I have a few questions on Vulnerability assessment. How can network assets in an Enterprise network be discovered if the ICMP is turned off on the network?
Does NMap depend on the ICMP protocol for mapping the network assets? How do the commercial vulnerability scanners discover the assets? Thank you in advance. Subba Rao _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
