Re: Mapping Class A network ( any easy trick?)

From: Tim (tim-pentest@sentinelchicken.org)
Date: Wed Feb 09 2005 - 21:38:19 EST


> Apart from the timing issues (I agree totally) I still think that you
> cannot call nmap+nbtstat or nmap+nessus or whatever combinatioin
> 'penetration testing'. To me that is Vulnerability Analysis. VA on a
> class A is tricky enough. Pentesting (ie attempted exploitation of all
> discovered vulenrabilities) on a full class A is extremely difficult.
> Impossible for 1 man and his laptop, given average population of
> networks.

Of course not. I was merely trying to provide some information on what
it takes to actually scan that many IPs. Our scan only consisted of OS
fingerprinting, about 20 TCP and 20 UDP ports scanned, and a quick
nbtscan query. This would be enough information to map a network where
one truly doesn't know what is out there, but by no means is it a
"penetration test". Just the first step (in some situations).

tim



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:16 EDT