Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It was a “fast nmap”, so only the top 100 most common ports were checked.


Ah, thanks. If nmap was run exhaustively on all 64k ports, would that both (a) take forever, and (b) raise alarm bells on the target? Why isn't a full scan the norm?


Yes to both of those (but not thaaat long). But in this case I still would have ran an exhaustive nmap because it's a device on my local network rather than a remote server.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: