1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-24 08:29:04 +00:00
david f45f2f394e Ignore supposed replies with nonsense pingseq/tryno.
If we get a reply that doesn't pass the simple comparison using the
current value of USI->seqmask, then ignore it. Previously we emitted the
message "Bad Sequence number from host %s.\n" and allowed the reply to
match any probe. This only matters when using -g because otherwise we
encode that information in the source port. I think we have addressed
what was mentioned in the TODO comment in r15986. Allowing promiscuous
matching, as was done before, causes the same spurious closed port issue
that was addressed in r29686.
2012-08-28 14:29:23 +00:00
2012-08-02 18:35:36 +00:00
2012-08-13 19:53:38 +00:00
2012-03-07 03:15:51 +00:00
2012-05-27 08:53:32 +00:00
2012-03-07 17:59:55 +00:00
2012-08-28 08:20:31 +00:00
2012-08-28 07:50:09 +00:00
2012-08-03 23:46:06 +00:00
2012-08-28 13:07:19 +00:00
2012-08-28 13:07:19 +00:00
2012-05-27 08:53:32 +00:00
2008-07-31 14:18:21 +00:00
2012-05-27 08:53:32 +00:00
2012-05-27 08:53:32 +00:00
2012-05-27 08:53:32 +00:00
2012-08-04 16:05:24 +00:00
2012-05-27 08:53:32 +00:00
2012-05-27 08:53:32 +00:00
2012-05-27 08:53:32 +00:00
2012-05-27 08:53:32 +00:00
2012-08-28 07:50:30 +00:00
2012-03-19 16:48:27 +00:00
2012-08-14 16:36:25 +00:00
2012-08-14 16:36:25 +00:00
2012-05-05 18:02:34 +00:00

Here is some documentation for Nmap, but these files are much less
comprehensive than what you'll find at the actual Nmap documentation
site ( http://nmap.org ).
Languages
C 37.8%
Lua 28.1%
C++ 16.7%
Shell 5.8%
Python 4.2%
Other 7.2%