From owner-cvs-all Mon Jul 9 5:22: 7 2001 Delivered-To: cvs-all@freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 7C01B37B401; Mon, 9 Jul 2001 05:22:04 -0700 (PDT) (envelope-from obrien@FreeBSD.org) Received: (from obrien@localhost) by freefall.freebsd.org (8.11.3/8.11.3) id f69CM4n51348; Mon, 9 Jul 2001 05:22:04 -0700 (PDT) (envelope-from obrien) Message-Id: <200107091222.f69CM4n51348@freefall.freebsd.org> From: "David E. O'Brien" Date: Mon, 9 Jul 2001 05:22:04 -0700 (PDT) To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/nmap Makefile distinfo X-FreeBSD-CVS-Branch: HEAD Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG obrien 2001/07/09 05:22:04 PDT Modified files: security/nmap Makefile distinfo Log: Update to version 2.54 Beta 26. The coolest feature is a new scan type -- Idlescan! The quick synopsis is that this is a completely blind scan (meaning no packets are sent to the target from your real IP address). Instead, a unique side-channel attack exploits predictable "IP fragmentation ID" sequence generation on the zombie host to glean information about the open ports on the target. Revision Changes Path 1.45 +2 -2 ports/security/nmap/Makefile 1.29 +1 -1 ports/security/nmap/distinfo To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message