On Thu Sep 21 2006 at 17:02, Nordwall, Douglas J wrote: > I am not scanning all those ports. Certainly, I would not consider doing > a slow scan for 65k ports. Even the polite setting in nmap would take 8 > horus. However, a few targetted ports that you suspect are open are > handy for bypassing certain things.
If all services are running on standard ports, you can set only a couple of ports in "Port range" and unset "Consider unscanned ports as closed". That way, each script will connect to its default port. Not perfect, but it should work. > First off, I didn't mean to denegrate your experience. I have no doubt > that yours is broader than mine in many areas. Every experience is valuable. I appreciate your feedback. I thought that I could design a "universal" port scanner. I still hope it is possible, but it is harder than expected. > However, occasionally, we have a tough nut to crack and need to pull > out a different tool. Are you sure of your figures? If I understood the situation well, if some workstation needs to connect to this nasty machine and the user enters a bad port, the OS will retransmit a couple of SYN packets in a few seconds.... and the workstation will be blacklisted. -- http://arboi.da.ru/ http://ma75.blogspot.com/ PGP key ID : 0x0BBABA91 - 0x1320924F0BBABA91 Fingerprint: 1048 B09B EEAF 20AA F645 2E1A 1320 924F 0BBA BA91 _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
