1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Note a completed task (rpc-grind.nse)

This commit is contained in:
dmiller
2014-05-23 17:58:43 +00:00
parent 187c6a681a
commit e90036697c

View File

@@ -803,10 +803,6 @@ o Provide an option to send a comment in scan packet data for target
SecOps, extension 2147" or --comment "pH33r my l3eT SecOps, extension 2147" or --comment "pH33r my l3eT
s|<iLLz! I'll 0wN UR b0x!" s|<iLLz! I'll 0wN UR b0x!"
o Consider implementing RPC scan with ultra_scan or something else.
Right now it is the only program using pos_scan. On the other hand,
I'm not sure TCP RPC scanning is appropriate for ultra_scan.
o Look at all the pcap functions, there are some like o Look at all the pcap functions, there are some like
pcap_findalldevs() which could be quite useful. There are mails to pcap_findalldevs() which could be quite useful. There are mails to
the Nmap list relating to suggested improvements -- the Nmap list relating to suggested improvements --
@@ -837,6 +833,10 @@ o random tip database
DONE: DONE:
o Consider implementing RPC scan with ultra_scan or something else.
Right now it is the only program using pos_scan. On the other hand,
I'm not sure TCP RPC scanning is appropriate for ultra_scan.
o When Ncat is compiled without OpenSSL, we should still accept the o When Ncat is compiled without OpenSSL, we should still accept the
--ssl argument and just give an error message noting that SSL was not --ssl argument and just give an error message noting that SSL was not
compiled in. This reduces confusion for users compiled in. This reduces confusion for users