From 3ce0321e1fb6d9e9965a77e27e83eb2bd6acf405 Mon Sep 17 00:00:00 2001 From: david Date: Thu, 16 Jul 2009 22:11:03 +0000 Subject: [PATCH] Document UDP probe payloads in the Reference Guide. --- docs/refguide.xml | 42 ++++++++++++++++++++++++++++++++++-------- 1 file changed, 34 insertions(+), 8 deletions(-) diff --git a/docs/refguide.xml b/docs/refguide.xml index 83a14faa6..03f73b6df 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -605,10 +605,20 @@ you would expect. UDP ping + payloads, protocol-specificprotocol-specific payloads Another host discovery option is the UDP ping, which - sends an empty (unless is - specified) UDP packet to the given ports. The port list + sends a UDP packet to the given ports. For most ports, the + packet will be empty, though for a few a protocol-specific + payload will be sent that is more likely to get a + response.protocol-specific payloadsUDP + See the file + payload.ccpayload.cc + for exactly which ports have payloads. The + + option sends a fixed-length random payload for all ports. + + The port list takes the same format as with the previously discussed and options. If no ports are specified, the default is 40125. This default @@ -775,9 +785,12 @@ you would expect. in nmap.h. Note that for the ICMP, IGMP, TCP (protocol 6), UDP (protocol 17) and SCTP (protocol 132), the packets are sent - with the proper protocol headers while other protocols are + with the proper protocol + headersprotocol-specific payloadsIP + while other protocols are sent with no additional data beyond the IP header (unless the - option is specified). + + option is specified). This host discovery method looks for either responses using the same protocol as a probe, or ICMP protocol @@ -1185,8 +1198,13 @@ can be combined with a TCP scan type such as SYN scan () to check both protocols during the same run. -UDP scan works by sending an empty (no data) UDP header to every -targeted port. If an ICMP port unreachable error (type 3, code 3) is +UDP scan works by sending a UDP packet to every +targeted port. For some common ports such as 53 and 161, a +protocol-specific payload is sent, but for most ports the packet is +empty.protocol-specific payloadsUDP +The option can be used to send a +fixed-length random payload to every port. +If an ICMP port unreachable error (type 3, code 3) is returned, the port is closed. Other ICMP unreachable errors (type 3, codes 1, 2, 9, 10, or 13) mark the port as filtered. Occasionally, a service will respond with a UDP packet, proving that it is open. If @@ -3134,9 +3152,17 @@ support the option completely, as does UDP scan. Normally Nmap sends minimalist packets containing only a header. So its TCP packets are generally 40 - bytes and ICMP echo requests are just 28. This option + bytes and ICMP echo requests are just 28. Some + UDP portsprotocol-specific payloadsUDP + and IP protocolsprotocol-specific payloadsIP + get a custom payload by default. + This option tells Nmap to append the given number of random bytes to - most of the packets it sends. OS detection () packets + most of the packets it sends, and not to use any + protocol-specific payloads. (Use + for no random or protocol-specific + payloads.protocol-specific payloadsdisabling with + OS detection () packets are not affectedno effect in OS detection because accuracy there requires probe consistency, but most pinging and portscan packets support this. It slows things down a little, but can make a scan slightly less