1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-25 00:49:01 +00:00

remove fake_seqs nonsense

This commit is contained in:
fyodor
2007-03-13 18:03:21 +00:00
parent e882edf484
commit 43d61bf6b7
2 changed files with 5 additions and 4 deletions

View File

@@ -27,6 +27,10 @@ o Nmap now has a public Subversion (SVN) source code repository. See
and then the updated usage instructions at
http://seclists.org/nmap-dev/2006/q4/0281.html .
o Fixed a major accuracy bug in gen1 OS detection (some debugging code
was accidentally left in). Thanks to Richard van den Berg for finding
the problem.
o Changed the IP protocol scan so that it sends proper IGMP headers when
scanning that protocol. This makes it much more likely that the host
will respond, proving that it's "open". [Kris]

View File

@@ -116,8 +116,6 @@
# endif
#endif
u32 fake_seqs[6] = { 0x721CF9, 0x721D5F, 0x721DC5, 0x721E2B, 0x721E91, 0x721EF7 };
extern NmapOps o;
/* Note that a sport of 0 really will (try to) use zero as the source
@@ -810,8 +808,7 @@ static FingerPrint *get_fingerprint(Target *target, struct seq_info *si) {
if (si->seqs[seq_response_num] == 0) {
/* New response found! */
si->responses++;
// si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */
si->seqs[seq_response_num] = fake_seqs[seq_response_num]; /* TCP ISN */
si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */
si->ipids[seq_response_num] = ntohs(ip->ip_id);
if ((gettcpopt_ts(tcp, &timestamp, NULL) == 0))
si->ts_seqclass = TS_SEQ_UNSUPPORTED;