Nmap Development mailing list archives
Re: Minor nmap feature request with great payback
From: David Fifield <david () bamsoftware com>
Date: Sun, 8 Nov 2009 14:10:17 -0700
On Sun, Nov 08, 2009 at 11:54:53AM -0500, Jon Kibler wrote:
When scanning a network, it is often helpful to know the IP address and TTL that responded to a probe. Currently, there are several ways to dump packet details, but these do not exactly produce "clean" output. What I would like to see is a new option, "--reason-details" that gives not only the reason for determining that a port was open/closed/filtered/etc., but also gives the IP and TTL of the packet that sent the response.
We do already keep track of the IP address and TTL. This is from portreasons.h: /* stored inside a Port Object and describes * why a port is in a specific state */ typedef struct port_reason { reason_t reason_id; struct in_addr ip_addr; unsigned short ttl; int state; } state_reason_t; I seem to remember having seen "admin-prohibited from X.X.X.X" before. Maybe there's some bug preventing it from being printed? David Fifield _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Minor nmap feature request with great payback Jon Kibler (Nov 08)
- Re: Minor nmap feature request with great payback Rob Nicholls (Nov 08)
- Re: Minor nmap feature request with great payback Jon Kibler (Nov 08)
- Re: Minor nmap feature request with great payback David Fifield (Nov 08)
- Re: Minor nmap feature request with great payback David Fifield (Nov 16)
- Re: Minor nmap feature request with great payback Rob Nicholls (Nov 08)