AFAIK, It means that nmap didn't or wasn't able to scan the target. Try running nmap manually against the target, that should give you more information.
-----Original Message----- From: justin pratt [mailto:[EMAIL PROTECTED]] Sent: Tuesday, August 13, 2002 12:43 PM To: [EMAIL PROTECTED] Subject: nmap scan output Hello, We get the following output when we scanned a host : Informational general/tcp Nmap only scanned 0 TCP ports out of 65535. Nmap did not do a UDP scan, I guess. now, does this mean that nmap tried to connect via ICMP(or some other means) and failed, and therefore did not run the scan, or it ran the scan and did not have any open ports? this wording is very important to my corporate security guy(legal stuff, you know in case we go to trial, the lawyer can say "according to this, you didn't even scan the server, therefore, you are responsible for the attack"). If it is scanning and not showing any open ports, we need to show that; not that nmap scanned 0 ports out of 65535. also, thank you all very, very much for all of your efforts regarding the nessus tool. it is my opinion that no commercial scanner can touch it in regards to usablitiy, functionality and flexibility. and besides that, how many scanners can check servers running ssl? none that I have seen!. thanks, Justin Pratt __________________________________________________ Do You Yahoo!? HotJobs - Search Thousands of New Jobs http://www.hotjobs.com - [EMAIL PROTECTED]: general discussions about Nessus. * To unsubscribe, send a mail to [EMAIL PROTECTED] with "unsubscribe nessus" in the body. - [EMAIL PROTECTED]: general discussions about Nessus. * To unsubscribe, send a mail to [EMAIL PROTECTED] with "unsubscribe nessus" in the body.
