Security Basics mailing list archives
RE: An Nmap Command to Remember
From: "Jeremi Gosney" <Jeremi.Gosney () motricity com>
Date: Fri, 20 Feb 2009 12:33:56 -0800
I don't mean to stray off the current topic, but since this is a "Security Basics" list -- Kev, you really shouldn't be subscribed to these lists as 'root,' and I especially wouldn't have my server's root account tied to Windows Live Mail. Just a thought. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Root - VulnerabilityAssessment Sent: Thursday, February 19, 2009 11:51 PM To: Daniel Miessler; security-basics () securityfocus com Subject: Re: An Nmap Command to Remember Daniel, The only thing I have issues with this is a full UDP scan can take 18 hours plus to finish, whereas a syn scan can be done in minutes, not really an effective use of the tool possibly Just a thought Rgds Kev -------------------------------------------------- From: "Daniel Miessler" <daniel () dmiessler com> Sent: Thursday, February 19, 2009 8:21 PM To: <security-basics () securityfocus com> Subject: An Nmap Command to Remember
This nmap command will verbosely scan all 65,535 ports, both tcp and udp, using service probing and operating system detection, and output the results to nmap, greppable, and xml formats. nmap -vv -p0- -sSUV -O -oA $outputfile $target -- Daniel R. Miessler W: http://dmiessler.com/ E: daniel () dmiessler com P: 510 585 9143 G: 0xD4A8FFF6
No virus found in this incoming message. Checked by AVG - www.avg.com Version: 8.0.237 / Virus Database: 270.11.0/1959 - Release Date: 02/18/09 20:55:00
Current thread:
- An Nmap Command to Remember Daniel Miessler (Feb 19)
- Re: An Nmap Command to Remember Root - VulnerabilityAssessment (Feb 20)
- RE: An Nmap Command to Remember Jeremi Gosney (Feb 20)
- R: An Nmap Command to Remember Vega - Brunello Ivan (Feb 20)
- Re: An Nmap Command to Remember Ansgar Wiechers (Feb 24)
- Re: An Nmap Command to Remember Root - VulnerabilityAssessment (Feb 20)