Nmap Development mailing list archives
Re: Force TCP traceroute
From: Jochen Bartl <jochenbartl () mailbox org>
Date: Fri, 16 Oct 2015 22:30:06 +0200
Jacek Wielemborek wrote:
To the best of my knowledge, Nmap is trying to use the best probe it found during host discovery. Perhaps adding -PS443 would make it use this protocol?
Unfortunately not. But in that case it doesn't just fallback to icmp/echo requests. nmap -sS -n -Pn -PS3389 --traceroute -p 3389 w.x.y.z Starting Nmap 6.47 ( http://nmap.org ) at 2015-10-16 22:28 CEST Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 2.24 seconds _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Force TCP traceroute Jochen Bartl (Oct 16)
- Re: Force TCP traceroute Jacek Wielemborek (Oct 16)
- Re: Force TCP traceroute Jochen Bartl (Oct 16)
- Re: Force TCP traceroute Jacek Wielemborek (Oct 16)
- Re: Force TCP traceroute Jochen Bartl (Oct 16)
- Re: Force TCP traceroute Jochen Bartl (Oct 16)
- Re: Force TCP traceroute Jacek Wielemborek (Oct 16)
- Re: Force TCP traceroute Fyodor (Oct 17)
- Re: Force TCP traceroute Jochen Bartl (Oct 18)