Nmap Development mailing list archives
Re: Minor nmap feature request with great payback
From: David Fifield <david () bamsoftware com>
Date: Sun, 8 Nov 2009 14:10:17 -0700
On Sun, Nov 08, 2009 at 11:54:53AM -0500, Jon Kibler wrote:
When scanning a network, it is often helpful to know the IP address and TTL that responded to a probe. Currently, there are several ways to dump packet details, but these do not exactly produce "clean" output. What I would like to see is a new option, "--reason-details" that gives not only the reason for determining that a port was open/closed/filtered/etc., but also gives the IP and TTL of the packet that sent the response.
We do already keep track of the IP address and TTL. This is from
portreasons.h:
/* stored inside a Port Object and describes
* why a port is in a specific state */
typedef struct port_reason {
reason_t reason_id;
struct in_addr ip_addr;
unsigned short ttl;
int state;
} state_reason_t;
I seem to remember having seen "admin-prohibited from X.X.X.X" before.
Maybe there's some bug preventing it from being printed?
David Fifield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
Current thread:
- Minor nmap feature request with great payback Jon Kibler (Nov 08)
- Re: Minor nmap feature request with great payback Rob Nicholls (Nov 08)
- Re: Minor nmap feature request with great payback Jon Kibler (Nov 08)
- Re: Minor nmap feature request with great payback David Fifield (Nov 08)
- Re: Minor nmap feature request with great payback David Fifield (Nov 16)
- Re: Minor nmap feature request with great payback Rob Nicholls (Nov 08)
