Nmap Development mailing list archives

Re: SIP version detection script


From: Patrik Karlsson <patrik () cqure net>
Date: Wed, 25 Nov 2009 18:16:26 +0100


On 25 nov 2009, at 17.49, Matt Selsky wrote:

On Nov 24, 2009, at 3:01 AM, Patrik Karlsson wrote:

I have an updated script that does that and works against 5060/tcp and 5061/tcp (SIP TLS).
However, as I posted earlier I realized that there is a static probe in nmap-service-probes that already works 
against 5060/tcp. So I'm guessing that same probe could be sent to 5060/udp as well and make my script redundant?

Do the new entries in nmap-service-probes work against your 5061 SIP TLS server?
I'm only running TLS on the proxy, and it seems to work:

Starting Nmap 5.00 ( http://nmap.org ) at 2009-11-25 18:14 CET
Interesting ports on 192.168.56.3:
PORT     STATE SERVICE   VERSION
5060/tcp open  sip-proxy OpenSER SIP Server 1.3.2-tls (x86_64/linux)

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.45 seconds

//
Patrik
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: