Penetration Testing mailing list archives
Re: nmap -S option
From: bariswinston () yahoo com
Date: 17 Feb 2007 08:37:08 -0000
I have sniffed the traffic when i have used -S option. No original IP address are sent over the network and destination system responds to spoofed IP address so nmap cannot capture TCP flags used in TCP packet. Thanks you all. ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- Re: nmap -S option, (continued)
- Re: nmap -S option Francois Yang (Feb 17)
- RE: nmap -S option Earl Carter (ecarter) (Feb 17)
- RE: nmap -S option Shenk, Jerry A (Feb 17)
- RE: nmap -S option Philippe Dumont (Feb 17)
- Re: nmap -S option pentest (Feb 17)
- Re: nmap -S option Tim (Feb 17)
- Re: nmap -S option Dan Catalin Vasile (Feb 17)
- Re: nmap -S option Peter Kosinar (Feb 17)
- Re: nmap -S option Manuel Arostegui (Feb 17)
- Re: nmap -S option Baris Erdogan (Feb 17)
- Re: nmap -S option bariswinston (Feb 17)