05-31-2009
how to hide os type from scaning of nmap or nessus
my os is freebsd 7.1
just open sshd and hide the sshd banner
nessus still report correctly the os type
how to hide os type from scaning of nmap or nessus?
Thanx so much.
my ipfw rule:
ipfwcmd="ipfw -q add allow tcp"
localip="192.168.1.254"
$ipfwcmd from any to $localip 22 in setup keep-state
8 More Discussions You Might Find Interesting
1. Cybersecurity
I am trying to code a php script that calls upon the "nessus" client; and formats the output into a HTML table. Somehow, my shell scripts don't seen to be working correctly...is my syntax messed up?
Here's what i got:
<CENTER><BR><BR><BR><BR>
<table width="" border="0" cellspacing="1"... (0 Replies)
Discussion started by: thomas.jones
0 Replies
2. Shell Programming and Scripting
Helo ..
How Can i Hide My Server Type Here
Hostpres.com - Host Pres
And writing Secureb By ....
And how Can i Hide uname -a: Linux server.xxxx.net 2.6.18-ovz028stab053.14-enterprise #1 SMP Mon Jun 2 18:25:30 MSD
2008 i686
From Php Shell Like c99... (3 Replies)
Discussion started by: a7medo
3 Replies
3. Shell Programming and Scripting
I took a stab at writing a script to automate the interactive process of adding users to Nessus - I have zero previous coding experience. So far, it doesn't get me anywhere.
I took small sections of code from posts I found on this site and others:... (1 Reply)
Discussion started by: nolamiami
1 Replies
4. UNIX for Dummies Questions & Answers
Hi there,
I found out a very strange behavior.
If I call ssh, my password will be invisible when I'm prompted to type it:
santiago@cassiopee:~$ ssh titan.caoba.fr "echo connected"
santiago@titan.caoba.fr's password: <--- password is hidden when typed
connected
santiago@cassiopee:~$ If I... (5 Replies)
Discussion started by: chebarbudo
5 Replies
5. UNIX for Dummies Questions & Answers
hi guys
Suse 10 SP2
Security guys run an app called Nessus for vulnerabilities and they found this one on my linux
VNC Server Unauthenticated Access
and I really don't know what they mean...
I can update vnc on these servers but there is not guarantee this will fix the issue and the... (2 Replies)
Discussion started by: kopper
2 Replies
6. Shell Programming and Scripting
Dear experts,
I have a problem and I am not clear on how to attack this. Let me define the problem as simply as possible.
1)There are several log files in a directory
2) Script should open each log file and scan for errors (grep for certain strings - say - error1, error2, error3)
3) If any... (1 Reply)
Discussion started by: newscripter
1 Replies
7. Programming
Hi,
I need to somehow pipe the password to a command and run some SQL, for example, something like echo $password | sqlplus -s system @query01.sql
To make it not so obvious, I decided to try out writing a small C program that basically just do echo $password. So now I just do x9.out | sqlplus... (8 Replies)
Discussion started by: newbie_01
8 Replies
8. Shell Programming and Scripting
Scripting language: Shell script
I want to Scan IP's from IPlist.txt through Nessus using shell scripting language. Give the Input (IPlist) to nessus and generate Nessus report in xml or PDF form which is saved automatically on computer .
Please help if any one has idea about how to write... (2 Replies)
Discussion started by: sk151993
2 Replies
IPFW(4) BSD Kernel Interfaces Manual IPFW(4)
NAME
ipfw -- IP packet filter and traffic accounting
SYNOPSIS
To compile ipfw into the kernel, place the following option in the kernel configuration file:
options IPFIREWALL
Other kernel options related to ipfw which may also be useful are:
options IPFIREWALL_DEFAULT_TO_ACCEPT
options IPFIREWALL_FORWARD
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=100
To load ipfw as a module at boot time, add the following line into the loader.conf(5) file:
ipfw_load="YES"
DESCRIPTION
The ipfw system facility allows filtering, redirecting, and other operations on IP packets travelling through network interfaces.
The default behavior of ipfw is to block all incoming and outgoing traffic. This behavior can be modified, to allow all traffic through the
ipfw firewall by default, by enabling the IPFIREWALL_DEFAULT_TO_ACCEPT kernel option. This option may be useful when configuring ipfw for
the first time. If the default ipfw behavior is to allow everything, it is easier to cope with firewall-tuning mistakes which may acciden-
tally block all traffic.
To enable logging of packets passing through ipfw, enable the IPFIREWALL_VERBOSE kernel option. The IPFIREWALL_VERBOSE_LIMIT option will
prevent syslogd(8) from flooding system logs or causing local Denial of Service. This option may be set to the number of packets which will
be logged on a per-entry basis before the entry is rate-limited.
Policy routing and transparent forwarding features of ipfw can be enabled by IPFIREWALL_FORWARD kernel option.
The user interface for ipfw is implemented by the ipfw(8) utility, so please refer to the ipfw(8) manpage for a complete description of the
ipfw capabilities and how to use it.
SEE ALSO
setsockopt(2), divert(4), ip(4), ipfw(8), sysctl(8), syslogd(8), pfil(9)
BSD September 1, 2006 BSD