Page 1 of 2 12 LastLast
Results 1 to 10 of 18

Thread: Using Nmap

  1. #1
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    7

    Thumbs down Using Nmap

    Is it possible to scan a system anywhere on internet using Nmap??

    Or is it only for scaning machines on local network..?

    Is ther any apps to scan systems on internet?

  2. #2
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    This kids is a obvious example of complete laziness and a blatant lake of RTFM.

  3. #3
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Sure feel free to to scan anything on the internet with Nmap that you want to. When your internet connection gets canceled, you can try to explain to mommy & daddy why they can't get their email anymore.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  4. #4
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    7

    Default

    I asked because, in tutorials i have seen nmap using to scan only local networks.

  5. #5
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by ranees View Post
    I asked because, in tutorials i have seen nmap using to scan only local networks.
    That's because most of the time, it's explicitly against the TOS/AUP of your ISP to be conducting recon against other networks. And there are people out there (like me) that detect such things and report them to their ISP's and have their accounts canceled for violating the TOS/AUP.

    Basically, you have no business running nmap against a network across the internet without explicit permission of the network owner and your ISP.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  6. #6
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    7

    Default

    Then how criminals attack into machines over internet??

  7. #7
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by ranees View Post
    Then how hackers attack into machines over internet??
    "Hackers" don't. Criminals do. Try to keep the terms straight.

    Most of the attacks come from countries where the laws and ISP policies are either not strict or not enforced.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  8. #8
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Then how hackers attack into machines over internet??
    Edit/Delete Message
    Obviously if a criminal with bad intentions is attacking a machine he probably has little concern for a ISP's terms of service because what he's doing is illegal. On the other hand if some one is hired to legally carry out a penetration test the ISP is normally contacted and apprised of the test or the testing company already has such policies in place with ISP's.

  9. #9
    Just burned his ISO
    Join Date
    Feb 2006
    Posts
    11

    Default nmap

    Quote Originally Posted by ranees View Post
    Then how hackers attack into machines over internet??
    Surprisingly not all malicious attackers use the proper procedures or follow the rules when running scans. They can hop on open networks or maybe they are from countries with less stringent laws. A lot of times they are just people who don't know better and get upset when they have their internet access ganked by the ISP.

    Sanctioned pen-testers will have the proper clearance from the entities they are scanning and their originating ISPs.

  10. #10
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Attacks have a tendency to come from all over.

    Unique Alerts: 88
    Categories: 16
    Total Number of Alerts: 26425

    Time Window: [2008-06-24 12:45:28] - [2008-08-07 08:36:12]

    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •