[Plug-security] nmap
Scott Gerlach
plug-security@lists.PLUG.phoenix.az.us
Tue, 10 Sep 2002 08:17:27 -0700
Hey Carl,
I'm always partial to
'nmap -v -sS -O localhost'
(Turn on verbosity, TCP syn stealth scan, and fingerprint)
This will automatically scan all the TCP ports in the lower range (1-1601).
If it finds something, it will tell you. You can also do a 'netstat -lp' to
see what program/port is listening.
Also make sure 'localhost' is defined in hosts file
Scott Gerlach
-----Original Message-----
From: Carl Parrish [mailto:cparrish@cox.net]
Sent: Tuesday, September 10, 2002 8:14 AM
To: plug-security@lists.PLUG.phoenix.az.us
Subject: [Plug-security] nmap
okay if I have a webserver (that works) and I type 'nmap localhost' <as
su> shouldn't port 80 show up as open? And if I want to check that ssl
is enabled what options should I run with nmap to make it do that?
Thanks,
Carl Parrish
_______________________________________________
Plug-security mailing list - Plug-security@lists.PLUG.phoenix.az.us
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-security