Nmap Development mailing list archives

Re: Nmap Service Detection Proposal


From: H D Moore <hdm () secureaustin com>
Date: Tue, 29 Aug 2000 13:25:42 -0500

Fyodor wrote:

On Tue, 29 Aug 2000, Paul Tod Rieger wrote:

Will this be stealthy?

Not really.  People who need stealth probably won't use it.  They can
assume all the open ports carry the expected service.  Also, you can
always use an anonymous dialup or bounce the service detection through a
series of open SOCKS proxies (note: nmap does not currently have code to
do that for you).

Since nmap uses normal connect() calls with the -T option, you could use
the 'runsocks' utility from www.socks.nec.com to automagically bounce
through a socks server.  This works  for almost any TCP exploit/tool/etc
that doesnt send raw packets.

-HD

---------------------------------------------------------------------
For help using this (nmap-dev) mailing list, send a blank email to 
nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).



Current thread: