Nmap Development mailing list archives

Re: NSEDoc @output for auth-spoof.nse


From: Diman Todorov <diman.todorov () gmail com>
Date: Fri, 9 Apr 2010 06:20:12 +0100

Probably the nc dies after being connected to the first time (maybe you
did a connect scan?). It works for me with

# ncat -l 113 --sh-exec "echo foo"
$ nmap localhost -p 113 --script=banner,auth-spoof


I should have included my cmd line for starting nmap:

Aristoteles:~ diman$ echo foo | sudo nc -l 113
Aristoteles:nmap-5.21 diman$ ./nmap --datadir .
--script=scripts/banner.nse localhost -p 113 -d9


NSE: ./scripts/banner.nse failed for 127.0.0.1 on tcp port 113.
Message: No Message.


although:

Nmap scan report for localhost (127.0.0.1)
Host is up, received conn-refused (0.00096s latency).
Scanned at 2010-04-09 06:18:51 BST for 0s
PORT    STATE SERVICE REASON
113/tcp open  auth    syn-ack
Final times for host: srtt: 962 rttvar: 2907  to: 100000


so port is recognised as open, I am scanning one script on one port -
anything else I could be missing?

diman
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: