Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: backorifice-brute page
From: Gorjan Petrovski <mogi57 () gmail com>
Date: Thu, 19 May 2011 13:46:10 +0200

Hi Toni,

We thought long and hard about the circumstances under which the script to
run. Since the only way of finding out whether a password is incorrect was
through a timeout, and this service isn't quite the popular one, we decided
to make the ports argument mandatory so it doesn't run by default. If it
detects an open|filtered 31337/udp port, it suggests that it could be run
against it.

As for the summary, I think it's good to have it. Most of Nmap's users
aren't typical users anyway, so they might use some insight into the
building blocks of a certain script. It's a quite subjective topic. :-)

Thanks,
Gorjan
On May 19, 2011 11:13 AM, "Toni Ruottu" <toni.ruottu () iki fi> wrote:
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]