On Mon, Aug 29, 2011 at 16:30, Bob Proulx <b...@proulx.com> wrote:
> Jochen Spieker wrote:
>> Anyway, using nmap on localhost doesn't make much sense. Use netstat or
>> lsof instead.
>
> Agreed.  For example if you have a firewall on the local host.
> Usually connections from the local host to the local host are
> allowed but inbound connections from other hosts are blocked.  In that
> case nmap on the local host would report open ports that would show as
> blocked when coming from a remote host.  You would need to probe your
> host from another one in order to gain meaningful information about
> remote networking attacks.

iirc, nmap should show 'filtered' from another host. it's a part of
the process as far as i'm concerned. see:
  -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
  -sU: UDP Scan
  -sN/sF/sX: TCP Null, FIN, and Xmas scans


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAH_OBicEQk7YgNaYxm-yPhs66--hdjd7bwt=nethh4pqv6f...@mail.gmail.com

Reply via email to