Nmap Development mailing list archives

Re: Nmap Video Tutorial 2: Port Scan Boogaloo


From: Fyodor <fyodor () insecure org>
Date: Fri, 7 Oct 2005 00:26:51 -0700

On Thu, Oct 06, 2005 at 09:00:04PM -0500, Crenshaw, Adrian D wrote:

Nmap Video Tutorial 2:Port Scan Boogaloo  

http://www.irongeek.com/i.php?page=videos/nmap2

Looks great!  Many users do prefer to learn Nmap this way.  That was
proven by the last video tutorial
(http://www.insecure.org/nmap/nmap_haxxxor.html), which was so popular
that I had to remove the video files since I couldn't afford the
bandwidth to host it.  We're talking several terabytes of downloads in
the first few days (!!!).  All this for a video that doesn't cover
nearly as many scan types or command-line options as yours It is
possible that the use of naked young women as trainers contributed to
the popularity of the HaXXXor videos.

You have taken a different approach, with a focus on screen captures
and slides rather than any sort of human models.  Normally flash
annoys the hell out of me, but this is one of the rare legitimate
uses.  So I ran my special-purpose Flash-enabled browser to watch both
videos.

Overall the content was quite good.  It would be nice if you showed
slide numbers and the total (or amount remaining).  I didn't have any
good idea whether the video would last 5 minutes, 10 minutes, or 30
minutes, nor whether I was approaching the end.

I thought it was cool that you showed the XML output stuff, including
the HTML rendering via XSL stylesheet.  Your coverage of Idle scan was
pretty good too, though I doubt many people will understand the
"technique" slide.  Also, near the end you highlight that you are
looking for zombies with a trivial TCP Sequence Prediction fild.
Actually, what you should are about is the "IPID Sequence Generation:
Incremental" line right below it.

Anyway, great work.  Feel free to send an announcement to nmap-hackers
when you are ready for a wider audience.  I have added a link to these
to the Nmap documentation page.

Cheers,
-F


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


Current thread: