mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
http-server-header: interfere less with -sV results, especially softmatches
This commit is contained in:
@@ -72,17 +72,19 @@ action = function(host, port)
|
||||
local headers = {}
|
||||
for _, result in ipairs(responses) do
|
||||
if string.match(result, "^HTTP/1.[01] %d%d%d") then
|
||||
port.version.service = "http"
|
||||
|
||||
local http_server = string.match(result, "\n[Ss][Ee][Rr][Vv][Ee][Rr]:[ \t]*(.-)\r?\n")
|
||||
|
||||
-- Avoid setting version info if -sV scan already got a match
|
||||
if port.version.product == nil and (port.version.name_confidence or 0) <= 3 then
|
||||
port.version.service = "http"
|
||||
port.version.product = http_server
|
||||
end
|
||||
|
||||
-- Setting "softmatched" allows the service fingerprint to be printed
|
||||
nmap.set_port_version(host, port, "softmatched")
|
||||
elseif port.version.product == http_server then
|
||||
-- If we already detected exactly this, no need to report it
|
||||
http_server = nil
|
||||
end
|
||||
|
||||
if http_server then
|
||||
headers[http_server] = true
|
||||
|
||||
Reference in New Issue
Block a user