Home page logo

Nmap Announce mailing list archives

Safe scanning
From: "Teolicy" <teolicy () mindless com>
Date: Tue, 21 Mar 2000 21:33:03 +0200

#include <stdthanks.h> // to Fyodor the man

Hello folks,

I've been lurking here for a while, and am on the verge of doing a pretty
big scan on a pretty big and /very/ varied net, of which I have little
control. I know that it's more than likely that this network has a few
fragile/semi-home-made stacks in it.

Alek O.K.'s recent post (subj: "Setting nmap host_timeout too low may cause
DoS on inetd (?)") kinda spooked me.

How often or likely is it that nmap would trash a host (I'm considering
low-volume, something circa a class B per night, over a month)? Does anyone
have any experience with "safetifying" nmap scans? Are there any scans that
are more dangerous than others?

I've read the manpage and most of the webpage, and I realize that there are
no guarantees. But I'm looking for real-life-experience - is "nmap -sT
10.10.1-254.1-254" likely to put me in the street?

 - Teo

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]