mailing list archives
Re: [PATCH] New 0-true-packets scanning method
From: Fyodor <fyodor () insecure org>
Date: Thu, 5 Jan 2006 00:33:04 -0800
On Sun, Jan 01, 2006 at 06:14:50AM +0100, Pablo Fernandez wrote:
As a gift for this new year I just finished coding a patch for the
latest stable release of nmap (3.95). Just like the Idle scan, this one
also sends 0 packets to the target from the true IP address (although is
not as cool as the Idle scan, bummer =P ).
Thanks, Pablo. Users request "proxy scan" on a fairly regular basis.
It was ranked #14 out of 22 in the 2003 Nmap survey
We'll see how it does in the 2006 survey, which should be announced
within a month.
Even a patch which isn't integrated into Nmap is useful in that users
can always apply it and use it themselves. That is the beauty of open
source! I would certainly consider integrating a well-written proxy
o Can handle both SOCKS and HTTP proxies
o Handles proxy chaining gracefully
o Scans the ports in parallel, ideally using the existing ultra_scan()
o Includes documentation (diff of docs/nmap_manpage.xml)
o Is coded carefully to avoid buffer overflows or any other security
problems. It also must be efficient and accurate.
o Tested on UNIX and Windows
If someone wants to construct such a patch, you are certainly welcome
and encouraged to do so!
Sent through the nmap-dev mailing list
- Re: [PATCH] New 0-true-packets scanning method Fyodor (Jan 05)