Last night I downloaded the NMAP for Win32 and it seems to work pretty
well.
I tried to enable NTOP to use it by adding the -E parameter, but it gets
very upset
when I try to tell it to external apps with the "-E" parameter.
"C:\Program Files\ntop-Win32\ntop.exe" /c -c -S 1 -i 7 -r 180 -m
192.168.0.0/255.255.0.0
Above is my original working command line, I tried this below and it
failed:
"C:\Program Files\ntop-Win32\ntop.exe" /c -c -S 1 -E -i 7 -r 180 -m
192.168.0.0/255.255.0.0
When I open any MS-DOS window I am able to use the command line NMAP
just fine on Win2K.
Here is the output from the help on NMAP running from the MSDOS window
on Win2K:
----------------- BEGIN PASTE -------------------------------
C:\>nmap -?
nmap: unrecognized option `-?'
Nmap V. 3.00 Usage: nmap [Scan Type(s)] [Options] <host or net list>
Some Common Scan Types ('*' options require root privileges)
* -sS TCP SYN stealth port scan (default if privileged (root))
-sT TCP connect() port scan (default for unprivileged users)
* -sU UDP port scan
-sP ping scan (Find any reachable machines)
* -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only)
-sR/-I RPC/Identd scan (use with other scan types)
Some Common Options (none are required, most can be combined):
* -O Use TCP/IP fingerprinting to guess remote operating system
-p <range> ports to scan. Example range: '1-1024,1080,6666,31337'
-F Only scans ports listed in nmap-services
-v Verbose. Its use is recommended. Use twice for greater effect.
-P0 Don't ping hosts (needed to scan www.microsoft.com and others)
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
-T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing
policy
-n/-R Never do DNS resolution/Always resolve [default: sometimes
resolve]
-oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to
<logfile>
-iL <inputfile> Get targets from file; Use '-' for stdin
* -S <your_IP>/-e <devicename> Specify source address or network
interface
--interactive Go into interactive mode (then press h for help)
--win_help Windows-specific features
Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*'
SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES
C:\>
------------ END PASTE -----------------
Dave
_______________________________________________
Ntop mailing list
[EMAIL PROTECTED]
http://lists.ntop.org/mailman/listinfo/ntop