Home page logo

nmap-dev logo Nmap Development mailing list archives

Difficult Nmap Question from IRC
From: majek04 <majek04+nmap-dev () gmail com>
Date: Wed, 14 May 2008 12:55:47 +0200

On Wed, May 14, 2008 at 5:14 AM,  <doug () hcsw org> wrote:
Hey all,

 Somebody had a tough question on IRC a few minutes ago. Let's
 say you have a list of 10000 proxy servers (or torrent clients
 or whatever) along with the specific port that proxy is thought
 to be listening on. Is there any way to feed Nmap a list of
 host/port pairs, instead of having Nmap scan each host with the
 same port list? Assume that invoking Nmap separately for each
 target is too inefficient.

 Nmap uses shared data structure for keeping information about scanned ports.
 See portmap.cc global variable:
 u16 *PortList::port_map[PORTLIST_PROTO_MAX];

 We can theoretically create a kind of blacklisted/whitelisted ports
 for host (Target). But I'm not sure it has any sense.
 (But maybe... port_map would need to have all possible ports,
 but getting not scanned ports would need to be customized
 for Target instance)

 The solution for now is to run nmap for groups of hosts with the same ports.


blog: http://popcnt.org/

Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]