Nmap Development mailing list archives

Re: Detecting hosts in large subnets


From: 4N9e Gutek <4n9e () futurezone biz>
Date: Tue, 27 Dec 2005 10:45:30 +0100

my only interest is host availability. The software runs
within the LAN, which means there is no blocking firewall.
- Assuming those two conditions, note that the -sP scan
sends both a ICMP (echo request) and a TCP (to port 80)
probes. If you just want to know who is up, consider adding
a -PE, -PP or -PM option. This will force ICMP only, and
reduces your scan time by a half.
(see
http://www.insecure.org/nmap/man/man-host-discovery.html
for details )
- Consider also the --min_hostgroup specification (
http://www.insecure.org/nmap/man/man-performance.html ) for
increasing performances at the beginning of the process
(ok, you'll gain about 1 or two seconds, but...)

Are there any licensing issues when including nmap and
libpcap (it's a windows app) in a commercial release?
-You should have a look at the Legal Notice (
http://www.insecure.org/nmap/man/man-legal.html#nmap-copyright
) concerning the "derived works", wich deals with any that
:
   *Integrates source code from Nmap
   *Reads or includes Nmap copyrighted data files, such as
nmap-os-fingerprints or nmap-service-probes.
   *Executes Nmap and parses the results (as opposed to
typical shell or execution-menu apps, which simply display
raw Nmap output and so are not derivative works.)
   *Integrates/includes/aggregates Nmap into a proprietary
executable installer, such as those produced by
InstallShield.
   *Links to a library or executes a program that does any
of the above.

Regards,

--
4N9e, Modérateur Sécurité informatique sur FutureZone.


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


Current thread: