North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Port scanning legal

  • From: L. Sassaman
  • Date: Tue Dec 19 21:54:18 2000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tue, 19 Dec 2000, Dan Hollis wrote:

>
> On Tue, 19 Dec 2000, Shawn McMahon wrote:
> > Better lock me up; I can't count the number of times I've nmap-ed
> > somebody just to find out what OS they were using, either for personal
> > curiosity, or as part of an argument.
>
> Cool. Since you're obviously in the right, how about scanning some
> U.S. military networks and letting us all know what OS they are using?

I have tcpwrappers set to trigger a portscan after certain actions... and
I have inadvertently scanned a section of the navy.mil network because of
this. (They're running raptor... what a surprise.)

I was not approached by any men in black after this happened. I suspect
the US Military is well accustomed to having its networks scanned.


- --Len.

__

L. Sassaman

Security Architect             |  "The world's gone crazy,
Technology Consultant          |   and it makes no sense..."
                               |
http://sion.quickie.net        |                   --Sting


-----BEGIN PGP SIGNATURE-----
Comment: OpenPGP Encrypted Email Preferred.

iD8DBQE6QB2QPYrxsgmsCmoRAlGNAKC+UfoTVzbYIPps4FqLORbendxPiwCgtmb9
dLMYIcGlJHUvfq3iGepfKbQ=
=GeE9
-----END PGP SIGNATURE-----