Nmap Development mailing list archives

possible ncat handle leak


From: Jon Greaves <jon_greaves () hotmail com>
Date: Thu, 7 Jan 2010 00:14:01 +0000


Hi,

I've just been looking at a copy of ncat (5.10BETA2 on both Windows XP and Windows 2003)  I have running to redirect 
port 143 connections and it looks like there may be a handle leak somewhere running handle.exe against the ncat process 
before and after a connection and this is the difference

  6C4: Thread        <Non-existant Process>(7352): 6204

Ncat command I'm running is below

ncat -l server1 143 --max-conns 100 --sh-exec "ncat --ssl imap.gmail.com 993"
JonnyG
                                          
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: