Nmap Development mailing list archives

iperf3 Service Probe PR #416


From: Eric Gershman <eric () hexx us>
Date: Sat, 11 Jun 2016 19:43:18 -0400

Hi nmap-devs,

A remote code execution vulnerability was recently identified in
iperf3, a benchmark tool widely used to test network throughput
performance. I was unable to get a hard match even with aggressive
scanning so I decided to try my hand at service detection. I created a
simple service-probe, the details are in pull request #416:
https://github.com/nmap/nmap/pull/416.

Here is the probe since the change is short:

Probe TCP iperf3 q|000000000000000000000000000000000000000|
ports 5201
match iperf3 m|\t$|


Thanks in advance for any feedback!

Cheers,

Eric Gershman
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: