On Wed, 15 Sep 2004, Radu Naidinescu wrote:

> salutare!
>
> Slackware 9.1, kernel 2.4.22, nmap 3.70(in urma unui update al
> nmap-ului care vine cu slack 9.1 si care facea aceleasi probleme)
>
> eth0: 10.0.0.1/24
> eth1: 192.168.0.1/24
>
> vreau sa scanez de pe slack ip-ul 192.168.0.4, portul 1989
> initial am incercat:
>
> [EMAIL PROTECTED]:~# nmap -P0 -sS -p 1989 192.168.0.4
>
> sperand ca o sa-si dea singur seama ca e cazul sa puna ip-ul sursa
> 192.168.0.1, apoi am incercat:
>
> [EMAIL PROTECTED]:~# nmap -P0 -sS -p 1989 -S 192.168.0.1 192.168.0.4
>
> dar tot degeaba:
>
> [EMAIL PROTECTED]:~# tcpdump -i eth1 -n 'port 1989'
>
> 22:45:46.612549 a.b.c.d.55579 > 192.168.0.4.1989: S
>  1824550321:1824550321(0) win 1024
> etc.etc.(nici una nu e cu 192.168.0.1)
>
> imi scapa mie ceva sau e o buba la nmap?
>

maibe. La mine in man zice
-e <interface>
               Tells  nmap  what interface to send and receive packets on.
               Nmap should be able to detect this but it will tell you  if
               it cannot.

eeeeeeeeeeeee ;-)
/~ $ nmap -v

Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-09-15
(slak 10 kernel 2.6.x)


--
"A mouse is a device used to point at
the xterm you want to type in".
Kim Alm on a.s.r.

--- 
Detalii despre listele noastre de mail: http://www.lug.ro/


Raspunde prin e-mail lui