Home page logo

nmap-dev logo Nmap Development mailing list archives

--max_ttl patch
From: H D Moore <hdm () digitaloffense net>
Date: Sun, 29 Dec 2002 08:40:00 -0600

Attached is a patch to 3.10ALPHA9 which forces the ttl of every packet 
sent, figured someone else might have a use for it.

A warning for win32 users with the connect() scan:

--  http://www.sockets.com/ws2_stat.htm --
IP_TTL (level IPPROTO_IP): Wierd -- Works fine for SOCK_DGRAM (UDP)  and 
SOCK_RAW (ICMP) sockets on both Win95 and NT4, but doesn't work for 
SOCK_STREAM on either (strange that WSAIoctl() SIO_MULTICAST_SCOPE fails, 
since it does the same thing!). The calls to both setsockopt() and 
getsockopt() do what appear to be the right thing, but a network analyzer 
peek of what is actually sent on the wire reveals that the TTL is still 
the default value (128). Same result whether you make the calls before or 
after the TCP connection is established.


Attachment: maxttl.patch

For help using this (nmap-dev) mailing list, send a blank email to 
nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).

  By Date           By Thread  

Current thread:
  • --max_ttl patch H D Moore (Dec 29)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]