Nmap Development mailing list archives
Re: SIP version detection script
From: Patrik Karlsson <patrik () cqure net>
Date: Wed, 25 Nov 2009 18:16:26 +0100
On 25 nov 2009, at 17.49, Matt Selsky wrote:
On Nov 24, 2009, at 3:01 AM, Patrik Karlsson wrote:I have an updated script that does that and works against 5060/tcp and 5061/tcp (SIP TLS). However, as I posted earlier I realized that there is a static probe in nmap-service-probes that already works against 5060/tcp. So I'm guessing that same probe could be sent to 5060/udp as well and make my script redundant?Do the new entries in nmap-service-probes work against your 5061 SIP TLS server?
I'm only running TLS on the proxy, and it seems to work: Starting Nmap 5.00 ( http://nmap.org ) at 2009-11-25 18:14 CET Interesting ports on 192.168.56.3: PORT STATE SERVICE VERSION 5060/tcp open sip-proxy OpenSER SIP Server 1.3.2-tls (x86_64/linux) Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 11.45 seconds // Patrik _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: SIP version detection script, (continued)
- Re: SIP version detection script Patrik Karlsson (Nov 24)
- Re: SIP version detection script Matt Selsky (Nov 25)
- Re: SIP version detection script Patrik Karlsson (Nov 25)
- Re: SIP version detection script Matt Selsky (Nov 25)
- Re: SIP version detection script Patrik Karlsson (Nov 25)
- Re: SIP version detection script David Fifield (Nov 25)
- Re: SIP version detection script Patrik Karlsson (Nov 26)
- Re: SIP version detection script Matt Selsky (Nov 30)
- Re: SIP version detection script David Fifield (Dec 12)
- Re: SIP version detection script Matt Selsky (Nov 25)
- Re: SIP version detection script Patrik Karlsson (Nov 25)