Nmap Development mailing list archives
Ron/fuzz-garbage script
From: mike <dmciscobgp () hotmail com>
Date: Sat, 7 Nov 2009 01:03:55 +0000
Ron not sure if this is a windows thing or not. i noticed the output after i tested it and i set the args value for "stopafter" to just 10 bytes. the output from nmap reports this as "10 bytes sent" howver i noticed that what was sent to the socket in testing was the 1024 bytes default value. seting the chunksize is apparently the only way i can control the bytes to be the exact value that nmap reports back as what was sent All did anyone decide to investigate and possibly clean up the script error/tail call() debug messages i reported last time. i beleive i mentioned 3 or 4 that had them i was also curious about another topic. using source port 0 for scanning. i remember years back when using nmap, one could use the source port as 0/zero, even though that is not considered a port. i liked the fact you could scan a target that most people with IDSs and firewalls that worked by filtering through source/dest sometimes could not handle. did this option/ability get thrown out due to recent socket limitations on windows or was it the pcap upgrades that broke it? thank you m|ke _________________________________________________________________ Find the right PC with Windows 7 and Windows Live. http://www.microsoft.com/Windows/pc-scout/laptop-set-criteria.aspx?cbid=wl&filt=200,2400,10,19,1,3,1,7,50,650,2,12,0,1000&cat=1,2,3,4,5,6&brands=5,6,7,8,9,10,11,12,13,14,15,16&addf=4,5,9&ocid=PID24727::T:WLMTAGL:ON:WL:en-US:WWL_WIN_evergreen2:112009 _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Ron/fuzz-garbage script mike (Nov 06)
- Re: Ron/fuzz-garbage script Ron (Nov 06)
- <Possible follow-ups>
- Ron/fuzz-garbage script mike (Nov 06)
- Re: Ron/fuzz-garbage script Ron (Nov 06)