[prev in list] [next in list] [prev in thread] [next in thread]
List: nmap-hackers
Subject: nmap 3.20 statistics patch
From: sigtrap <sigtrap () as5-5-7 ! bi ! s ! bonet ! se>
Date: 2003-04-22 22:32:35
[Download RAW message or body]
Background:
The scan can go on for a while if you are scanning firewalled hosts.
There are nmap switches to increase ports per second, but how much?
I am now releasing a new better version of the patch that works with nmap 3.20.
(Not tested with nmap 3.25)
nmap 3.20 statistics patch:
I have added a switch that prints two lines of statistics.
The new -c switch guesses how long time the scan will take.
Output example:
Starting nmap V. 3.20 ( http://www.insecure.org/nmap/ )
Tried: 192 (150 resends)
P/S: 12.00 ETS: 9
The -c switch shows how many ports that has been tested, resends,
ports per second and the estimated remaining time of scan.
Patch with:
tar -xvjf nmap-3.2X.tar.bz2
cd nmap-3.2X
patch -p1 < PATH_TO/nmap-3.20_statistics-1.diff
nmap-3.20_statistics-1.diff is a nmap hack. It is not an official
nmap patch.
Feel free to forward it if you like it.
//Ian Vitek
mailto:remove.ian.vitek@sigtrap.org (remove remove)
The release will take place at Lackerbiten (Stockholm, Sweden) 2003-04-24 18:00.
More information:
http://www.sekure.net/ssnig/
--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to
nmap-hackers-help@insecure.org . List run by ezmlm-idx (www.ezmlm.org).
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic