scroll down to "examples"
Quote:
nmap -sS -O scanme.nmap.org/24
Launches a stealth SYN scan against each machine that is up out of the
255 machines on "class C" network where Scanme resides. It also tries
to determine what operating system is running on each host that is up
and running. This requires root privileges because of the SYN scan and
OS detection.
|
That way then..
If you refer to iptables, a software firewall installed on the machine you're working on, then the answer is: everything that's not specifically declared to be something else than policy, is dealt with as the policy says. Or "if policy is to drop/deny, everything is dropped that is not explicitly allowed", or "if policy is to allow, then everything is allowed that is not explicitly denied".
shows you the current iptables configuration. Empty tables mean no rules, which means no policies, which means everything can go without restrictions.
Just as a note, I don't always get what people refer to with "software" firewalls (or their counterparts, "hardware" firewalls). After all if the bits are inspected and dealt with, it's software that does it - a hardware firewall would mean, to me, a physical machine that would inspect the
currents that run trough the cables, or light if optics is used instead, and then either stop it from getting where it wants or allowing it to continue. As most firewalls probably don't ask the electrons or photons where they might be going, I consider most firewalls software firewalls even if they carry a "Cisco" logo and come in heavy green steel boxes.