RE: 'nother question --


Subject: RE: 'nother question --
From: Mike Tibor (tibor@lib.uaa.alaska.edu)
Date: Fri Oct 26 2001 - 22:22:06 AKDT


On Fri, 26 Oct 2001, W.D.McKinney wrote:

>
> Of course it's a bit dangerous but nmap has it:
>
> Some Common Options (none are required, most can be combined):
> * -O Use TCP/IP fingerprinting to guess remote operating system

All this does is tell you that the remote host is a windows box--it tells
you nothing about who's hosting the box. If it's scanning him for code
red, that pretty much already tells you what the remote OS is, so nmap
isn't particularly useful in this case.

Mike

--
Mike Tibor         Univ. of Alaska Anchorage    (907) 786-1001 voice
Network Technician     Consortium Library         (907) 786-6050 fax
tibor@lib.uaa.alaska.edu       http://www.lib.uaa.alaska.edu/~tibor/
http://www.lib.uaa.alaska.edu/~tibor/pgpkey  for PGP public key



This archive was generated by hypermail 2a23 : Fri Oct 26 2001 - 22:22:08 AKDT