Nmap Development mailing list archives
Re: Windows scan localhost in version 6
From: Gisle Vanem <gvanem () broadpark no>
Date: Wed, 14 Nov 2012 12:33:56 +0100
"Larry P" <saaz2 () hotmail com> wrote:
I have been using the source spoof technique in attached link to scan the localhost for awhile now. When I upgraded to version 6 on Nmap this no longer works for me,
Why do you need to spoof anything to figure out open ports on localhost? Normal '-sT' scan works fine here: nmap -P0 -sT -p7,9,13,80,135 localhost Starting Nmap 6.02 ( http://nmap.org ) at 2012-11-14 11:25 CET Nmap scan report for localhost (127.0.0.1) Host is up (0.00s latency). PORT STATE SERVICE 7/tcp open echo 9/tcp open discard 13/tcp open daytime 80/tcp filtered http 135/tcp open msrpc --gv _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Windows scan localhost in version 6 Larry P (Nov 13)
- Re: Windows scan localhost in version 6 Gisle Vanem (Nov 14)
- FW: Windows scan localhost in version 6 Larry P (Nov 14)
- Re: Windows scan localhost in version 6 Gisle Vanem (Nov 14)