Nmap Development mailing list archives
Re: pcap processing
From: Ron <ron () skullsecurity net>
Date: Thu, 23 Sep 2010 08:31:49 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The RST packet is most likely being sent out by your OS. The easiest way to solve it might be with a firewall rule that prevents the RST from being sent. On Linux that's pretty straight forward, on Windows not so much. :) Ron On Thu, 23 Sep 2010 07:43:40 -0400 Robert Kat <r33dtard () gmail com> wrote:
Morning! I am trying to generate a HTTP GET request to an apache web server by using the pcap interface of nmap. I am able to send the server the SYN packet and it replys with the SYN/ACK (verified via Wireshark). But when I get the SYN/ACK from the server, someone sends out an RST which messes with my ACK and subsequent sends. Is nmap sending this out for me? If so why and how can I prevent it. I have looked at the path-mtu, ipidseq scripts as examples they just are not doing what I am trying to do. Yes I know that I can use the connect and send methods and not worry about the low-level packet stuff but that defeats me having some fun and learning. TIA, Tim _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkybVsUACgkQ2t2zxlt4g/Q8FACeO9fUsKmzIZmy1E66fI5JQS+i YhYAn259bZu8raLXewavd78ZYC/9N3tu =XAp9 -----END PGP SIGNATURE----- _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- pcap processing Robert Kat (Sep 23)
- Re: pcap processing Ron (Sep 23)
- Re: pcap processing Robert Kat (Sep 23)
- Re: pcap processing Kris Katterjohn (Sep 23)
- Re: pcap processing Robert Kat (Sep 23)
- Re: pcap processing Ron (Sep 23)
- Re: pcap processing Robert Kat (Sep 23)
- Re: pcap processing Ron (Sep 23)