Thanks for the responses:
- The -PT option is great, if you know the host is 
listening on that specific port, otherwise it's kinda of 
useless. Remember a firewall is most likely sitting 
infront intercepting these packets, if the IP does not 
exist the firewalls going to drop (and not send a rst) the 
packet. This gives us no information to work from heh.
- The -T Insane (5) -T Aggressive (4) Options don't 
exactly help either, Insane gives up after 75 seconds if 
no response is seen, (keep in mind a machine that may have 
a service listening on port 23592, this would never get 
picked up, nmap would quit after 75 seconds of scanning 
[unless it hit this by random]) So that rules this option 
out. Aggressive timed out in 300 seconds same deal as 
before with Insane.
- strobe didn't seem to work any faster in this case, I 
tried that as well.
*sigh* people need to not disable icmp echo reply :)
Any other suggestions? (Thanks to all of you who did 
respond)
-wire
_____________________________
For the best comics, toys, movies, and more,
please visit <http://www.tfaw.com/?qt=wmf>


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

Reply via email to