Subject: RE: 'nother question --
From: Mike Tibor (tibor@lib.uaa.alaska.edu)
Date: Fri Oct 26 2001 - 22:22:06 AKDT
On Fri, 26 Oct 2001, W.D.McKinney wrote:
>
> Of course it's a bit dangerous but nmap has it:
>
> Some Common Options (none are required, most can be combined):
> * -O Use TCP/IP fingerprinting to guess remote operating system
All this does is tell you that the remote host is a windows box--it tells
you nothing about who's hosting the box. If it's scanning him for code
red, that pretty much already tells you what the remote OS is, so nmap
isn't particularly useful in this case.
Mike
-- Mike Tibor Univ. of Alaska Anchorage (907) 786-1001 voice Network Technician Consortium Library (907) 786-6050 fax tibor@lib.uaa.alaska.edu http://www.lib.uaa.alaska.edu/~tibor/ http://www.lib.uaa.alaska.edu/~tibor/pgpkey for PGP public key
This archive was generated by hypermail 2a23 : Fri Oct 26 2001 - 22:22:08 AKDT