Nmap Development mailing list archives

Sniffing nmap output


From: W S N <woodenshoe () gmail com>
Date: Sun, 5 Dec 2004 10:07:08 -0500

I'm curious if anyone has ever tried to identify nmap query or
response packets promiscuously off a wire? Could one identify other
people running scans, or even identify the results of someone else's
scan? For instance, I might be able to passively learn the ports or
operating system of a system that someone else scanned. Any thoughts?

---------------------------------------------------------------------
For help using this (nmap-dev) mailing list, send a blank email to 
nmap-dev-help () insecure org . List archive: http://seclists.org



Current thread: