[NCLUG] Thanks!
Michael Dwyer
mdwyer at sixthdimension.com
Fri May 17 13:54:44 MDT 2002
Marcio Luis Teixeira wrote:
>
> On Friday 17 May 2002 01:19 pm, you wrote:
> > Marcio Luis Teixeira wrote:
> > > Thanks for the suggestions, guys. It works like a charm now. I've run the
> > > port scan from "http://scan.sygatetech.com/" and everything shows up as
> > > stealthed.
> >
> > If you haven't discovered it yet, nmap (www.insecure.org) is an
> > excellent port scanner. Of course, using it to scan yourself could give
> > some strange results... But it is sometimes useful to have a friend scan
> > you...
>
> Thanks. I just downloaded it and am trying it out. This is really cool. I'm
> especially impressed how it can determine the OS of all the machines on my
> internal network.
Well then, you might find the early research into Queso interesting.
That was the groundwork for the OS fingerprinting used in nmap (if I
recall correctly). You might also like p0f -- Passive OS
Fingerprinting. (Incidently, that appears to be p-zero-f) You can try
to identify hosts that scan YOU. Kind of nifty, in a scary sort of
way...
More information about the NCLUG
mailing list