Nmap Development mailing list archives
iperf3 Service Probe PR #416
From: Eric Gershman <eric () hexx us>
Date: Sat, 11 Jun 2016 19:43:18 -0400
Hi nmap-devs, A remote code execution vulnerability was recently identified in iperf3, a benchmark tool widely used to test network throughput performance. I was unable to get a hard match even with aggressive scanning so I decided to try my hand at service detection. I created a simple service-probe, the details are in pull request #416: https://github.com/nmap/nmap/pull/416. Here is the probe since the change is short: Probe TCP iperf3 q|000000000000000000000000000000000000000| ports 5201 match iperf3 m|\t$| Thanks in advance for any feedback! Cheers, Eric Gershman _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- iperf3 Service Probe PR #416 Eric Gershman (Jun 11)