Nmap Announce mailing list archives

Re: getting dirt


From: gk <gk () outlawlabs com>
Date: Thu, 11 Feb 1999 22:07:24 -0700 (MST)

You could use netcat available from ftp.avian.org.  

Do zone transfers or feed it a network address and scan /24s or something.
Use nmap to do a syn scan to see if it's alive and the port is listening,
do an OS fingerprint, then use netcat, perl IO::Socket, Socket, or
Net::Telnet to grab the banner.  

I'm actually working on a threaded wrapper for this.  You write your own
scanning Perl subroutine and this thing will fork off as many as you
specify, display realtime stats, and log everything.  I've got an alpha
version that uses double-forking and named pipes in Perl.  Just picked up
the Perl Cookbook today and will probably use that to make a 'regular'
forking version.  And I recompiled Perl to use linuxthreads (by the way, I
have the patch to make linuxthreads compile under linux 2.2.1 if anyone's
interested).  So, I'll probably write a version that takes advantage of
Perl Threads.pm shortly as well.

Kind of have the Toneloc interface in mind as the way it will look.  When
it's done, I'll post an URL to the list.

[gk]


On Thu, 11 Feb 1999, rosteen wrote:

Hello,
nmap 2.07 is working well for me.
I wanted to know if someone out there that may have a script to go out
and grab some of the data that is sent out when you try to connect to a
particular port and record it. This will give more "dirt" or more of the
person's personalized prompt or web site text.
Thanks for any help,
Rick




Current thread: