[Plug-security] nmap
Craig White
plug-security@lists.PLUG.phoenix.az.us
10 Sep 2002 08:35:14 -0700
netstat -an will show you open ports and active connections.
I use nmap for identifying remote systems
Craig
On Tue, 2002-09-10 at 08:17, Scott Gerlach wrote:
> Hey Carl,
> I'm always partial to
>
> 'nmap -v -sS -O localhost'
> (Turn on verbosity, TCP syn stealth scan, and fingerprint)
>
> This will automatically scan all the TCP ports in the lower range (1-1601).
> If it finds something, it will tell you. You can also do a 'netstat -lp' to
> see what program/port is listening.
> Also make sure 'localhost' is defined in hosts file
>
> Scott Gerlach
>
>
> -----Original Message-----
> From: Carl Parrish [mailto:cparrish@cox.net]
> Sent: Tuesday, September 10, 2002 8:14 AM
> To: plug-security@lists.PLUG.phoenix.az.us
> Subject: [Plug-security] nmap
>
>
> okay if I have a webserver (that works) and I type 'nmap localhost' <as
> su> shouldn't port 80 show up as open? And if I want to check that ssl
> is enabled what options should I run with nmap to make it do that?
>
> Thanks,
> Carl Parrish
>
>
>
> _______________________________________________
> Plug-security mailing list - Plug-security@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-security
> _______________________________________________
> Plug-security mailing list - Plug-security@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-security