1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-01 04:19:02 +00:00

Copyedit NSEDoc in firewalk.nse.

This commit is contained in:
david
2010-08-31 04:05:31 +00:00
parent 73d8459565
commit 902b39517f

View File

@@ -1,21 +1,21 @@
description = [[
Try to discover firewall rules by using IP TTL expiration technique (method
also known as firewalking").
Try to discover firewall rules with an IP TTL expiration technique known
as "firewalking".
The scan requires a firewall (or "gateway") and a metric (or "target").
For each filtered port on the target, send a probe with an IP TTL one greater
than the number of hops to the gateway. The TTL can be supplied directly or
retrieved by the script from traceroute results. In this second case, the
script requires both the gateway IP address and the Nmap --traceroute flag.
than the number of hops to the gateway. The TTL can be given in two ways:
directly with the <code>firewalk.ttl</code> script argument, or indirectly with
the <code>firewalk.gateway</code> script argument. For
<code>firewalk.gateway</code>, Nmap must be run with the
<code>--traceroute</code> option and the gateway must appear as one of the
traceroute hops.
If the probe is forwarded by the gateway, then we can expect to receive an
ICMP_TIME_EXCEEDED reply from the gateway next hop router, or eventually the
target if it is directly connected to the gateway. Otherwise, the probe will
timeout.
As for UDP scans, this process can be quite slow if lots of ports are blocked
by the gateway.
timeout. As for UDP scans, this process can be quite slow if lots of ports are
blocked by the gateway.
From an original idea of M. Schiffman and D. Goldsmith, authors of the
firewalk tool.