RE: An Nmap Command to Remember

I don't mean to stray off the current topic, but since this is a "Security Basics" list -- Kev, you really shouldn't be subscribed to these lists as 'root,' and I especially wouldn't have my server's root account tied to Windows Live Mail. Just a thought.

-----Original Message-----
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx] On Behalf Of Root - VulnerabilityAssessment
Sent: Thursday, February 19, 2009 11:51 PM
To: Daniel Miessler; security-basics@xxxxxxxxxxxxxxxxx
Subject: Re: An Nmap Command to Remember


The only thing I have issues with this is a full UDP scan can take 18 hours plus to finish, whereas a syn scan can be done in minutes, not really an effective use of the tool possibly

Just a thought



From: "Daniel Miessler" <daniel@xxxxxxxxxxxxx>
Sent: Thursday, February 19, 2009 8:21 PM
To: <security-basics@xxxxxxxxxxxxxxxxx>
Subject: An Nmap Command to Remember

This nmap command will verbosely scan all 65,535 ports, both tcp and
udp, using service probing and operating system detection, and output
the results to nmap, greppable, and xml formats.

nmap -vv -p0- -sSUV -O -oA $outputfile $target

Daniel R. Miessler
E: daniel@xxxxxxxxxxxxx
P: 510 585 9143
G: 0xD4A8FFF6

No virus found in this incoming message.
Checked by AVG -
Version: 8.0.237 / Virus Database: 270.11.0/1959 - Release Date: 02/18/09