> On Wed, 15 Sep 2004, Radu Naidinescu wrote:

>> salutare!
>>
>> Slackware 9.1, kernel 2.4.22, nmap 3.70(in urma unui update al
>> nmap-ului care vine cu slack 9.1 si care facea aceleasi probleme)
>>
>> eth0: 10.0.0.1/24
>> eth1: 192.168.0.1/24
>>
>> vreau sa scanez de pe slack ip-ul 192.168.0.4, portul 1989
>> initial am incercat:
>>
>> [EMAIL PROTECTED]:~# nmap -P0 -sS -p 1989 192.168.0.4
>>
>> sperand ca o sa-si dea singur seama ca e cazul sa puna ip-ul sursa
>> 192.168.0.1, apoi am incercat:
>>
>> [EMAIL PROTECTED]:~# nmap -P0 -sS -p 1989 -S 192.168.0.1 192.168.0.4
>>
>> dar tot degeaba:
>>
>> [EMAIL PROTECTED]:~# tcpdump -i eth1 -n 'port 1989'
>>
>> 22:45:46.612549 a.b.c.d.55579 > 192.168.0.4.1989: S
>>  1824550321:1824550321(0) win 1024
>> etc.etc.(nici una nu e cu 192.168.0.1)
>>
>> imi scapa mie ceva sau e o buba la nmap?
>>

> maibe. La mine in man zice
> -e <interface>
>                Tells  nmap  what interface to send and receive packets on.
>                Nmap should be able to detect this but it will tell you  if
>                it cannot.

tot dracu' ala (nu) face! am incercat -e -S simultan si fiecare pe
rand! nu vrea si pace! trimite ca nebunu pachete cu sursa aia!

> eeeeeeeeeeeee ;-)
> /~ $ nmap -v

> Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-09-15
> (slak 10 kernel 2.6.x)




--- 
Detalii despre listele noastre de mail: http://www.lug.ro/


Raspunde prin e-mail lui