1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-26 16:19:03 +00:00

add an idea from Drazen

This commit is contained in:
fyodor
2010-08-05 21:50:58 +00:00
parent d67b6d9c10
commit 50ac2bfca9

View File

@@ -157,6 +157,9 @@ o Further brainstorm and consider implementing more prerule/postrule
port numbers individually and the hosts which had that port open
(e.g. so you can see all the ssh servers at once, etc.)
Admittedly you can do that pretty easy with Zenmap instead.
o We could have a prerule sniffer script which uses pcap to sniff
traffic for some short configurable amount of time and then adds the
discovered hosts to the target list.
o [Implemented] dns-zone-transfer
o [Implemented, but a joke] http-california-plates