Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: Status Report #3 of 17
From: Fyodor <fyodor () insecure org>
Date: Mon, 11 May 2009 16:33:36 -0700

On Mon, May 11, 2009 at 10:30:38PM +0000, Brandon Enright wrote:

I chatted with Fyodor about this.  Obviously I described the echo
server in broad, rather magical terms.  I'm working on mocking up some
ideas and better defining the scope of what I think is reasonable and
useful to support.

Great, we're looking forward to your thoughts!

I'm going to work off of the Hping2 style output for now.  I'd be
interested in seeing a mock-up from you on what you think the Nping
output should look like.  I think many improvements can be made over

We will probably try to make the output as similar as possible to what
Nmap outputs with the likes of --packet-trace.  E.g. like:

SENT (0.1780s) TCP > A ttl=47 id=26851 iplen=40  seq=1259617669 win=4096 
SENT (0.1780s) ICMP > echo request (type=8/code=0) ttl=52 id=32206 iplen=28 
RCVD (0.1880s) TCP > R ttl=53 id=0 iplen=40  seq=2755610876 win=0 

The idea is for Nmap and Nping to use mostly the same code for this.
So if changes are desired to the output, we should change them for

Nping might have some special columns for timing or sequence
information or the like.  So you may be able to take some good
inspiration from hping (or normal ping) and other applications.  But
for the "meat" of the results, I'd like to share the code between Nmap
and Nping.


Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]