Nmap Security Scanner 2003 User Survey

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

THE SURVEY IS OVER! THANKS FOR PARTICIPATING. SUBMISSIONS MADE NOW WILL NOT BE COUNTED.

Thanks for taking this short survey! Results will be posted to the nmap-hackers mailing list and on Insecure.Org. Please only submit survey once. Answers can not be changed once submitted. All questions are optional.
    Nmap usage info
  1. I use Nmap at least
    If never, why not?
  2. My use of Nmap is
  3. I sometimes run Nmap on:
    Linux
    Windows XP/2003
    Windows NT/2K
    Windows 95/98/ME
    FreeBSD
    OpenBSD
    NetBSD
    Mac OS X
    Solaris
    IRIX
    HP-UX
    AIX
    Other
  4. If you have tried the Windows version in the last 6 months:
    Which package have you used (most)?
    And how has it worked out for you?

    Nmap Enhancements/Improvements
  5. Please give your opinions on the following proposed changes to Nmap. Please leave blank any which are unclear or unfamiliar to you. Several current Nmap features were direct results of 2000 survey feedback.
    Feature A BAD Thing Neutral Somewhat Useful Very Useful Extraordinarily Cool
    Proxy (SOCKS, HTTP) bounce scanning
    Traceroute Support
    Output to Database Option (-oD)
    Output to HTML option (-oH)
    Distributed scanning support (many-machine cooperative scanning)
    Input via domain name (using zone XFER) (-iZ)
    Faster (speed optimizations)
    More explicit state descriptions (e.g. "filtered because of ICMP unreachable from 192.168.0.10")
    |<-r4d Auto-r00ter: Try and exploit IIS, Samba, and Sendmail servers whenever discovered on network (31337!)
    Print MAC Address of target host (if on local network)
    Categorize OS Detection into Type ("Router", "WAP", etc.), Vendor, and OS Family rather than providing only the human-readable string(s).
    Add an "Update Fingerprint" option which will grab the latest OS DB.
    Provide runtime estimations about how long the current scan/host will take to complete.
    Add animated paper clip to waste CPU cycles and annoy users trying to work.
    Scripting or module support for application-level probing/vuln testing
    Service/Protocol Fingerprinting (e.g. determine that port 80 is HTTP)
    Version Fingerprinting (e.g. determine that port 80 is Apache 1.3.20)
    IPv6 Raw-type Scan Support (e.g. SYN, ACK, FIN, and UDP scanning in addition to currently-implemented connect() port/ping scan).
    Improved X Window front end
    Improved MS Windows front end
    .Nmaprc for storing default scan types, timing, favorite decoys, etc.
    libnmap.so C++ library for pinging/port scanning/os detection

    Feel free to suggest other improvements/enhancements here:


    Tools Survey
  6. Here is your chance to share your favorite security tools (open source or commercial) with the World. The "winning" tools will be posted to Insecure.Org and the nmap-hackers list. This was the most popular result of the 2000 survey, and I hope this survey creates an even better resource! It is a great way for little-known but valuable tools (especially free ones with no advertising budget) to gain exposure. Please list up to 8 names in any order (one per textfield). While we are flattered if you like Nmap, please do not include it on this list:
    Tool Comments (for example a URL if any of your choices are so obscure that I won't be able to Google for them):


    Sites Survey
  7. Please share your favorite security web sites as well! What sites do you find the most valuable for security news, exploits, insights, discussions, or other valued content? Please list up to 8 in any order, one URL per box. No Insecure.Org sites will be counted. You may omit the initial http://
    Site Comments?


    Misc
  8. I have read the Nmap man page:
  9. I (or my company) might be interested in purchasing:
    Nmap T-Shirt
    Nmap Polo Shirt
    Web-based remote scanning service
    Nmap Support Contract
  10. Any other comments about Nmap or Insecure.Org?


    Demographic info (who uses Nmap?) Only aggregated results will be reported.
  11. My gender is
  12. Year of birth: 19
  13. Hat color
  14. I currently live in (pick the best fit)
  15. I am willing to blow my anonymity for a possible response. My email address is (completely optional):