mirror of
https://github.com/nmap/nmap.git
synced 2025-12-25 00:49:01 +00:00
remove fake_seqs nonsense
This commit is contained in:
@@ -27,6 +27,10 @@ o Nmap now has a public Subversion (SVN) source code repository. See
|
||||
and then the updated usage instructions at
|
||||
http://seclists.org/nmap-dev/2006/q4/0281.html .
|
||||
|
||||
o Fixed a major accuracy bug in gen1 OS detection (some debugging code
|
||||
was accidentally left in). Thanks to Richard van den Berg for finding
|
||||
the problem.
|
||||
|
||||
o Changed the IP protocol scan so that it sends proper IGMP headers when
|
||||
scanning that protocol. This makes it much more likely that the host
|
||||
will respond, proving that it's "open". [Kris]
|
||||
|
||||
@@ -116,8 +116,6 @@
|
||||
# endif
|
||||
#endif
|
||||
|
||||
u32 fake_seqs[6] = { 0x721CF9, 0x721D5F, 0x721DC5, 0x721E2B, 0x721E91, 0x721EF7 };
|
||||
|
||||
extern NmapOps o;
|
||||
|
||||
/* Note that a sport of 0 really will (try to) use zero as the source
|
||||
@@ -810,8 +808,7 @@ static FingerPrint *get_fingerprint(Target *target, struct seq_info *si) {
|
||||
if (si->seqs[seq_response_num] == 0) {
|
||||
/* New response found! */
|
||||
si->responses++;
|
||||
// si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */
|
||||
si->seqs[seq_response_num] = fake_seqs[seq_response_num]; /* TCP ISN */
|
||||
si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */
|
||||
si->ipids[seq_response_num] = ntohs(ip->ip_id);
|
||||
if ((gettcpopt_ts(tcp, ×tamp, NULL) == 0))
|
||||
si->ts_seqclass = TS_SEQ_UNSUPPORTED;
|
||||
|
||||
Reference in New Issue
Block a user