[Plug-security] nmap

Craig White plug-security@lists.PLUG.phoenix.az.us
10 Sep 2002 08:35:14 -0700


netstat -an will show you open ports and active connections.

I use nmap for identifying remote systems

Craig

On Tue, 2002-09-10 at 08:17, Scott Gerlach wrote:
> Hey Carl,
> I'm always partial to
> 
> 'nmap -v -sS -O localhost'
> (Turn on verbosity, TCP syn stealth scan, and fingerprint)
> 
> This will automatically scan all the TCP ports in the lower range (1-1601).
> If it finds something, it will tell you. You can also do a 'netstat -lp' to
> see what program/port is listening.
> Also make sure 'localhost' is defined in hosts file
> 
> Scott Gerlach
> 
> 
> -----Original Message-----
> From: Carl Parrish [mailto:cparrish@cox.net]
> Sent: Tuesday, September 10, 2002 8:14 AM
> To: plug-security@lists.PLUG.phoenix.az.us
> Subject: [Plug-security] nmap
> 
> 
> okay if I have a webserver (that works) and I type 'nmap localhost' <as
> su> shouldn't port 80 show up as open? And if I want to check that ssl
> is enabled what options should I run with nmap to make it do that?
> 
> Thanks, 
> Carl Parrish
> 
> 
> 
> _______________________________________________
> Plug-security mailing list  -  Plug-security@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-security
> _______________________________________________
> Plug-security mailing list  -  Plug-security@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-security