Home page logo

nmap-dev logo Nmap Development mailing list archives

UDP payloads
From: David Fifield <david () bamsoftware com>
Date: Fri, 3 Jul 2009 17:45:34 -0600

During the ping probe effectiveness research, we found that UDP probes
that have a payload work better than those without, and probes with a
payload specific to the protocol work better still. As well as being
more effective for host discovery, meaningful payloads sometimes allow a
port to be classified as open rather than open|filtered.

I have in a branch code that sends protocol payloads for ports 53, 123,
137, 161, and 1434.
        svn co --username guest --password "" svn://svn.insecure.org/nmap-exp/david/nmap-payloads
The payloads are taken from nmap-service-probes. They are:

53: DNSStatusRequest "\0\0\x10\0\0\0\0\0\0\0\0\0"
123: NTPRequest 
137: NBTStat "\x80\xf0\0\x10\0\x01\0\0\0\0\0\0\x20\x43\x4bAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\0\0\x21\0\x01"
161: SNMPv3GetRequest 
1434: Sqlping "\x02"

A requirement for these payloads is that they should be as harmless as
possible. Because they will be sent by default, they should not be
anything that will crash a device, annoy an administrator, or change
state on a server.

I'm not an expert at any of the protocols above. So my question is, are
any of these probes too intrusive to be sent by default with every ping
or port scan probe? I'd like a yes/no for each of them before merging
the branch. For a couple of these we have options: port 53 also has
DNSVersionBindReq and port 161 also has SNMPv1public.

David Fifield

Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]