mirror of
https://github.com/nmap/nmap.git
synced 2025-12-10 09:49:05 +00:00
Port scan pings happen against heavily firewalled hosts and the like when Nmap is not receiving enough responses to normal scan to properly calculate timing variables and detect packet drops. This patch increases the maximum per-target frequency of these probes to one every 1.25 seconds rather than one every five seconds
This commit is contained in:
@@ -1324,7 +1324,7 @@ static void init_perf_values(struct ultra_scan_performance_vars *perf) {
|
||||
perf->cc_scale_max = 50;
|
||||
perf->initial_ccthresh = 75;
|
||||
perf->ping_magnifier = 3;
|
||||
perf->pingtime = 5000000;
|
||||
perf->pingtime = 1250000;
|
||||
perf->group_drop_cwnd_divisor = 2.0;
|
||||
/* Change the amount that ccthresh drops based on the timing level. */
|
||||
double ccthresh_divisor;
|
||||
|
||||
Reference in New Issue
Block a user