lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 6 Dec 2006 11:00:37 -0700
From: "Mike Vasquez" <>
To: Greg <>
Subject: Re: Nmap Online

1) I'm sure none of you can imagine this, but sometimes running and startup
configs aren't the same.  YES it's TRUE!  So, your approach could be
disastrous and is really ill advised.

2) Nmap may not give reliable results from all sites.  Surely you've
encounted ACLs that caused erroneous nmap results from some locations.  As
the guy said: sometimes he travels.  Having the capability to run it from a
neutral location can get by that.

I'm sure there's more.....

On 12/5/06, Greg <> wrote:
> I don't wish to upset anyone but that answer has to be the craziest FIRST
> "port of call" approach I have seen used. I get plenty of those sorts of
> calls. I take about 30 seconds time on the phone for almost all of them. I
> say "Pull the power plug out of the router. Wait 10 seconds, plug it back
> in
> and wait another 10 seconds. OK, try now" and almost all of them report it
> works well.
> So why would I need and how could I use Nmap online to tell me the router
> went crazy and locked up?
> Besides, wouldn't it be just as easy to use the Nmap sitting on my
> computer
> if I decided I needed to use it?
> Greg.
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
> Hosted and sponsored by Secunia -

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists