Nmap Development mailing list archives

Re: Nmap Problem


From: Luis Martin Garcia <luis.mgarc () gmail com>
Date: Tue, 27 Mar 2007 21:04:51 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I think you are posting to the wrong list. This is the "nmap
developers" list. Next time you may want to ask questions in the other
list nmap-hackers.

The problem is that you should execute nmap from the command line. In
windows, you can do that by going to Start->Run and then enter this
command "cmd".

You should see a black window with a command prompt saying something
like "C:\". Well, that's the command line you can use to launch nmap.
Just type "nmap" and press Enter to see the options you have available.

I recommend that you read some nmap tutorial before using it. You can
find one here: http://www.nmap-tutorial.com/

By the way, you may want to subscribe to the list "security basics" as
they deal with newbie questions without getting annoyed. I think nmap
mailing lists usually have a higher level ;-)
Check it at the security focus website:
http://www.securityfocus.com/archive/105/description

I hope that helps.

Salud!

Luis.



steve.cleary2 wrote:
ok basicly i downloaded nmap not a problem i got winpcap 4.0 all ok try
opening nmap.exe and it comes up with the black box it goes through some
stuff really fast then closes how do i open nmap and keep it open?
thanks danny (by the way i registered it into the registry jus in case u
think that mite be the problem)

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGCXjKMi/lqD03xGARAs3dAKCcbFbvzfxFYd9S8RYpVOPtCnCkYACfQtKz
naH69RCKe8+KSllFaFXsiyI=
=kYu2
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: