Nmap Development mailing list archives

Re: decoy scan: no decoy packages


From: mgrd <subscriptions () gerdau freeshell org>
Date: Mon, 03 Jan 2005 21:58:38 +0100

Unknown wrote:
On Tue, 2004-12-14 at 01:15 +0100, mgrd wrote:

Nils Magnus wrote:

Craig Humphrey wrote:

[..]

Is there anything between your scanning host and the target host?  E.g.
routers, firewalls, etc, which might filter out invalid/spoofed traffic.

Both hosts are directly connected to the internet, using a dsl and a analog modem resp., no routers etc.
On both machines the firewall was down (`iptables -F').


Could you give some more detailed information about that set-up? Have
both systems (target and source) official IP addresses? Are both part of
the same DSL provider? A lot DSP and cable modem providers do a lot of
nasty filtering of traffic they don't rate as appropriate from a leaf
node such as a DSL client.

Hmm, hard to say except:
- both systems have public/official IP addresses
- using different providers (target: dsl ; source: analog-dialup)

I think I'll run the same on a local network on the same segment.


Have you hardened the TCP/IP stack by any chance against spoofed
packets?  That could cause an issue.


Again, sorry for the very long delay (disconnected from the Internet)

No, the stack isn't harded against spoofed packets.

---------------------------------------------------------------------
For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List archive: http://seclists.org



Current thread: