if you feel
safe even up the timing (nmap -sS -T4 for example). Many hosts block
icmp and nmap deals better if you do a syn|tcp|udp scan. However, if
there is a common thread in what you are looking for (ie just a couple
ports) doscan is extremely fast and may work better for it (it even
outputs into a usable target list format).

Karl

On Fri, 2006-05-12 at 22:30 +0200, Michel Arboi wrote:
On Fri May 12 2006 at 22:23, sanjeev sinha wrote:

> Seems like a lot of hosts.  Why don't you do a nmap scan to see
> which hosts are up and then do a scan using nessus.

Definitely a bad idea.
nmap -sP is much less efficient than ping_host.nasl
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus


_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to