![]() ![]() ![]() The only error message i'm getting happens if i changed socks type from socks4 to socks5 which is: Invalid protocol in proxy specification string: socks5://*.*.*. Had an idea of scanning "localhost" or "127.0.0.1" while using netcat listening on specific port predefined in nmap arguments (other than the exact example above) but netcat doesn't reveal source address of scanning, it just echo the GET request (for port version detection i suppose)Īnd no matter what i put as invalid socks server ip address along with nmap it STILL do the scan I'm not sure if nmap is really using the proxy specified Socks scanner can scan netwok up to 10,000 IP. ![]() Using the following command: nmap -proxy socks4://*.*.*.*:25074 -sV -O -reason When you use a SOCKS5 proxy, data packets from the configured source are routed through a remote server. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |