Nmap Development mailing list archives
Re: Service fingerprinting submissions
From: doug () hcsw org
Date: Sat, 19 Apr 2008 12:16:19 -0700
Hi Tavaris,
Brandon is correct: The fingerprints are submitted to the Nmap project
with the expectation that they will not be made public. You are correct
that %90+ of the FPs don't contain sensitive data, there are many
services that will echo the IP of the scanner or the host name of
the target device etc. and these would need to be removed manually.
Honestly, your two best bets are:
* Try to use the nmap-service-probes DB. In general a match line in
this file has almost all the important information about the
submission embedded in it.
* If you have a *simple* perl script or other stats gathering
program you could send it to the list and maybe somebody from
the Nmap project will find the time to run it on the data.
They are stored in mbox format.
Best,
Doug
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Service fingerprinting submissions Thomas Tavaris J (Tavaris) (Apr 18)
- Re: Service fingerprinting submissions Brandon Enright (Apr 18)
- RE: Service fingerprinting submissions Thomas Tavaris J (Tavaris) (Apr 18)
- Re: Service fingerprinting submissions doug (Apr 19)
- services on 64 bit machines swapna prasad (Apr 20)
- Re: services on 64 bit machines doug (Apr 21)
- RE: Service fingerprinting submissions Thomas Tavaris J (Tavaris) (Apr 18)
- Re: Service fingerprinting submissions Brandon Enright (Apr 18)
- <Possible follow-ups>
- Re: Service fingerprinting submissions Gutek (Apr 19)
