Open infracritical opened 7 years ago
Wanted to provide a graphical representation of what I think is the process. Essentially, 'iptables' is what's performing all of the heavy lifting, right?
Hi @infracritical ! If you want know the original port scanned by tools like Nmap, you can use the iptables logging for that. Due to forwarding you cant use python server for that. Here you can read more about that logging feature!
This might take a while to explain, but I will do my best.
When I conduct a port scan using 'nmap', I would like to know the port that it is trying to connect to. So, in this case, port 23 (telnet). Once port 23 is connected by 'nmap', I'd like to know on the server side that port 23 was just scanned from the client.
I don't profess to know Python (am a newbie when it comes to this object-oriented language), but so far, have had little to no luck, as Python doesn't seem to offer you more granular features when it comes to socketed connections.
Additionally, since port 8080 is acting as the proxy-forwarder, how can I ensure that I report back that it's port 23...and NOT port 8080?