On Thu Sep 21 2006 at 17:02, Nordwall, Douglas J wrote:

> I am not scanning all those ports. Certainly, I would not consider doing
> a slow scan for 65k ports. Even the polite setting in nmap would take 8
> horus. However, a few targetted ports that you suspect are open are
> handy for bypassing certain things.

If all services are running on standard ports, you can set only a
couple of ports in "Port range" and unset "Consider unscanned ports as
closed". That way, each script will connect to its default port.
Not perfect, but it should work.

> First off, I didn't mean to denegrate your experience. I have no doubt
> that yours is broader than mine in many areas. 

Every experience is valuable. I appreciate your feedback.

I thought that I could design a "universal" port scanner. I still hope
it is possible, but it is harder than expected.

> However, occasionally, we have a tough nut to crack and need to pull
> out a different tool. 

Are you sure of your figures? If I understood the situation well, if
some workstation needs to connect to this nasty machine and the user
enters a bad port, the OS will retransmit a couple of SYN packets in a
few seconds.... and the workstation will be blacklisted.

-- 
http://arboi.da.ru/                     http://ma75.blogspot.com/
PGP key ID : 0x0BBABA91 - 0x1320924F0BBABA91
Fingerprint: 1048 B09B EEAF 20AA F645  2E1A 1320 924F 0BBA BA91
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to