Nmap Development mailing list archives

Firewall rule detection - results differing


From: "Gary Glover" <gglover () gmail com>
Date: Wed, 15 Nov 2006 14:19:47 -0700

Nmap question gurus:

Quick question on mixed results using nmap for firewall rule testing
(stateful or not).

When I run an nmap from my osx 3.95 version of nmap I get the following results:

Anole:~ Gary$ sudo nmap -sA -sV -P0 -p1-100 207.189.109.100
Password:

Starting Nmap 3.95 ( http://www.insecure.org/nmap/ ) at 2006-11-15 10:05 MST
All 100 scanned ports on 207.189.109.100 are: filtered

Nmap finished: 1 IP address (1 host up) scanned in 21.503 seconds

When my customer runs nmap on the same address he gets the following
results (Windows 4.11 version):

C:\Program Files\Nmap>nmap -sA -sV -P0 -p1-100 207.189.109.100

Starting Nmap 4.11 ( http://www.insecure.org/nmap ) at 2006-11-15 12:49 Eastern
Standard Time
All 100 scanned ports on 207.189.109.100 are UNfiltered

Nmap finished: 1 IP address (1 host up) scanned in 6.219 seconds


Easy answer?  My test says filtered, his say UNfiltered for the same
address?  Are we using nmap correctly?

Thanks,

Gary

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: