Home page logo
/

nmap-dev logo Nmap Development mailing list archives

BNAT scanning
From: Brahim Sakka <brahim.sakka () gmail com>
Date: Wed, 12 Oct 2011 22:20:43 +0100

Hello everyone,

I was reading this Metasploit blog:
https://community.rapid7.com/community/metasploit/blog/2011/08/26/a-tale-from-defcon-and-the-fun-of-bnat
I quote:
"When you run into one of these broken implementations nmap will usually
show the port your trying to reach as "filtered". Most people simply think
this means the port is firewalled off and unreachable. But Jonathan, came up
with a set of tools which can detect BNAT(broken NAT) implementations, and
repair the communications."

The scan technique that can detect BNAT implementations is now implemented
in MetaSploit.
I kindoff find it frustrating that another scanner finds more accurate
results then Nmap does.

Any chances of Nmap getting this BNAT feature at some point?
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
  • BNAT scanning Brahim Sakka (Oct 12)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]