Nmap Development mailing list archives

By Date By Thread Can you send the Nmap Project some scan data? From: Daniel Miller <dmiller () nmap com>

Date: Tue, 9 Oct 2018 13:21:57 -0500

Nmap community members and developers, The Nmap Project is in need of current port scans in order to update the open-port frequency data that Nmap uses to determine which ports to scan. This data is used every time a user scans the default 1000 ports, and it is based on scan data that is over 10 years old. A lot has changed in that time, and Nmap's port data is no longer up-to-date. We are already doing scans of the public Internet for this purpose. What we desperately need is port scans of *internal* networks, behind the firewalls and NAT, from as many different sources as possible. Ideal data would be all-port scans (-p 1-65535), but everything is helpful, especially scans that include more than the current default 1000 ports or that include UDP or SCTP port scan results. In order to make sharing scans safer and easier, I've attached a couple of scripts that can be used to strip the output files of any identifying information, including service and OS fingerprinting results, hostnames, IP addresses, and traceroute data. Our preference is for XML output files, which can be processed with nmap-sanitize.py. If you have gnmap scan output instead, gnmap-convert.pl will convert it into a stripped-down XML format. I really appreciate any help you can provide in this regard. Accurate port frequency data will result in faster and more complete scan results for everyone. Dan Attachment: nmap-sanitize.py

Description: Attachment: gnmap-convert.pl

Description: _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/ By Date By Thread Current thread: Can you send the Nmap Project some scan data? Daniel Miller (Oct 09)