Home > nmap

nmap

Nmap is a project mainly written in ..., based on the WTFPL license.

Patches for nmap

This is a patch to show more details when running nmap, particularly about TTL and filtered states.

I wrote this for my requirements class. I made this guy's dreams come true:

http://seclists.org/nmap-dev/2009/q4/287

Seriously, that guy was so happy, he was like, "dude, I'm really happy". Good for you, man. Glad you like it.

No warranties, no tears. Also a WTFPL license.


To use this thing:

$> svn checkout svn://svn.insecure.org/nmap@21208 && cd nmap $> patch -p1 < /path/to/nmap-reason-details.patch $> ./configure && make && make install

$> nmap -sS scanme.nmap.org --reason-details -n

Starting Nmap 5.36TEST2 ( http://nmap.org ) at 2010-11-28 19:11 MST Nmap scan report for scanme.nmap.org (64.13.134.52) Host is up, received echo-reply (0.057s latency). PORT STATE SERVICE REASON 22/tcp open ssh syn-ack with TTL 52 25/tcp closed smtp reset with TTL 52 53/tcp open domain syn-ack with TTL 52 70/tcp closed gopher reset with TTL 52 80/tcp open http syn-ack with TTL 52 113/tcp closed auth reset with TTL 52 443/tcp filtered https admin-prohibited from 10.0.0.1 with TTL 64 31337/tcp closed Elite reset with TTL 52

Nmap done: 1 IP address (1 host up) scanned in 15.12 seconds