Nmap Development mailing list archives
Re: Major bug in gen1 tcp sequence prediction
From: Fyodor <fyodor () insecure org>
Date: Tue, 13 Mar 2007 11:05:14 -0700
On Tue, Mar 13, 2007 at 05:56:42PM +0100, Richard van den Berg wrote:
if (si->seqs[seq_response_num] == 0) { /* New response found! */ si->responses++; // si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */ si->seqs[seq_response_num] = fake_seqs[seq_response_num]; /* TCP ISN */
Oops -- great catch! That was debugging code which wasn't supposed to have been left in. I have checked in a fixed version, and it will go out with 4.20ALPHA2 in the next day or two. Cheers, -F _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Major bug in gen1 tcp sequence prediction Richard van den Berg (Mar 13)
- Re: Major bug in gen1 tcp sequence prediction Fyodor (Mar 13)