ipfw and nmap

sn1tch dot.sn1tch at gmail.com
Mon Mar 14 09:03:49 PST 2005

You could try using nmap with the -sA (ACK) scanning...this is good
for mapping firewall rulesets to see what is being let in. You could
also use -f (fragment) with -sS to send fragmented packets...this will
show open ports unless most of the time too. But -sA is better since
the firewall things its a legitimate request and not a port scan

On Mon, 14 Mar 2005 11:52:54 -0500, daniel quinn
<freebsd at danielquinn.org> wrote:
> i've been experimenting with ipfw since moving some of my machines from linux
> to freebsd and i've run across an oddity wrt nmap and freebsd firewalls.  it
> doesn't seem to work and the activity isn't logged either.
> the firewall is working though.  ssh goes through, while other ports are being
> blocked (and logged).  i've confirmed this with telnet.  but nmap still comes
> up empty.  i'd like to be able to do a proper portscan, but is this a feature
> with ipfw or a lack of feature in nmap?
> for the purposes of this test, i've used a variation on the firewall supplied
> in the freebsd handbook:
>  www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls-ipfw.html
> --
> ...he who in dealing with the empire loves his subjects as one should love
> one's body is the best person to whom one can commit the empire.
>  - lau tzu, "tao te ching: chapter xiii"
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe at freebsd.org"

You've officially been Gmailed

More information about the freebsd-questions mailing list