Nmap Development mailing list archives
BNAT scanning
From: Brahim Sakka <brahim.sakka () gmail com>
Date: Wed, 12 Oct 2011 22:20:43 +0100
Hello everyone, I was reading this Metasploit blog: https://community.rapid7.com/community/metasploit/blog/2011/08/26/a-tale-from-defcon-and-the-fun-of-bnat I quote: "When you run into one of these broken implementations nmap will usually show the port your trying to reach as "filtered". Most people simply think this means the port is firewalled off and unreachable. But Jonathan, came up with a set of tools which can detect BNAT(broken NAT) implementations, and repair the communications." The scan technique that can detect BNAT implementations is now implemented in MetaSploit. I kindoff find it frustrating that another scanner finds more accurate results then Nmap does. Any chances of Nmap getting this BNAT feature at some point? _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- BNAT scanning Brahim Sakka (Oct 12)