[Plug-security] nmap

Scott Gerlach plug-security@lists.PLUG.phoenix.az.us
Tue, 10 Sep 2002 08:17:27 -0700


Hey Carl,
I'm always partial to

'nmap -v -sS -O localhost'
(Turn on verbosity, TCP syn stealth scan, and fingerprint)

This will automatically scan all the TCP ports in the lower range (1-1601).
If it finds something, it will tell you. You can also do a 'netstat -lp' to
see what program/port is listening.
Also make sure 'localhost' is defined in hosts file

Scott Gerlach


-----Original Message-----
From: Carl Parrish [mailto:cparrish@cox.net]
Sent: Tuesday, September 10, 2002 8:14 AM
To: plug-security@lists.PLUG.phoenix.az.us
Subject: [Plug-security] nmap


okay if I have a webserver (that works) and I type 'nmap localhost' <as
su> shouldn't port 80 show up as open? And if I want to check that ssl
is enabled what options should I run with nmap to make it do that?

Thanks, 
Carl Parrish



_______________________________________________
Plug-security mailing list  -  Plug-security@lists.PLUG.phoenix.az.us
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-security