mirror of
https://github.com/nmap/nmap.git
synced 2025-12-29 19:09:01 +00:00
A few changes involving the use of -sV with other scan types [is the CHANGELOG entry useful?]
This commit is contained in:
@@ -34,6 +34,13 @@ o Fixed a traceroute bug related to tracing between interfaces of a
|
||||
multi-homed host. Thanks to David Fifield for reporting the problem
|
||||
and Eddie Bell for the fix.
|
||||
|
||||
o Service detection (-sV) is now disabled when used with the IPProto Scan
|
||||
(-sO). Nmap would try to run the Service Scan after the IPProto Scan,
|
||||
which would cause it to fail without outputting the protocol information,
|
||||
or performing any other tasks (like Traceroute). The Service Detection
|
||||
line informing you where to send incorrect results is no longer outputted
|
||||
when using the Service Scan with the Ping Scan (-sP) either. [Kris]
|
||||
|
||||
o Updated IANA assignment IP list for random IP (-iR) generation. [Kris]
|
||||
|
||||
4.21ALPHA4
|
||||
|
||||
@@ -437,6 +437,14 @@ void NmapOps::ValidateOptions() {
|
||||
fatal("WARNING: OS Scan is unreliable with a ping scan. You need to use a scan type along with it, such as -sS, -sT, -sF, etc instead of -sP");
|
||||
}
|
||||
|
||||
if (servicescan && ipprotscan) {
|
||||
error("WARNING: Disabling Service Scan (-sV) as it is incompatible with the IPProto Scan (-sO)");
|
||||
servicescan = 0;
|
||||
}
|
||||
|
||||
if (servicescan && pingscan)
|
||||
servicescan = 0;
|
||||
|
||||
if (defeat_rst_ratelimit && !synscan) {
|
||||
fatal("Option --defeat-rst-ratelimit works only with a SYN scan (-sS)");
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user