Home page logo

nmap-dev logo Nmap Development mailing list archives

gsoc --top-ports
From: "Daniel Agar" <daniel () agar ca>
Date: Sat, 5 Apr 2008 15:00:45 -0400 (EDT)

I'm applying for the Feature Creeper/Bug wrangler Gsoc 2008 position, and
based on the comments I've received (thanks David Fifield) and I'd like to
get a better idea of what the community would like for --top-ports feature
and the required extensive empirical testing.

First of all, who should be scanned? I suppose you want a wide range of
different types of hosts. I was thinking about things like scanning
everyone in a large IRC channel, or trace route to a website and scan
every hop in between. The biggest problem I see is getting a good sample
of data from inside small home networks, the ports most
applicable/interesting to the average home user that might use nmap

How are services running on non standard ports to be treated? Should this
just be a simple port scan. Then --top-ports considers only the
distribution of ports in use, or should there be more information included
from a service scan (eg 23% of hosts scanned with port 222/tcp open are
using it for ssh).

I'd really like to be as detailed (and realistic) as possible in my

On an unrelated note, was the Nmap Hosted Scanner ever completed? I came
across this http://nmap.org/SoC/HostedScan.html during some soc related
googling. Was this ever finished, and if not is there any interest in this
still? It sounds like a fun project.


Daniel Agar

Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]