nmap on Redhat?

Craig White plug-discuss@lists.PLUG.phoenix.az.us
Sat, 22 Dec 2001 06:57:01 -0700


Wes Bateman wrote:
> 
> 
> If you really don't trust the box, then in addition to the nmap scan, I
> wouldn't trust anything the running kernel told you (or told your
> userspace tools like ps, netstat, etc.).  Rather, I'd boot from trusted
> media (like a rescue disk) or pull the drive and mount it in a trusted
> host.  Then you can really be certain that what you see is what you
> get/have ;)  But that's me, YPMV (your paranoia may vary) ;D
> 
---
If you really don't trust the box, the solution is even simpler - back
up data - reload. I hope that what you meant to say was, if you are
suspicious.
---
> I might also throw a sniffer on the network(s) that the host is connected
> to and capture all traffic for a period.  Then you could see illicit icmp,
> udp, ecp, etc. traffic going on, in addition to the tcp stuff you scanned
> for with nmap.  You could scan udp with nmap...but that can take a
> painfully long time :)  UDP has no way to say "rst" on its own ;)  Anyhow,
> if you do sniff the traffic, you probably want a snaplen of 1514 or so
> (1500 MTU for ethernet, plus the 14 bytes for the ethernet frame
> header).  If it's a real busy network segment, then you might not be able
> to do that.  In that case you could set a snaplen of 96 or something and
> get all the headers, and a little peak at the contents.  Of course, when
> you see something interesting on the wire, you'll be kicking yourself for
> not having the whole packets.  Ah, the trials and tribulations of a
> network voyeur ;D
> 
---
a network voyeur 'eh?  Sounds rather deprecated.

Thanks Wes, for the great explanation, I am continually learning and
there are some really great resources on this list.

Craig