Nmap Development mailing list archives
RTO OS fingerprinting in NMAP?
From: mike <dmciscobgp () hotmail com>
Date: Mon, 1 Jun 2009 21:14:59 +0000
Hello! Was looking on the net at various pen testing topics and came across the RTO fingerprinting method that the scanner "RING" utilizes. i know most of you are aware of this tool, as it was released back in 2002, but i was curious if NMAP had this method of fingerprinting already enabled One last thing if i may. does anyone know if the unicornscan and scanrand utilities are dead as far as their status of being updated? i would love to see the features those 2 scanners use implemented into NMAP! mainly the way it uses one process to send the packets to the wire and having a seperate process to handle the incomming data. i read somewhere also that one can do an ARP poison with many different local LAN IPs on your segment as you scan a host. i have found a way to do this with NMAP a few years ago: (only with one IP at a time) -S (IP on your segment you wish to use for the poison) -e eth0 (target ip) thank you for my 2 cents Mike _________________________________________________________________ HotmailĀ® has a new way to see what's up with your friends. http://windowslive.com/Tutorial/Hotmail/WhatsNew?ocid=TXT_TAGLM_WL_HM_Tutorial_WhatsNew1_052009 _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- RTO OS fingerprinting in NMAP? mike (Jun 01)
- Re: RTO OS fingerprinting in NMAP? David Fifield (Jun 01)