Nmap Development mailing list archives

Re: Wireshark dissections of proposed UDP payloads


From: Henri Salo <henri () nerv fi>
Date: Wed, 19 Aug 2009 22:02:15 +0300

On Wed, 19 Aug 2009 11:52:36 -0600
David Fifield <david () bamsoftware com> wrote:

<snip> 
UDP payloads are cool; they turn this output

All 1000 scanned ports are open|filtered because of 1000 no-responses

into this:

Not shown: 998 open|filtered ports
Reason: 998 no-responses
PORT     STATE SERVICE  REASON
123/udp  open  ntp      udp-response
5353/udp open  zeroconf udp-response

If you have a new payload to offer, please send it in, preferably
along with documentation on what it does, what kind of response is
expected, and the command that generated it.

David Fifield

Indeed, nice job guys :)

---
Henri Salo

Attachment: signature.asc
Description:


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

Current thread: