Re: block nmap info

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 27, 2005 at 09:07:17PM -0100, xmaillist wrote:
> Hi,
> nmap man page:


ok. then it is impossible to block nmap and portscanning? 


> [...]
> -sT
> TCP connect() scan: This is the most basic form of TCP scanning. The 
> connect() system call provided  by  your operating system is used to 
> open a connection to every interesting port on the machine. If the port 
> is listening, connect() will succeed, otherwise the port isn't 
> reachable. One strong advantage to this technique is that you don't need 
> any special privileges. Any user on most UNIX boxes is free to use this 
> call. This sort of scan is easily detectable as target host logs will 
> show a bunch of connection and  error messages for the services which 
> accept() the connection just to have it immediately shutdown.  This is 
> the default scan type for unprivileged users.
> [...]
> 
> -sT scan is a full TCP handshake (SYN -> SYN/ACK -> ACK), so you just 
> have to forbid TCP connection on open ports...
> But, if you block tcp accesses for anybody, nobody could connect to the 
>  service associate with the corresponding port.
> So, you have to use rules that grant access for allow machine, and drop 
> it for the others.
> Nevertheless, other scans like -sS, -sF, -sX, -sN can still work...
> 
> 
> Pablo Allietti wrote:
> >hi all (again), how can i made a rules for block nmap information?
> >
> >if i do nmap -sT myhost.com from a cybercafe for example,   nmap display
> >all ports open. exist any way to block this? something like block
> >scanports?
> 
---end quoted text---

-- 


Pablo Allietti
LACNIC
--------------



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux