No Next Item No Next Conference Can't Favor Can't Forget Item List Conference Home Entrance    Help
View Responses


Grex Cyberpunk Item 127: OS for Nmap [linked]
Entered by shazam on Sat Apr 1 15:19:05 UTC 2000:

An easy question for the right person- I've downloaded Nmap and I would like
to know if I need to have a lynux operating platform to use it correctly, or
can I just run it on any systm?

45 responses total.



#1 of 45 by scott on Sun Apr 2 02:08:09 2000:

You can't run it here.


#2 of 45 by sj2 on Sun Apr 2 07:43:32 2000:

i ran it on linux and i think it should run on any unix system with a 
few changes. btw, its a great tool. Oh! And if you are wondering 
whether it would run on WinXX, forget it,


#3 of 45 by shazam on Sun Apr 2 12:04:08 2000:

Thankyou Siddhartha Jain,with more research I have learnt that you are reight
nand that it will run on most unix OS.I've ordered the linux operating system,
Red Hat 6.2-CD, and like you said, I have to make a few adjustments to the
current configuration and wallah!!! Well that's theoritically plausible but
in practice I'm sure it won't be so easy,I'll keep in touch. if you want to
contact me, email"gpohle@dot.net.au"


#4 of 45 by janc on Mon Apr 3 03:48:08 2000:

I'm too lazy to type "Nmap" into Google.  What is Nmap?


#5 of 45 by atticus on Mon Apr 3 15:11:35 2000:

From nmap homepage (http://www.insecure.org/nmap):
"nmap is a utility for port scanning large networks, although it works 
fine for single hosts. The guiding philosophy for the creation of nmap 
is TMTOWTDI (There's More Than One Way To Do It). This is the Perl 
slogan, but it is equally applicable to scanners. Sometimes you need 
speed, other times you may need stealth. In some cases, bypassing 
firewalls may be required. Not to mention the fact that you may want to 
scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all 
this with one scanning mode. And you don't want to have 10 different 
scanners around, all with different interfaces and capabilities. Thus I 
incorporated virtually every scanning technique I know into nmap."


#6 of 45 by jazz on Mon Apr 3 15:19:02 2000:

        Oh, it's a hacking tool.


#7 of 45 by sj2 on Mon Apr 3 15:42:39 2000:

Finally, the Jazz spoketh ( whatever is that supposed to mean ). I 
think nmap is a great tool especially with that ftp thing it does. I 
tried SATAN but it did not work on my system. Right now i am working 
with Solaris 7 and i don't have a net connection ( we are waiting for 
an ISDN connection ). As and when that happens i will try to "port" it 
to Solaris. Btw, could someone enlighten me about the difference in IP 
Masq. and Proxying. I read the stuff in ipchains documentation but it 
is isn't very comprehensive.


#8 of 45 by jazz on Mon Apr 3 18:59:00 2000:

        There are legitimate uses for hacking tools. :)  But they're not
generally what they get used for.


#9 of 45 by janc on Tue Apr 4 22:38:24 2000:

Can someone remind me what the legitimate uses for a mass port scanner
are?  I keep forgetting?  I mean, besides trying it on your own subnet
before someone else does.


#10 of 45 by scg on Tue Apr 4 22:42:54 2000:

I generally use them to make sure I'm not running anything external services
I don't intend to be running, or to make sure my packet filters are doing what
I want them to do.  Of course, I suppose that could count as trying it on my
own subnet before somebody else does.

ISPs with policies banning their residential customers from running servers
sometimes run port scanners against their customers' computers.  Many of the
cable modem companies, in particular, are rumored to do that.


#11 of 45 by bdh3 on Wed Apr 5 00:30:47 2000:

re#9&10: Duh. I also use port scanners to show a customer a 'before' and 
'after' snapshot of their network during a firewall install.


#12 of 45 by jazz on Wed Apr 5 20:13:13 2000:

        Got it before I could answer.

        Portscanners are useful, to show you what your own potential security
risks are, and also to help determine if certian ports are being filtered by
ISPs, when run over a distance against a properly configured target host.

        Does anyone, outside of professionals, use portscanners for this
purpose?  Probably not many.


#13 of 45 by jmsaul on Wed Apr 5 21:18:18 2000:

But more should.  If you're on an xDSL or cable modem connection, you are
the sysadmin of a machine connected to the Net, like it or not.


#14 of 45 by jazz on Thu Apr 6 14:46:24 2000:

        It's of dubious use, though, portscanning a network from within the
network.  Especially when the network is NATted through a single host IP.


#15 of 45 by jmsaul on Thu Apr 6 15:23:20 2000:

Good point.


#16 of 45 by other on Sun Apr 9 06:35:49 2000:

I wonder if there is a free- or shareware utility I can use for the 
Macintosh to determine when and what it is sending via RF to the airport 
base station.  There isn't even a meter indicating activity for either rx 
or tx as there is in the software for the internal modem.


#17 of 45 by scott on Sun Apr 9 13:46:21 2000:

What frequency?  Maybe just a fixed receiver (my police scanner goes up to
900 something MHz) so you can listen to the activity.


#18 of 45 by other on Mon Apr 10 02:05:59 2000:

2.4GHz


#19 of 45 by raven on Tue Apr 11 05:16:51 2000:

Linked to cyberpunk.  Come discuss whether you think there are legitimate
uses for *nix sys admin tools for home users.  It seems this argument
might apply to other GNU Linux tools such as traceroute.  What do you
think?


#20 of 45 by darkskyz on Tue Apr 11 07:02:04 2000:

There are definatly uses for admin tools for home users- I use them for my
3 computer LAN.


#21 of 45 by jazz on Tue Apr 11 14:57:07 2000:

        Well, let's call a spade a spade, and admit they're hacking tools. 
There are legitimate uses for hacking tools, as we've mentioned, as there are
legitimate uses for lockpicks.  But, like lockpicks, the majority of the uses
aren't exactly kosher.

        System administration tools are things like CDE. :P


#22 of 45 by gull on Tue Apr 11 21:03:17 2000:

Of course, if more sysadmins had some rudimentary hacking skills, we
wouldn't have the widespread security problems on the internet that we do
now...  To make effective locks, you have to be able to think like a thief.


#23 of 45 by jazz on Tue Apr 11 21:06:03 2000:

        Unfortunately, not many companies realise the amount of time and skill
that's required to really secure a network ... I wouldn't blame the
administrators, but the people who failed to realise security is a concern.
Usually it becomes a concern only after a hacking incident, and then it's
outsourced or sent to a not-terribly-often used team mouldering in a closet
somewhere.


#24 of 45 by bobhayes on Wed May 3 00:57:38 2000:

Apart form pointing out the more obvious gaping holes in my box,
I find nmap to be useful in Linux advocacy since I can run it on
major sites and impress my friends with all the vunerable open ports
it invaribly finds :^)  I've yet to hack anywhere (and probably never
will) but I like the fact that Linux enables me to do that if I wanted
to, and out of the box as well (nmap and john both come installed
by default in the install I chose.) I've never had any complaints from
any server I've (stealth) scanned either.


#25 of 45 by jazz on Wed May 3 15:42:30 2000:

        Keep in mind that the companies you're using as a negative example
just might be secured enough to detect the port scan, and put you in jail for
it.


#26 of 45 by raven on Wed May 3 19:16:23 2000:

re #25 Is a port scan illegal as long as you don't exploit it?  I don't
see how that could be possible it's less intrusive than say whois that
names names.  OTH if you use an exploit obviously you run a good chance of
getting your ass in jail. 



#27 of 45 by jazz on Wed May 3 19:25:02 2000:

        I don't think that the law's really all that clear on that point, and
a corporation has significantly more money to prove that you're at fault than
you do to defend yourself, in most cases.


#28 of 45 by raven on Thu May 4 00:36:45 2000:

Hmm I'm just curious what basis there would be to call it an illegal
activity.  It seems like a port scan just speeds up public domain
knolodge for example if you telnet to a server and get a login prompt
then you know port 23 isn't behind a firewall.  Isn't a portscan essentially
just sending packets to different ports like ftp, telnet etc to see if they
are blocked or not.  That can't be illegal unless we are going to make
it illegal to telnet to a box unless you have a login there which as
far as I know isn't illegal.  What next will ping be baned because of
the possibility of the ping of death.  When GNU utilites are banned
only outlaws will have GNu utilites.


#29 of 45 by gull on Thu May 4 01:02:02 2000:

He who has the richest lawyers decides what the law says, basically.  Sorry
to have to break it to you.


#30 of 45 by scg on Thu May 4 01:37:10 2000:

I don't think you can legally walk through a neighborhood trying peoples'
doors to see if they're unlocked.  On the other hand, if you are in a business
district, going to stores that appear to be businesses serving the public,
and you open an unlocked door and walk in, as long as you don't do anything
further that's illegal, you're probably ok.

I have no idea at what point connecting to ports on computers without doing
anything destructive becomes unauthorized access under the law, but common
sense would seem to apply.  If you're connecting to port 80 on a host named
www, and sending an HTTP GET command, common sense would say that you're
looking for public information.  If you're trying to telnet into somebody's
mail server, on which you are not an authorized shell user, common sense would
presumably say that you're doing the electronic equivalent of trespassing.


#31 of 45 by jazz on Fri May 5 17:20:59 2000:

        The unspoken conventions that exist for businesses and private
residences - that say, for instance, that even if someone were having a loud
party in their backyard and left the front door wide open, that it might not
be appropriate to walk in - aren't as clear for electronic communications.
That, however, doesn't mean that reasonable guidelines don't exist.  If
someone's advertising a service to the public, you don't need to port-scan
them to find out where it's running - they'll make every effort to get it out
to you, and on a familliar port in most cases. 


#32 of 45 by raven on Fri May 5 22:06:18 2000:

Hmm so are you saying that only sys admins and other authorized people should
be allowed to own copies of port scanning software?  I know there is at least
distro of Linux that includes NMAP.  Will we have to liscense our copies of
Linux with the govt soon to make sure they aren't used for unauthorized
activity?  What ever happened to the American idea of freedom?  Freedom with
risks warts and all is what this country used to be about.  Now it's about
safety, ...grumble...


#33 of 45 by scg on Fri May 5 22:27:18 2000:

I think what he's saying is that people should only use port scanners on
systems they are authorized to port scan.

I'm not going to tell you that you can't have a wrench, but if you use your
wrench to take my car apart, I'm going to call the police.


#34 of 45 by raven on Sat May 6 00:13:57 2000:

The internet evolved to it's present stature as an open ended anarchy.  Are you
saying those days are over?  Will the internet become cable tee vee?


#35 of 45 by scg on Sat May 6 00:21:53 2000:

No more than my driveway has become cable TV.


#36 of 45 by mdw on Sat May 6 00:27:33 2000:

The internet has already become "cable TV".  The fraction of the
internet that is actually devoted to interesting and useful development
has been a very small minority fraction for quite some time, and most of
the decisions that affect the deployment and use of the internet are
made by businessmen and consumers neither of who really have much
understanding or interest in the underlying technology.


#37 of 45 by jazz on Sat May 6 13:37:48 2000:

        Now wait just a minute here.  The Internet was never an "open-ended
anarchy".  There were portions of the 'net that were governed primarily by
consensus, like unmoderated USENET groups, but even that relied upon a
consensus of USENET news feed operators, who had to cooperate with one another
in a fairly organzied fashion to even share news.  There were also portions
of the 'net that were carefully controlled and negotiated from the beginning,
and the whole lot of it has been bankrolled not by some amorphous goodwill,
but by tax dollars, educational institutions, and later, by private
corporations and their customers.



#38 of 45 by raven on Sat May 6 22:39:49 2000:

I didn't mean anarchy in the sense of unstructured I ment anarchy in the way
that it is used by poli sci people, i.e. no government control.  What bothers
me is that the internet was a working anarchy in that sense of the term and
I think that sense of freedom helped drive a lot of the creativity both in
content and in open source development of apps like Apache.  What I fear is
icreasing regulation that will chill free speech and free thought in the
name of security.  Really the internet works pretty well right now with
very little regulation, why should we start saying only certain people can
use certain applications?  What of the old school hacker ethos at MIT
(not to be confused with crackers or script kiddies) but simply techs
who want open systems that are open and easy to work with?


#39 of 45 by scg on Sat May 6 23:08:27 2000:

The Internet has never been without some sort of government.

Several years ago, when I started playing around with this stuff, the
"government" of the Net was largely the various sysadmins who ran various
pieces of it.  I doubt there was ever a time when it was considered ok to just
go around the Net trying to break things, or trying to get into systems that
people weren't authorized to get into.  In those days, if somebody was doing
something malicious it would generally work to send mail to the administrators
of the system they came from, generally a university, and get their net access
cut off.  Net access was hard enough to find that that would be a pretty
severe sanction, and would generally effectively deal with problems.  Still,
there have been laws about unauthorized computer access for years, that
were sometimes enforced (the Morris Worm incident comes to mind).

A lot has changed since then.  Many ISPs will still cut off users if there's
clear evidence that the user has been doing something in violation of the
ISP's acceptable use policy.  However, there are a lot more ISPs now.  If
somebody get cut off by one, they can just go to another, or falsify
information to get a new account with the same ISP.  That makes the old ISP
cutoff strategy not nearly as useful.  The stakes are also higher.  The
Internet has gone from being a network of academics and hobbyists, to being
an important part of the world's telecommunications infrastructure.  Many
companies depend on the Internet for their business communications, or even
for all their customer orders.  Internet outages can cost these companies
really large amounts of money.  There are also a lot of computers on the Net
that are peoples' personal computers, owned by people who just want to be able
to use the web or send e-mail, and don't want to know anything about system
administration.  You don't have any more right to start poking at their
computers than you have to go trying the doors on their houses.

But that doesn't mean you don't have the right to use a port scanner.  Nobody
in this discussion has said that.  You are welcome to portscan your own
computer all you want, and you are welcome to portscan any other computers
which you maintain, or which you have been given permission to do that to.
This isn't some special right given to those of us who run computer networks
because we are somehow special.  If any of us started portscanning random
machines we don't control, eventually somebody would probably notice and we
would have some explaining to do.


Last 6 Responses and Response Form.
No Next Item No Next Conference Can't Favor Can't Forget Item List Conference Home Entrance    Help

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss