Nmap Development mailing list archives
possible ncat handle leak
From: Jon Greaves <jon_greaves () hotmail com>
Date: Thu, 7 Jan 2010 00:14:01 +0000
Hi, I've just been looking at a copy of ncat (5.10BETA2 on both Windows XP and Windows 2003) I have running to redirect port 143 connections and it looks like there may be a handle leak somewhere running handle.exe against the ncat process before and after a connection and this is the difference 6C4: Thread <Non-existant Process>(7352): 6204 Ncat command I'm running is below ncat -l server1 143 --max-conns 100 --sh-exec "ncat --ssl imap.gmail.com 993" JonnyG _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- possible ncat handle leak Jon Greaves (Jan 06)
- Re: possible ncat handle leak David Fifield (Jan 07)
- RE: possible ncat handle leak Jon Greaves (Jan 14)
- Re: possible ncat handle leak David Fifield (Feb 25)
- RE: possible ncat handle leak Jon Greaves (Jan 14)
- Re: possible ncat handle leak David Fifield (Jan 07)