Nmap Development mailing list archives
possible ncat handle leak
From: Jon Greaves <jon_greaves () hotmail com>
Date: Thu, 7 Jan 2010 00:14:01 +0000
Hi,
I've just been looking at a copy of ncat (5.10BETA2 on both Windows XP and Windows 2003) I have running to redirect
port 143 connections and it looks like there may be a handle leak somewhere running handle.exe against the ncat process
before and after a connection and this is the difference
6C4: Thread <Non-existant Process>(7352): 6204
Ncat command I'm running is below
ncat -l server1 143 --max-conns 100 --sh-exec "ncat --ssl imap.gmail.com 993"
JonnyG
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
Current thread:
- possible ncat handle leak Jon Greaves (Jan 06)
- Re: possible ncat handle leak David Fifield (Jan 07)
- RE: possible ncat handle leak Jon Greaves (Jan 14)
- Re: possible ncat handle leak David Fifield (Feb 25)
- RE: possible ncat handle leak Jon Greaves (Jan 14)
- Re: possible ncat handle leak David Fifield (Jan 07)
