mirror of
https://github.com/nmap/nmap.git
synced 2025-12-26 01:19:03 +00:00
43f5db6ce4bd37d5eb5f077c72a624bc28dcb9b4
DiabloHorn on #nmap noticed that Nmap was ignoring ICMP Time Exceeded messages while trying to map firewall rules using --ttl. get_pcap_result() was handling ICMP type 3 (Destination Unreachable), but not type 11 (Time Exceeded). Now ports that elicit this response will be marked filtered (to be consistent with existing Connect scan behavior) and will report time-exceeded from (IP) for the reason. This was not a common issue, since host discovery already accounted for it. Port scans would only be affected when skipping host discovery.
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.8%
Lua
28.1%
C++
16.7%
Shell
5.8%
Python
4.2%
Other
7.2%