> On Wed, 15 Sep 2004, Radu Naidinescu wrote: >> salutare! >> >> Slackware 9.1, kernel 2.4.22, nmap 3.70(in urma unui update al >> nmap-ului care vine cu slack 9.1 si care facea aceleasi probleme) >> >> eth0: 10.0.0.1/24 >> eth1: 192.168.0.1/24 >> >> vreau sa scanez de pe slack ip-ul 192.168.0.4, portul 1989 >> initial am incercat: >> >> [EMAIL PROTECTED]:~# nmap -P0 -sS -p 1989 192.168.0.4 >> >> sperand ca o sa-si dea singur seama ca e cazul sa puna ip-ul sursa >> 192.168.0.1, apoi am incercat: >> >> [EMAIL PROTECTED]:~# nmap -P0 -sS -p 1989 -S 192.168.0.1 192.168.0.4 >> >> dar tot degeaba: >> >> [EMAIL PROTECTED]:~# tcpdump -i eth1 -n 'port 1989' >> >> 22:45:46.612549 a.b.c.d.55579 > 192.168.0.4.1989: S >> 1824550321:1824550321(0) win 1024 >> etc.etc.(nici una nu e cu 192.168.0.1) >> >> imi scapa mie ceva sau e o buba la nmap? >>
> maibe. La mine in man zice > -e <interface> > Tells nmap what interface to send and receive packets on. > Nmap should be able to detect this but it will tell you if > it cannot. tot dracu' ala (nu) face! am incercat -e -S simultan si fiecare pe rand! nu vrea si pace! trimite ca nebunu pachete cu sursa aia! > eeeeeeeeeeeee ;-) > /~ $ nmap -v > Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-09-15 > (slak 10 kernel 2.6.x) --- Detalii despre listele noastre de mail: http://www.lug.ro/
