I've got a host to scan that doesn't respond to TCP or ICMP pings but I
know is listening on certain ports. If I disable TCP and ICMP pings Nessus
blindly tries to execute every pluggin without first scanning for open
ports. What do I need to put in my .nessusrc to cause Nessus to run nmap?

I currently have the following Nmap options set.

 Nmap[radio]:TCP scanning technique : = SYN scan
 Nmap[checkbox]:UDP port scan = no
 Nmap[checkbox]:RPC port scan = no
 Nmap[checkbox]:Ping the remote host = yes
 Nmap[checkbox]:Identify the remote OS = yes
 Nmap[checkbox]:Use hidden option to identify the remote OS = yes
 Nmap[checkbox]:Fragment IP packets (bypasses firewalls) = no
 Nmap[checkbox]:Get Identd info = no
 Nmap[radio]:Port range = User specified range
 Nmap[checkbox]:Do not randomize the  order  in  which ports are scanned =
yes
 Nmap[entry]:Source port : = any
 Nmap[radio]:Timing policy : = Normal

Regards,

James


Reply via email to