any solution? Noob here. stack traceback: [C]: in function 'assert' /usr/bin/../share/nmap/nse_main.lua:1287: in main chunk [C]: in ? QUITTING!
-
-
-
Did you remove () from the wget URL?
- Još 6 drugih odgovora
Novi razgovor -
-
-
Hey have a question... How to identify which UDP ports are open? nmap shows open | filtered in udp even though the port is blocked via iptables... iperf also doesn't help in this case... How does one proceed? Thanks in advance.
-
This is just how UDP works. Receiver never responds to any packets and that's why it's so hard to determine if port is open/filtered/closed. Here's how nmap does it: > ICMP port unreachable error: Closed/Filtered > Response: Open (prolly a honeypot) > Otherwise: Open/Filtered
- Još 1 odgovor
Novi razgovor -
-
-
Actually our Vulners NSE is packed in latest nmap by default ;)
-
That's great, congrats
Kraj razgovora
Novi razgovor -
-
-
You may also be interested in Flan Scan from Cloudflare. —https://github.com/cloudflare/flan
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Nice one! I've been using the http://Vulners.com API and the Burp plugin but this way is more direct, Thanks!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
BEAST!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
sweer
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.