[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nmap-hackers
Subject:    nmap 3.20 statistics patch
From:       sigtrap <sigtrap () as5-5-7 ! bi ! s ! bonet ! se>
Date:       2003-04-22 22:32:35
[Download RAW message or body]

Background:
The scan can go on for a while if you are scanning firewalled hosts. 
There are nmap switches to increase ports per second, but how much? 
I am now releasing a new better version of the patch that works with nmap 3.20.
(Not tested with nmap 3.25)

nmap 3.20 statistics patch:
I have added a switch that prints two lines of statistics. 
The new -c switch guesses how long time the scan will take. 
Output example: 
Starting nmap V. 3.20 ( http://www.insecure.org/nmap/ ) 
Tried: 192 (150 resends) 
P/S: 12.00 ETS: 9 

The -c switch shows how many ports that has been tested, resends, 
ports per second and the estimated remaining time of scan. 

Patch with: 
tar -xvjf nmap-3.2X.tar.bz2
cd nmap-3.2X 
patch -p1 < PATH_TO/nmap-3.20_statistics-1.diff 

nmap-3.20_statistics-1.diff is a nmap hack. It is not an official 
nmap patch. 
Feel free to forward it if you like it. 

//Ian Vitek
mailto:remove.ian.vitek@sigtrap.org (remove remove)

The release will take place at Lackerbiten (Stockholm, Sweden) 2003-04-24 18:00.
More information:
http://www.sekure.net/ssnig/




--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help@insecure.org . List run by ezmlm-idx (www.ezmlm.org).

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic