Home page logo

basics logo Security Basics mailing list archives

detecting host with stateful firewall
From: Martin T <m4rtntns () gmail com>
Date: Thu, 3 Mar 2011 03:37:56 +0200

I have a host in network, which I know is generating constantly
~0.2Mbps of traffic and has ingress MAC address present both on switch
port and in router ARP table as well. It does not respond to nmap ping
(nmap -sP -T4 I.I.P.P). I tried "nmap -PN -F I.I.P.P" and "nmap -PN
-T4 I.I.I.P" as well, but still there were no replies from the host.
So I did "nmap -PN -T4 -p- --reason I.I.P.P" and "nmap -PN -T4 -sT -p-
--reason I.I.P.P" and even those gave me no replies(all the ports are
filtered according to nmap and I can confirm this with tcpdump as
there wasn't a single package from the host). If there is constantly
some traffic associated with this IP(I'm able to see this from the
router), then shouldn't nmap get reset at least from high-number
ephemeral ports which have established connections with servers? Is
there any other scan type, which might give a better results with
responses from ephemeral ports?


Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]