On Sun Jan 22 2006 at 14:15, Michael Scheidell wrote: > I don't disagree on the nmap wrapper issue, if a user, unfamiliar with > nessus uses it on a scan they can easily rob the resources form the > nessus scanner.
That's why we should probably restrict the script to the import function. > As for netstat, snmp, these (hopefully) won't work in most cases > (without really crappy security on the host) netstat can work through a SSH account, which does not create any security hole. > Point is, tcp_wrapper and syn_scan won't give you al list of udp ports. No. Both are TCP scanners, and they run in a bounded time, whatever the conditions. > If someone familiar with nmap scans needs a udp port scan, they will > need to be aware of how to identify all the false positives associated > with many udp scans. Another point is that Nessus does not need or use results from UDP scanners. _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
