Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: Crash report
From: David Fifield <david () bamsoftware com>
Date: Sun, 27 May 2012 23:21:43 -0700

On Thu, May 24, 2012 at 03:45:56PM -0500, Paul Howe wrote:
Command was nmap -sS -sU -p U:69,123 -T4 -A -v ip.address

Version: 6.00
Traceback (most recent call last):
  File "zenmapGUI\ScanInterface.pyo", line 539, in verify_execution
  File "zenmapGUI\ScanInterface.pyo", line 581, in load_from_command
  File "zenmapCore\NetworkInventory.pyo", line 143, in add_scan
  File "zenmapCore\NetworkInventory.pyo", line 217, in _update_host_info
  File "zenmapCore\NmapParser.pyo", line 675, in get_port_protocol_dict
ValueError: invalid literal for int() with base 10: ''

Could you run this command in the command line and send me the XML file?

nmap -oX output.xml -sS -sU -p U:69,123 -T4 -A -v ip.address

David Fifield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]