Nmap Announce mailing list archives
Re: getting dirt
From: gk <gk () outlawlabs com>
Date: Thu, 11 Feb 1999 22:07:24 -0700 (MST)
You could use netcat available from ftp.avian.org. Do zone transfers or feed it a network address and scan /24s or something. Use nmap to do a syn scan to see if it's alive and the port is listening, do an OS fingerprint, then use netcat, perl IO::Socket, Socket, or Net::Telnet to grab the banner. I'm actually working on a threaded wrapper for this. You write your own scanning Perl subroutine and this thing will fork off as many as you specify, display realtime stats, and log everything. I've got an alpha version that uses double-forking and named pipes in Perl. Just picked up the Perl Cookbook today and will probably use that to make a 'regular' forking version. And I recompiled Perl to use linuxthreads (by the way, I have the patch to make linuxthreads compile under linux 2.2.1 if anyone's interested). So, I'll probably write a version that takes advantage of Perl Threads.pm shortly as well. Kind of have the Toneloc interface in mind as the way it will look. When it's done, I'll post an URL to the list. [gk] On Thu, 11 Feb 1999, rosteen wrote:
Hello, nmap 2.07 is working well for me. I wanted to know if someone out there that may have a script to go out and grab some of the data that is sent out when you try to connect to a particular port and record it. This will give more "dirt" or more of the person's personalized prompt or web site text. Thanks for any help, Rick
Current thread:
- getting dirt rosteen (Feb 11)
- Re: getting dirt gk (Feb 11)