Need iptables rule for nmap pp test
nmap PP test shows that host is up;
Do we have any iptables rules for port scanning, to block the host MAC and status of the host on to linux server where the DoS attack is made? |
Quote:
And please don't focus on port scanning but on regular maintenenance, hardening and auditing. Quote:
Quote:
Quote:
|
When below nmap port scanning is started on the DUT.
sudo nmap -v -PP de.vi.ce.ip -oN nmaplog.txt It shows that the device is UP and running. Output of the nmap test: Nmap scan report for 169.27.182.54 Host is up (0.00084s latency). Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 5555/tcp open freeciv MAC Address: F0:DE:42:67:31:DC (Unknown) Read data files from: /usr/share/nmap My query is, can we block the device host status using iptables netfilter rules? |
See 'man nmap', the "Host Discovery" part about which techniques nmap uses for discovery?
|
All times are GMT -5. The time now is 11:36 PM. |