Home page logo

nmap-dev logo Nmap Development mailing list archives

RTO OS fingerprinting in NMAP?
From: mike <dmciscobgp () hotmail com>
Date: Mon, 1 Jun 2009 21:14:59 +0000



Was looking on the net at various pen testing topics and came across the RTO fingerprinting method that the scanner 
"RING" utilizes. i know most of you are aware of this tool, as it was released back in 2002, but i was curious if NMAP 
had this method of fingerprinting already enabled


One last thing if i may. does anyone know if the unicornscan and scanrand utilities are dead as far as their status of 
being updated? i would love to see the features those 2 scanners use implemented into NMAP! mainly the way it uses one 
process to send the packets to the wire and having a seperate process to handle the incomming data. i read somewhere 
also that one can do an ARP poison with many different local LAN IPs on your segment as you scan a host. i have found a 
way to do this with NMAP a few years ago: (only with one IP at a time)


-S (IP on your segment you wish to use for the poison) -e eth0 (target ip)


thank you for my 2 cents



HotmailĀ® has a new way to see what's up with your friends.

Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]