Nmap Development mailing list archives
Re: Ncrack command-line interface overview
From: ithilgore <ithilgore.ryu.l () gmail com>
Date: Sat, 16 May 2009 07:43:16 +0300
$ ncrack scanme.nmap.org://telnet 192.168.1.0/31 --list -p 21 Starting Ncrack 0.00001ALPHA ( http://ncrack.org ) at 2009-05-16 06:13 EEST === Targets === Host: 64.13.134.52 telnet:12079 ftp:21 Host: 192.168.1.0 ftp:21 Host: 192.168.1.1 ftp:21
This should be telnet:23 up there. It was caused by a class constructor bug and should be working properly now. _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Ncrack command-line interface overview ithilgore (May 15)
- Re: Ncrack command-line interface overview ithilgore (May 15)
- Re: Ncrack command-line interface overview ithilgore (May 16)
- Re: Ncrack command-line interface overview ithilgore (May 17)
- Re: Ncrack command-line interface overview sara fink (May 17)
- Re: Ncrack command-line interface overview ithilgore (May 17)
- Re: Ncrack command-line interface overview ithilgore (May 18)
- Re: Ncrack command-line interface overview ithilgore (May 17)