On Mon Apr 18 2005 at 19:03, [EMAIL PROTECTED] wrote: > - second test: P130 Dos, safe check, nmap, connect technique. 3 open > ports (23,80,4000), but no security hole and a CRASHHHH!
Nmap can crash broken IP stacks. The latest versions of the nmap.nasl wrapper disable those dangerous options (OS fingerprinting, TCP stealth scans, UDP scan, aggressive timings). You should try scanning your gizmo with Nmap only. If it reboots with nmap -sT only, then I guess it is overloaded by the standard timing option. You can try nmap -sT -T polite, but it could be very slow. _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
