Nmap Development mailing list archives

Re: MacOS X 10.6.4 - pcap reception via NSE not working?


From: David Fifield <david () bamsoftware com>
Date: Sat, 21 Aug 2010 20:39:44 -0600

On Sat, Aug 21, 2010 at 12:53:32AM +0200, Patrik Karlsson wrote:

On 20 aug 2010, at 18.16, David Fifield wrote:

While this works, I noticed that running a syn-scan (running default
as root) under OS X does not. David, are you seeing this as well, or
is it just me?

It works fine for me.

$ sudo ./nmap -n -Pn --top-ports 5 --packet-trace scanme.nmap.org

Starting Nmap 5.35DC18 ( http://nmap.org ) at 2010-08-21 20:39 MDT
Warning: File ./nmap-services exists, but Nmap is using /usr/local/share/nmap/nmap-services for security and 
consistency reasons.  set NMAPDIR=. to give priority to files in your local directory (may affect the other data files 
too).
SENT (0.0580s) TCP 192.168.0.190:57884 > 64.13.134.52:80 S ttl=56 id=62212 iplen=44  seq=3926224316 win=1024 <mss 1460>
SENT (0.0580s) TCP 192.168.0.190:57884 > 64.13.134.52:443 S ttl=56 id=57348 iplen=44  seq=3926224316 win=1024 <mss 1460>
SENT (0.0580s) TCP 192.168.0.190:57884 > 64.13.134.52:22 S ttl=58 id=36548 iplen=44  seq=3926224316 win=3072 <mss 1460>
SENT (0.0580s) TCP 192.168.0.190:57884 > 64.13.134.52:21 S ttl=50 id=45080 iplen=44  seq=3926224316 win=3072 <mss 1460>
SENT (0.0580s) TCP 192.168.0.190:57884 > 64.13.134.52:23 S ttl=41 id=18859 iplen=44  seq=3926224316 win=2048 <mss 1460>
RCVD (0.1240s) TCP 64.13.134.52:80 > 192.168.0.190:57884 SA ttl=53 id=0 iplen=44  seq=3237513095 win=5840 <mss 1460>
RCVD (0.1280s) TCP 64.13.134.52:22 > 192.168.0.190:57884 SA ttl=53 id=0 iplen=44  seq=3240113636 win=5840 <mss 1460>
SENT (1.3330s) TCP 192.168.0.190:57885 > 64.13.134.52:23 S ttl=55 id=33185 iplen=44  seq=3926158781 win=4096 <mss 1460>
SENT (1.3330s) TCP 192.168.0.190:57885 > 64.13.134.52:21 S ttl=53 id=18192 iplen=44  seq=3926158781 win=2048 <mss 1460>
SENT (1.3330s) TCP 192.168.0.190:57885 > 64.13.134.52:443 S ttl=55 id=2774 iplen=44  seq=3926158781 win=4096 <mss 1460>
Nmap scan report for scanme.nmap.org (64.13.134.52)
Host is up (0.067s latency).
PORT    STATE    SERVICE
21/tcp  filtered ftp
22/tcp  open     ssh
23/tcp  filtered telnet
80/tcp  open     http
443/tcp filtered https

Nmap done: 1 IP address (1 host up) scanned in 1.62 seconds

David Fifield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: