Nmap Development mailing list archives

pcap processing


From: Robert Kat <r33dtard () gmail com>
Date: Thu, 23 Sep 2010 07:43:40 -0400

Morning!
  I am trying to generate a HTTP GET request to an apache web server by
using the pcap interface of nmap.  I am able to send the server the SYN
packet and it replys with the SYN/ACK (verified via Wireshark).  But when I
get the SYN/ACK from the server, someone sends out an RST which messes with
my ACK and subsequent sends.  Is nmap sending this out for me?  If so why
and how can I prevent it.  I have looked at the path-mtu, ipidseq scripts as
examples they just are not doing what I am trying to do.

  Yes I know that I can use the connect and send methods and not worry about
the low-level packet stuff but that defeats me having some fun and learning.

TIA,
Tim
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: