Penetration Testing mailing list archives

Re: faster scans? (nmap)


From: miguel.dilaj () pharma novartis com
Date: Mon, 3 Jun 2002 12:02:42 -0300


Hi wire

Have you tried strobe? It's useful for vanilla TCP scan and has the fame to
be the faster TCP scanner in the world. Didn't know how it behaves on hosts
that are not answering ICMP.
OTOH, if you know that the host ARE answering ICMP, removing the -P0 will
help in speeding up the scan, because nmap won't scan the ones that didn't
answer.
Cheers,

Miguel Dilaj





"wirepair" <wirepair () roguemail net> on 01/06/2002 18:36:12

To:    pen-test () securityfocus com
cc:
Subject:    faster scans? (nmap)


lo all.
I'm sure most of you at some point in time need to scan
class c after class c for hosts responding (most likely
using nmap). Here's the issue, multiple class C's, must
scan every ip with the -P0 option. Doing some testing with
various flags to decrease the timing and still have the
results be reliable. 1-1000 ports takes about 1293
seconds... x 65.5 x 254 == hella long time. I'm doing
vanilla tcp connect scans (Syns aren't reliable in this
case), so I was wondering if any of you have any tips on
speeding up the process and not loosing reliablity. Here's
the actual syntax nmap -sT -v -n -P0 -p 1- ip.ip.ip.ip-ip.
I've tried setting the amount of sockets to use to 100 and
that increased it from 1293 to 588seconds. Still there's
gotta be a better way. The reason they take this long is
because there is no host at the ips i'm trying to scan,
but still this is discovery and every ip needs to be
scanned. Maybe changing timeouts in /proc/sys ? I'm
running out of ideas any suggestions would be helpful
(there really isn't much out there in the way of
increasing timing on scans) Hell maybe i should be using a
different scanner? Thanks,
wire




----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: