[NCLUG] Thanks!

Michael Dwyer mdwyer at sixthdimension.com
Fri May 17 13:54:44 MDT 2002


Marcio Luis Teixeira wrote:
> 
> On Friday 17 May 2002 01:19 pm, you wrote:
> > Marcio Luis Teixeira wrote:
> > > Thanks for the suggestions, guys. It works like a charm now. I've run the
> > > port scan from "http://scan.sygatetech.com/" and everything shows up as
> > > stealthed.
> >
> > If you haven't discovered it yet, nmap (www.insecure.org) is an
> > excellent port scanner.  Of course, using it to scan yourself could give
> > some strange results... But it is sometimes useful to have a friend scan
> > you...
> 
> Thanks. I just downloaded it and am trying it out. This is really cool. I'm
> especially impressed how it can determine the OS of all the machines on my
> internal network.

Well then, you might find the early research into Queso interesting. 
That was the groundwork for the OS fingerprinting used in nmap (if I
recall correctly).  You might also like p0f -- Passive OS
Fingerprinting. (Incidently, that appears to be p-zero-f)  You can try
to identify hosts that scan YOU.  Kind of nifty, in a scary sort of
way...



More information about the NCLUG mailing list