Thanks Naik for passing us the nmap cheatsheet. Pls find the below link which is interesting and can give you little depths of how nmap works or process the commands...
http://haymanezzeldin.blogspot.com/2008/03/nmap-detection-and-countermeasures.html Regards Sandeep Thakur On May 31, 10:56 am, Srinivas Naik <[email protected]> wrote: > Hey, > > Further Scans is disclosed in this attached CheatSheet. > > Regards, > Srinivas Naik > > On Sun, May 30, 2010 at 10:42 PM, N41K <[email protected]> wrote: > > Hi, > > > Shall we have discussion on NMAP, as there are many Network Security > > Experts in our community. > > > Lets list out what all can be discussed . > > > Policy compliance scan > > # nmap -vv –PA80 –PE –PS23 –sS –iL input.lst --excludefile banned.lst > > -A --osscan_limit –F –R -oA policy_check > > > Firewall Audit > > # nmap -vv –P0 –sA –iL input.lst --excludefile banned.lst –r -n -oA > > firewall > > > Regards, > > 0xN41K > > > > Nmap5_cheatsheet.pdf > 497KViewDownload -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
