Nmap Development mailing list archives
Re: backorifice-brute page
From: Gorjan Petrovski <mogi57 () gmail com>
Date: Thu, 19 May 2011 13:46:10 +0200
Hi Toni, We thought long and hard about the circumstances under which the script to run. Since the only way of finding out whether a password is incorrect was through a timeout, and this service isn't quite the popular one, we decided to make the ports argument mandatory so it doesn't run by default. If it detects an open|filtered 31337/udp port, it suggests that it could be run against it. As for the summary, I think it's good to have it. Most of Nmap's users aren't typical users anyway, so they might use some insight into the building blocks of a certain script. It's a quite subjective topic. :-) Thanks, Gorjan On May 19, 2011 11:13 AM, "Toni Ruottu" <toni.ruottu () iki fi> wrote: _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- backorifice-brute page Toni Ruottu (May 19)
- <Possible follow-ups>
- Re: backorifice-brute page Gorjan Petrovski (May 19)
- Re: backorifice-brute page Toni Ruottu (May 19)
- Re: backorifice-brute page Gorjan Petrovski (May 19)
- Re: backorifice-brute page David Fifield (May 19)
- Re: backorifice-brute page Gorjan Petrovski (May 19)
- Re: backorifice-brute page Toni Ruottu (May 19)