Nmap Development mailing list archives
Sniffing nmap output
From: W S N <woodenshoe () gmail com>
Date: Sun, 5 Dec 2004 10:07:08 -0500
I'm curious if anyone has ever tried to identify nmap query or response packets promiscuously off a wire? Could one identify other people running scans, or even identify the results of someone else's scan? For instance, I might be able to passively learn the ports or operating system of a system that someone else scanned. Any thoughts? --------------------------------------------------------------------- For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List archive: http://seclists.org
Current thread:
- Sniffing nmap output W S N (Dec 05)
- Re: Sniffing nmap output Martin Mačok (Dec 05)
- <Possible follow-ups>
- RE: Sniffing nmap output Sean Warnock (Dec 05)