Nmap Development mailing list archives

Re: pcap processing


From: Ron <ron () skullsecurity net>
Date: Thu, 23 Sep 2010 08:31:49 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The RST packet is most likely being sent out by your OS. The easiest way to solve it might be with a firewall rule that 
prevents the RST from being sent. On Linux that's pretty straight forward, on Windows not so much. :)

Ron

On Thu, 23 Sep 2010 07:43:40 -0400 Robert Kat <r33dtard () gmail com> wrote:
Morning!
  I am trying to generate a HTTP GET request to an apache web server
by using the pcap interface of nmap.  I am able to send the server
the SYN packet and it replys with the SYN/ACK (verified via
Wireshark).  But when I get the SYN/ACK from the server, someone
sends out an RST which messes with my ACK and subsequent sends.  Is
nmap sending this out for me?  If so why and how can I prevent it.  I
have looked at the path-mtu, ipidseq scripts as examples they just
are not doing what I am trying to do.

  Yes I know that I can use the connect and send methods and not
worry about the low-level packet stuff but that defeats me having
some fun and learning.

TIA,
Tim
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkybVsUACgkQ2t2zxlt4g/Q8FACeO9fUsKmzIZmy1E66fI5JQS+i
YhYAn259bZu8raLXewavd78ZYC/9N3tu
=XAp9
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: