On Mon Apr 18 2005 at 19:03, [EMAIL PROTECTED] wrote:

> - second test: P130 Dos, safe check, nmap, connect technique. 3 open
> ports (23,80,4000), but no security hole and a CRASHHHH! 

Nmap can crash broken IP stacks. The latest versions of the nmap.nasl
wrapper disable those dangerous options (OS fingerprinting, TCP
stealth scans, UDP scan, aggressive timings).

You should try scanning your gizmo with Nmap only.
If it reboots with nmap -sT only, then I guess it is overloaded by the
standard timing option. You can try nmap -sT -T polite, but it could be
very slow.
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to