Home page logo
/

nmap-dev logo Nmap Development mailing list archives

[PATCH] Assume tcpwrapped only if EOF occured within one second
From: Till Maas <opensource () till name>
Date: Fri, 13 Sep 2013 16:05:44 +0200

Hi,

I noticed that nmap assumes that ports are tcpwrapped, if connections
are closed before the probing timeout is hit. This results in bad
findings if the server closes the connection because it uses a shorter
timeout. The attached patch changes this to assume tcpwrapped status
only if the connection is closed within 1 second. This might still lead
to false positives, but probably less.

Regards
Till

Attachment: nmap-tcpwrapped-server-timeout.patch
Description:

_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

  By Date           By Thread  

Current thread:
  • [PATCH] Assume tcpwrapped only if EOF occured within one second Till Maas (Sep 13)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]