Hi,

No doubt it is a great tool in its way. If it cannot crash the router, it
doesn't mean that it is a fake tool. It is designed and featured in such a
way that no tool can be comparable with it in terms of Port scanning and
other related network enumeration and thats the reason why NMap is well know
as a Swiss army knife.

Regards,
Ravi Gopal


On Wed, Jun 2, 2010 at 9:24 AM, nittbdb <[email protected]> wrote:

> but in my opinion this tool is not gr8 tool its fake tool?
>
> i have been eorking on this tool forr last 4 days....but itsnot
> helpful for me.......
>
> actually i m testing router
>
> my setup is::
>
>
> host a--------------------------------router(contains
> Firewall,ips,anti-X)----------------------------host b
>
> I want to crash this router...........please give your valuable
> suggestions................
>
> i wand to find more and more bugs...........
>
>
>
> IMPORTANT QUESTION...
>
> If i know that the some host b port is open...then how to attack from
> host A to host B throgh the router.....
>
>
>
>
> On Jun 2, 8:43 am, nittbdb <[email protected]> wrote:
> > i want o no how to send the spoofed mac address from nmap
> >
> > is it possibe?
> >
> > If not give me some other solution to send the spoofed mac address..
> > is there any other tool?
> >
> > On Jun 1, 8:59 pm, Ravi Gopal <[email protected]> wrote:
> >
> >
> >
> > > #1:*For beginners to start with here is the basics of nmap*:
> >
> > >             ===========================
> > > Syntax:  nmap <Type of Scan> <options> Target
> > >             ===========================
> >
> > > *<Scan types>*
> > > *Types of Scan** **Option*
> > > SYN scan -sS
> > > UDP scan -sU
> > > TCP Scan -sT
> > > ACK scan -sA
> > > FIN scan -sF
> > > Null scan -sN
> > > XMas Scan -sX
> >
> > > *Note:* FIN,NULL and XMas scans are called as stealth scans.
> > > There are other types of scans also like icmp Echo, ping scan, Idle
> scan
> > > etc. Please refer to NMAP documentation/help for more types.
> >
> > > *<Options>*
> > > -p<port range> --> port range can be single port or multiple ports
> separated
> > > by commas or range of ports (EX: -p23 OR
> > >                                         -p23,25,110,3389 OR -p1-65535)
> > > -sV Version         --> displays the version of the service running
> (Ex: IIS
> > > 6.0)'
> > > -O  Operating System --> OS fingerprinting
> > > -T(0-5) Timing option --> ideally -T4 is preferable for faster scan
> with
> > > optimum performance
> > > -PN host discovery skip --> This option is very useful when you are
> sure
> > > that target is up/alive
> >
> > > *Target:*
> > > Target can be either IP address or netmask or Website
> >
> > > Here are few Exaples:
> >
> > > *nmap -sS -O -p1-65535 192.168.0.34*
> > > *nmap -sS -sV -p23,80-110,3389 192.168.0.34*
> > > *nmap -sS -sV -p23 192.168.0-5.1-254*
> >
> > > *<< My Observations:*
> > > *Nmap scan on Linux operating system is faster than the scan on windows
> > > operating systems >>*
> >
> > > Regards,
> > > Ravi Gopal
> >
> > > On Tue, Jun 1, 2010 at 2:37 AM, Sandeep Thakur <[email protected]>
> wrote:
> > > > Thanks Naik for passing us the nmap cheatsheet. Pls find the below
> > > > link which is interesting and can give you little depths of how nmap
> > > > works or process the commands...
> >
> > > >
> http://haymanezzeldin.blogspot.com/2008/03/nmap-detection-and-counter...
> >
> > > > Regards
> > > > Sandeep Thakur
> >
> > > > On May 31, 10:56 am, Srinivas Naik <[email protected]> wrote:
> > > > > Hey,
> >
> > > > > Further Scans is disclosed in this attached CheatSheet.
> >
> > > > > Regards,
> > > > > Srinivas Naik
> >
> > > > > On Sun, May 30, 2010 at 10:42 PM, N41K <[email protected]>
> wrote:
> > > > > > Hi,
> >
> > > > > >  Shall we have discussion on NMAP, as there are many Network
> Security
> > > > > > Experts in our community.
> >
> > > > > > Lets list out what all can be discussed .
> >
> > > > > > Policy compliance scan
> > > > > > # nmap -vv –PA80 –PE –PS23 –sS –iL input.lst --excludefile
> banned.lst
> > > > > > -A --osscan_limit –F –R -oA policy_check
> >
> > > > > > Firewall Audit
> > > > > > # nmap -vv –P0 –sA –iL input.lst --excludefile banned.lst –r -n
> -oA
> > > > > > firewall
> >
> > > > > > Regards,
> > > > > > 0xN41K
> >
> > > > >  Nmap5_cheatsheet.pdf
> > > > > 497KViewDownload
> >
> > > > --
> > > > You received this message because you are subscribed to the Google
> Groups
> > > > "nforceit" group.
> > > > To post to this group, send an email to [email protected].
> > > > To unsubscribe from this group, send email to
> > > > [email protected]<nforceit%[email protected]>
> <nforceit%[email protected]­om>
> > > > .
> > > > For more options, visit this group at
> > > >http://groups.google.com/group/nforceit?hl=en-GB.-Hide quoted text -
> >
> > > - Show quoted text -- Hide quoted text -
> >
> > - Show quoted text -
>
> --
> You received this message because you are subscribed to the Google Groups
> "nforceit" group.
> To post to this group, send an email to [email protected].
> To unsubscribe from this group, send email to
> [email protected]<nforceit%[email protected]>
> .
> For more options, visit this group at
> http://groups.google.com/group/nforceit?hl=en-GB.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to