Nmap Development mailing list archives
Re: '--packet_trace' option under Windows
From: Fyodor <fyodor () insecure org>
Date: Fri, 25 Apr 2003 00:43:56 -0700
On Tue, Apr 01, 2003 at 12:51:08PM +0200, Roberto Travagliante wrote:
I'm sending to you the patch (modified files) as .ZIP hoping it can be interesting. Into these files there are notes about added code. The nmap version is 3.20 (I downloaded it two days ago).
Thanks! Nmap 3.25 (and 3.26) now include this functionality. I ended up doing it in a slightly different way though.
I'm also sending to you code for a new option '--ttl_trace <ttl>' that increments automatically TTL for every packet sent (for TTL-tracerouting), and I added a simple message (showed if this option is used) about
I agree that this functionality can be very useful. But I'm not sure whether it belongs in Nmap or lower-level tools like hping2. Here is an example: # hping2 -t 1 --traceroute -p 80 -S www.microsoft.com eth0 default routing interface selected (according to /proc) HPING www.microsoft.com (eth0 207.46.249.27): S set, 40 headers + 0 data bytes 1->TTL 0 during transit from 64.71.128.193 (gige-g0-0-19.gsr12008.fmt.he.net) 2->TTL 0 during transit from 216.218.130.1 (gsr12012.sjc.he.net) 3->TTL 0 during transit from 198.32.176.77 (paix.hotmail.net) 4->TTL 0 during transit from 207.46.34.65 (unknown host name) 5->TTL 0 during transit from 207.46.33.29 (pos15-0.core1.sea1.us.msn.net) 6->TTL 0 during transit from 207.46.36.210 (unknown host name) 7->TTL 0 during transit from 207.46.155.10 (unknown host name) 8->TTL 0 during transit from 207.46.224.146 (unknown host name) 46 bytes from 207.46.249.27: flags=SA seq=8 ttl=56 id=33585 win=16384 rtt=22.4 ms Cheers, -F --------------------------------------------------------------------- For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Re: '--packet_trace' option under Windows Fyodor (Apr 25)