Penetration Testing mailing list archives

Re: nmap -S option


From: Matthew Closson <matt () scrapshells com>
Date: Sat, 17 Feb 2007 11:46:25 -0500 (EST)

When targetaddress recieves incoming SYN packets from your scan it will see they have a source address of spoofaddress and send its replies to spoofaddress. So unless you have a way of sniffing an intermediary router between targetaddress and spoofaddress you will have no way of seeing if the target is replying and thus get no ports open.

                -Matt-


On Wed, 14 Feb 2007, Baris Erdogan wrote:

Hello,

When i use "nmap -sS targetaddress -S spoofaddress -e eth0" command, nmap does not show open ports at end of scan.
i wanna know whether this is normal case or not.
do i misuse nmap options?
Because when i use nmap with "nmap -sS targetaddress", nmap shows me open ports at the end of scan.

Thanks,

Kind regards,

Baris Erdogan



____________________________________________________________________________________
Any questions? Get answers on any topic at www.Answers.yahoo.com.  Try it now.

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------



------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------


Current thread: