Nmap Development mailing list archives
pcap processing
From: Robert Kat <r33dtard () gmail com>
Date: Thu, 23 Sep 2010 07:43:40 -0400
Morning! I am trying to generate a HTTP GET request to an apache web server by using the pcap interface of nmap. I am able to send the server the SYN packet and it replys with the SYN/ACK (verified via Wireshark). But when I get the SYN/ACK from the server, someone sends out an RST which messes with my ACK and subsequent sends. Is nmap sending this out for me? If so why and how can I prevent it. I have looked at the path-mtu, ipidseq scripts as examples they just are not doing what I am trying to do. Yes I know that I can use the connect and send methods and not worry about the low-level packet stuff but that defeats me having some fun and learning. TIA, Tim _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- pcap processing Robert Kat (Sep 23)
- Re: pcap processing Ron (Sep 23)
- Re: pcap processing Robert Kat (Sep 23)
- Re: pcap processing Kris Katterjohn (Sep 23)
- Re: pcap processing Robert Kat (Sep 23)
- Re: pcap processing Ron (Sep 23)
- Re: pcap processing Robert Kat (Sep 23)
- Re: pcap processing Ron (Sep 23)