On Sun Jan 22 2006 at 14:15, Michael Scheidell wrote:

> I don't disagree on the nmap wrapper issue, if a user, unfamiliar with
> nessus uses it on a scan they can easily rob the resources form the
> nessus scanner.

That's why we should probably restrict the script to the import
function.

> As for netstat, snmp, these (hopefully) won't work in most cases
> (without really crappy security on the host)

netstat can work through a SSH account, which does not create any
security hole.

> Point is, tcp_wrapper and syn_scan won't give you al list of udp ports.

No. Both are TCP scanners, and they run in a bounded time, whatever the
conditions.

> If someone familiar with nmap scans needs a udp port scan, they will
> need to be aware of how to identify all the false positives associated
> with many udp scans.

Another point is that Nessus does not need or use results from UDP scanners.
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to