1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Remove/edit references to nmap-payloads. See #2541

This commit is contained in:
dmiller
2023-02-09 17:57:15 +00:00
parent 7bba5dc625
commit a28d9b77f9
4 changed files with 16 additions and 9 deletions

View File

@@ -776,12 +776,14 @@ you would expect.</para>
packet will be empty, though some use a protocol-specific
payload that is more likely to elicit a
response.
<man>The payload database is described at <ulink url="https://nmap.org/book/nmap-payloads.html" />.</man>
<notman>See <xref linkend="nmap-payloads"/> for a description of the database of payloads.</notman>
<indexterm><primary>protocol-specific
payloads</primary><secondary>UDP</secondary></indexterm>Packet
content can also be affected with the <option>--data</option>,
<option>--data-string</option>, and <option>--data-length</option> options.</para>
<indexterm><primary>protocol-specific payloads</primary><secondary>UDP</secondary></indexterm>
The payloads are the same probes used in service and version
detection and are defined in the
<filename>nmap-service-probes</filename>
<indexterm><primary><filename>nmap-service-probes</filename></primary></indexterm>
file. Packet content can also be affected with the
<option>--data</option>, <option>--data-string</option>, and
<option>--data-length</option> options.</para>
<para>The port list
takes the same format as with the previously discussed

View File

@@ -221,7 +221,6 @@ Section "Nmap Core Files" SecCore
File ${STAGE_DIR}\LICENSE
File ${STAGE_DIR}\nmap-mac-prefixes
File ${STAGE_DIR}\nmap-os-db
File ${STAGE_DIR}\nmap-payloads
File ${STAGE_DIR}\nmap-protocols
File ${STAGE_DIR}\nmap-rpc
File ${STAGE_DIR}\nmap-service-probes

View File

@@ -16453,7 +16453,14 @@ sslports 5684
softmatch coap m|^`E|
##############################NEXT PROBE##############################
# DTLS Client Hello. Dissection available in nmap-payloads
# DTLS Client Hello.
# 0x00 - 0x0c : DTLS 1.0, length 52
# 0x0d - 0x18 : ClientHello, length 40, sequence 0, offset 0
# 0x19 - 0x20 : DTLS 1.2
# 0x21 - 0x41 : Random
# 0x42 - 0x43 : Session id length 0, cookie length 0
# 0x44 - 0x47 : Cipher suites, mandatory TLS_RSA_WITH_AES_128_CBC_SHA
# 0x48 - 0x49 : Compressors (NULL)
Probe UDP DTLSSessionReq q|\x16\xfe\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x36\x01\x00\x00\x2a\x00\x00\x00\x00\x00\x00\x00\x2a\xfe\xfd\x00\x00\x00\x00\x7c\x77\x40\x1e\x8a\xc8\x22\xa0\xa0\x18\xff\x93\x08\xca\xac\x0a\x64\x2f\xc9\x22\x64\xbc\x08\xa8\x16\x89\x19\x30\x00\x00\x00\x02\x00\x2f\x01\x00|
rarity 2
ports 443,853,3391,4433,4740,5349,5684,5868,6514,6636,8232,10161,10162,12346,12446,12546,12646,12746,12846,12946,13046

View File

@@ -65,7 +65,6 @@
#define PAYLOAD_H
#include "service_scan.h"
#define PAYLOAD_FILENAME "nmap-payloads"
// Semi-arbitrary limit, but we use u8 for indexing/retrieval
// and we send all payloads at once and need to not overwhelm.