Nmap Development mailing list archives
Re: Wireshark dissections of proposed UDP payloads
From: Henri Salo <henri () nerv fi>
Date: Wed, 19 Aug 2009 22:02:15 +0300
On Wed, 19 Aug 2009 11:52:36 -0600 David Fifield <david () bamsoftware com> wrote: <snip>
UDP payloads are cool; they turn this output All 1000 scanned ports are open|filtered because of 1000 no-responses into this: Not shown: 998 open|filtered ports Reason: 998 no-responses PORT STATE SERVICE REASON 123/udp open ntp udp-response 5353/udp open zeroconf udp-response If you have a new payload to offer, please send it in, preferably along with documentation on what it does, what kind of response is expected, and the command that generated it. David Fifield
Indeed, nice job guys :) --- Henri Salo
Attachment:
signature.asc
Description:
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- UDP payloads David Fifield (Jul 03)
- Re: UDP payloads Tom Sellers (Jul 03)
- Re: UDP payloads David Fifield (Jul 03)
- Re: UDP payloads Luis M. (Jul 04)
- Re: UDP payloads David Fifield (Jul 04)
- Re: UDP payloads kx (Jul 04)
- Re: UDP payloads David Fifield (Jul 04)
- Re: UDP payloads David Fifield (Jul 22)
- Wireshark dissections of proposed UDP payloads David Fifield (Aug 10)
- Re: Wireshark dissections of proposed UDP payloads David Fifield (Aug 19)
- Re: Wireshark dissections of proposed UDP payloads Henri Salo (Aug 19)
- Re: UDP payloads Tom Sellers (Jul 03)