mirror of
https://github.com/nmap/nmap.git
synced 2025-12-21 06:59:01 +00:00
Minor source code header improvements
This commit is contained in:
24
COPYING
24
COPYING
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
MACLookup.cc
24
MACLookup.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
MACLookup.h
24
MACLookup.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
NmapOps.cc
24
NmapOps.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
NmapOps.h
24
NmapOps.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
Target.cc
24
Target.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
Target.h
24
Target.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
charpool.cc
24
charpool.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
charpool.h
24
charpool.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
config.h.in
24
config.h.in
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
idle_scan.cc
24
idle_scan.cc
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
idle_scan.h
24
idle_scan.h
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
main.cc
24
main.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap.cc
24
nmap.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap.h
24
nmap.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_dns.cc
24
nmap_dns.cc
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_dns.h
24
nmap_dns.h
@@ -3,17 +3,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_error.h
24
nmap_error.h
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_rpc.cc
24
nmap_rpc.cc
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_rpc.h
24
nmap_rpc.h
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_tty.cc
24
nmap_tty.cc
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
nmap_tty.h
24
nmap_tty.h
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
osscan.cc
24
osscan.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
osscan.h
24
osscan.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
osscan2.cc
24
osscan2.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
osscan2.h
24
osscan2.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
37
output.cc
37
output.cc
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
@@ -1338,7 +1338,7 @@ void printosscanoutput(Target *currenths) {
|
|||||||
log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n");
|
log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n");
|
||||||
}
|
}
|
||||||
if (osscanSys == 2 && !reason) {
|
if (osscanSys == 2 && !reason) {
|
||||||
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n",
|
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
|
||||||
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
||||||
currenths->v4hostip(), distance, currenths->MACAddress(),
|
currenths->v4hostip(), distance, currenths->MACAddress(),
|
||||||
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
||||||
@@ -1364,7 +1364,7 @@ void printosscanoutput(Target *currenths) {
|
|||||||
if ((o.verbose > 1 || o.debugging) && reason)
|
if ((o.verbose > 1 || o.debugging) && reason)
|
||||||
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason);
|
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason);
|
||||||
if (osscanSys == 2 && !reason) {
|
if (osscanSys == 2 && !reason) {
|
||||||
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n",
|
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
|
||||||
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
||||||
currenths->v4hostip(), distance, currenths->MACAddress(),
|
currenths->v4hostip(), distance, currenths->MACAddress(),
|
||||||
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
||||||
@@ -1599,7 +1599,14 @@ void printfinaloutput() {
|
|||||||
if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan &&
|
if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan &&
|
||||||
o.pingtype != PINGTYPE_NONE)
|
o.pingtype != PINGTYPE_NONE)
|
||||||
log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n");
|
log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n");
|
||||||
/* log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT,"\n"); */
|
|
||||||
|
if (o.osscan && o.servicescan)
|
||||||
|
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
|
||||||
|
else if (o.osscan)
|
||||||
|
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
|
||||||
|
else if (o.servicescan)
|
||||||
|
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
|
||||||
|
|
||||||
log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0);
|
log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0);
|
||||||
if (o.verbose && o.isr00t && o.RawScan())
|
if (o.verbose && o.isr00t && o.RawScan())
|
||||||
log_write(LOG_STDOUT|LOG_SKID, " %s\n",
|
log_write(LOG_STDOUT|LOG_SKID, " %s\n",
|
||||||
|
|||||||
24
output.h
24
output.h
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
portlist.cc
24
portlist.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
portlist.h
24
portlist.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
protocols.cc
24
protocols.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
protocols.h
24
protocols.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -12,29 +12,62 @@ sub min($$) {
|
|||||||
return $b;
|
return $b;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sub fpunwrap($) {
|
||||||
|
my $fp = shift();
|
||||||
|
$fp =~ s/^\s*OS://mg;
|
||||||
|
$fp =~ s/\n//g;
|
||||||
|
$fp =~ s/\s+$//g;
|
||||||
|
$fp =~ s/\)/\)\n/g;
|
||||||
|
return $fp;
|
||||||
|
}
|
||||||
|
|
||||||
|
# first read in the fingerprint
|
||||||
|
my $printbuf = "";
|
||||||
|
my $wrapped = 0;
|
||||||
|
|
||||||
while(<>) {
|
while(<>) {
|
||||||
chomp;
|
chomp;
|
||||||
$line = $_;
|
$line = $_;
|
||||||
|
|
||||||
if ($line eq "." || $line eq "") { last; }
|
if (($line eq "." || $line eq "")) {
|
||||||
|
if ($printbuf) { last; }
|
||||||
|
} else { $printbuf .= "$line\n"; }
|
||||||
|
if ($line =~ /^\s*OS:/) { $wrapped = 1; }
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($wrapped) {
|
||||||
|
$printbuf = fpunwrap($printbuf);
|
||||||
|
print "Unwrapped fingerprint:\n$printbuf\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
# At this point I have an unwrapped FP in $printbuf
|
||||||
|
foreach $line (split /\n/, $printbuf) {
|
||||||
|
chomp($line);
|
||||||
|
|
||||||
|
# Itemize the lines we know how to deal with
|
||||||
if (!$line =~ /(Fingerprint\s+\S)|(Class\s+\S)|(^SEQ)|(^OPS)|(^WIN)|(^ECN)|(^T[1-7])|(^U1)|(^IE)|(^Contributed by)/i) { next; }
|
if (!$line =~ /(Fingerprint\s+\S)|(Class\s+\S)|(^SEQ)|(^OPS)|(^WIN)|(^ECN)|(^T[1-7])|(^U1)|(^IE)|(^Contributed by)/i) { next; }
|
||||||
|
|
||||||
|
# If this is coming from the submission form, there may already be a Contributor attached
|
||||||
if ($line =~ /Contributed by (.*)/) {
|
if ($line =~ /Contributed by (.*)/) {
|
||||||
if (!$fp{contrib}) {
|
if (!$fp{contrib}) {
|
||||||
$fp{contrib} = $1;
|
$fp{contrib} = $1;
|
||||||
} else { $fp{contrib} .= ", $1"; }
|
} else { $fp{contrib} .= ", $1"; }
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# We also get a Fingerprint line describing what this system (supposedly) is if it is coming from
|
||||||
|
# the submission CGI.
|
||||||
elsif ($line =~ /Fingerprint\s+(.*)/i) {
|
elsif ($line =~ /Fingerprint\s+(.*)/i) {
|
||||||
$fp{os} = $1;
|
$fp{os} = $1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# If the submitter gave a classification, we have a Class line
|
||||||
elsif ($line =~ /Class\s+(.*)/i) {
|
elsif ($line =~ /Class\s+(.*)/i) {
|
||||||
if (!$fp{class} or !($fp{class} =~ /\Q$line\E/)) {
|
if (!$fp{class} or !($fp{class} =~ /\Q$line\E/)) {
|
||||||
$fp{class} .= $line . "\n";
|
$fp{class} .= $line . "\n";
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# OK, time for the first real fingerprint line! The SEQ line
|
||||||
elsif ($line =~ /SEQ\(CL=([^%\)]+)(%SP=([^%]+)%GCD=([^%\)]+))?(%Val=([0-9A-F]+))?(%TI=([^%\)]+))?(%II=([^%\)]+))?(%SS=([^%\)]+))?(%TS=([^%\)]+))?\)/) {
|
elsif ($line =~ /SEQ\(CL=([^%\)]+)(%SP=([^%]+)%GCD=([^%\)]+))?(%Val=([0-9A-F]+))?(%TI=([^%\)]+))?(%II=([^%\)]+))?(%SS=([^%\)]+))?(%TS=([^%\)]+))?\)/) {
|
||||||
# SEQ
|
# SEQ
|
||||||
$cls = $1;
|
$cls = $1;
|
||||||
@@ -97,13 +130,13 @@ while(<>) {
|
|||||||
|
|
||||||
if ($oldlowlim) {
|
if ($oldlowlim) {
|
||||||
if ($newlowlim != -1) { $newlowlim = max(0, min($oldlowlim, $newlowlim)); }
|
if ($newlowlim != -1) { $newlowlim = max(0, min($oldlowlim, $newlowlim)); }
|
||||||
else { $newlowlim = max(0, min($oldlowlim, hex($sp) - 3)); }
|
else { $newlowlim = max(0, min($oldlowlim, hex($sp))); }
|
||||||
} else {
|
} else {
|
||||||
if ($newlowlim == -1) { $newlowlim = max(0, hex($sp) - 3); }
|
if ($newlowlim == -1) { $newlowlim = max(0, hex($sp)); }
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($newhighlim == -1) {
|
if ($newhighlim == -1) {
|
||||||
$newhighlim = max($oldhighlim, hex($sp) + 3);
|
$newhighlim = max($oldhighlim, hex($sp));
|
||||||
} else {
|
} else {
|
||||||
$newhighlim = max($oldhighlim, $newhighlim);
|
$newhighlim = max($oldhighlim, $newhighlim);
|
||||||
}
|
}
|
||||||
@@ -153,11 +186,11 @@ while(<>) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
} elsif ($line =~ /^OPS/) {
|
} elsif ($line =~ /^OPS/) {
|
||||||
# OPS
|
# Time for the second test line -- Ops (Options)
|
||||||
foreach $num (1 .. 6) {
|
foreach $num (1 .. 6) {
|
||||||
$o = "";
|
$o = "";
|
||||||
$oi = "o$num";
|
$oi = "o$num";
|
||||||
if ($line =~ /[(%]O$num=([0-9A-Z|]*)/) {
|
if ($line =~ /[\(%]O$num=([0-9A-Z|]*)/) {
|
||||||
$o = $1;
|
$o = $1;
|
||||||
if (!$o) { $o = "NULL"; }
|
if (!$o) { $o = "NULL"; }
|
||||||
}
|
}
|
||||||
@@ -171,11 +204,11 @@ while(<>) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} elsif ($line =~ /^WIN/) {
|
} elsif ($line =~ /^WIN/) {
|
||||||
# WIN
|
# WIN - Window values
|
||||||
foreach $num (1 .. 6) {
|
foreach $num (1 .. 6) {
|
||||||
$w = "";
|
$w = "";
|
||||||
$wi = "w$num";
|
$wi = "w$num";
|
||||||
if ($line =~ /[(%]W$num=([0-9A-F|]*)/) {
|
if ($line =~ /[\(%]W$num=([0-9A-F|]*)/) {
|
||||||
$w = $1;
|
$w = $1;
|
||||||
if (!$w) { $w = "NULL"; }
|
if (!$w) { $w = "NULL"; }
|
||||||
}
|
}
|
||||||
@@ -189,31 +222,31 @@ while(<>) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} elsif ($line =~ /^ECN/) {
|
} elsif ($line =~ /^ECN/) {
|
||||||
# ECN
|
# ECN - Explicit Congestion Notification probe response
|
||||||
$resp = $df = $ttl = $win = $ops = $cc = $quirk = "";
|
$resp = $df = $ttl = $win = $ops = $cc = $quirk = "";
|
||||||
|
|
||||||
if ($line =~ /R=([NY])/) {
|
if ($line =~ /R=([NY])/) {
|
||||||
$resp = $1;
|
$resp = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]DF=([NY])/) {
|
if ($line =~ /[\(%]DF=([NY])/) {
|
||||||
$df = $1;
|
$df = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]TG?=([0-9A-F]+)/) {
|
if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
|
||||||
$ttl = $1;
|
$ttl = $1;
|
||||||
if (!$ttl) { $ttl = "NULL"; }
|
if (!$ttl) { $ttl = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]W=([0-9A-F|]*)/) {
|
if ($line =~ /[\(%]W=([0-9A-F|]*)/) {
|
||||||
$win = $1;
|
$win = $1;
|
||||||
if (!$win) { $win = "NULL"; }
|
if (!$win) { $win = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]O=([0-9A-Z|]*)/) {
|
if ($line =~ /[\(%]O=([0-9A-Z|]*)/) {
|
||||||
$ops = $1;
|
$ops = $1;
|
||||||
if (!$ops) { $ops = "NULL"; }
|
if (!$ops) { $ops = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]CC=([NY])/) {
|
if ($line =~ /[\(%]CC=([NY])/) {
|
||||||
$cc = $1;
|
$cc = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]Q=(R?U?)/) {
|
if ($line =~ /[\(%]Q=(R?U?)/) {
|
||||||
$quirk = $1;
|
$quirk = $1;
|
||||||
if (!$quirk) { $quirk = "NULL"; }
|
if (!$quirk) { $quirk = "NULL"; }
|
||||||
}
|
}
|
||||||
@@ -279,36 +312,36 @@ while(<>) {
|
|||||||
if ($line =~ /R=([NY])/) {
|
if ($line =~ /R=([NY])/) {
|
||||||
$resp = $1;
|
$resp = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]DF=([NY])/) {
|
if ($line =~ /[\(%]DF=([NY])/) {
|
||||||
$df = $1;
|
$df = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]TG?=([0-9A-F]+)/) {
|
if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
|
||||||
$ttl = $1;
|
$ttl = $1;
|
||||||
if (!$ttl) { $ttl = "NULL"; }
|
if (!$ttl) { $ttl = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($num != 1 and $line =~ /[(%]W=([0-9A-F|]*)/) {
|
if ($num != 1 and $line =~ /[\(%]W=([0-9A-F|]*)/) {
|
||||||
$win = $1;
|
$win = $1;
|
||||||
if (!$win) { $win = "NULL"; }
|
if (!$win) { $win = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]S=([^%]+)/) {
|
if ($line =~ /[\(%]S=([^%]+)/) {
|
||||||
$seq = $1;
|
$seq = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]A=([^%]+)/) {
|
if ($line =~ /[\(%]A=([^%]+)/) {
|
||||||
$ack = $1;
|
$ack = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]F=([^%]*)/) {
|
if ($line =~ /[\(%]F=([^%]*)/) {
|
||||||
$flags = $1;
|
$flags = $1;
|
||||||
if (!$flags) { $flags = "NULL"; }
|
if (!$flags) { $flags = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($num != 1 and $line =~ /[(%]O=([0-9A-Z|]*)/) {
|
if ($num != 1 and $line =~ /[\(%]O=([0-9A-Z|]*)/) {
|
||||||
$ops = $1;
|
$ops = $1;
|
||||||
if (!$ops) { $ops = "NULL"; }
|
if (!$ops) { $ops = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RD=([0-9A-F]*)/) {
|
if ($line =~ /[\(%]RD=([0-9A-F]*)/) {
|
||||||
$rd = $1;
|
$rd = $1;
|
||||||
if (!$rd) { $rd = "NULL"; }
|
if (!$rd) { $rd = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]Q=(R?U?)/) {
|
if ($line =~ /[\(%]Q=(R?U?)/) {
|
||||||
$quirk = $1;
|
$quirk = $1;
|
||||||
if (!$quirk) { $quirk = "NULL"; }
|
if (!$quirk) { $quirk = "NULL"; }
|
||||||
}
|
}
|
||||||
@@ -396,42 +429,42 @@ while(<>) {
|
|||||||
if ($line =~ /R=([NY])/) {
|
if ($line =~ /R=([NY])/) {
|
||||||
$resp = $1;
|
$resp = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]DF=([NY])/) {
|
if ($line =~ /[\(%]DF=([NY])/) {
|
||||||
$df = $1;
|
$df = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]TG?=([0-9A-F]+)/) {
|
if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
|
||||||
$ttl = $1;
|
$ttl = $1;
|
||||||
if (!$ttl) { $ttl = "NULL"; }
|
if (!$ttl) { $ttl = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]TOS=([^%]+)/) {
|
if ($line =~ /[\(%]TOS=([^%]+)/) {
|
||||||
$tos = $1;
|
$tos = $1;
|
||||||
if (!$tos) { $tos = "NULL"; }
|
if (!$tos) { $tos = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]IPL=([^%]+)/) {
|
if ($line =~ /[\(%]IPL=([^%]+)/) {
|
||||||
$ipl = $1;
|
$ipl = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]UN=([0-9A-F]*)/) {
|
if ($line =~ /[\(%]UN=([0-9A-F]*)/) {
|
||||||
$un = $1;
|
$un = $1;
|
||||||
if (!$un) { $un = "NULL"; }
|
if (!$un) { $un = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RIPL=([^%]+)/) {
|
if ($line =~ /[\(%]RIPL=([^%]+)/) {
|
||||||
$ripl = $1;
|
$ripl = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RID=([^%]+)/) {
|
if ($line =~ /[\(%]RID=([^%]+)/) {
|
||||||
$rid = $1;
|
$rid = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RIPCK=([^%]+)/) {
|
if ($line =~ /[\(%]RIPCK=([^%]+)/) {
|
||||||
$ripck = $1;
|
$ripck = $1;
|
||||||
if (!$ripck) { $ripck = "NULL"; }
|
if (!$ripck) { $ripck = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RUCK=([^%]+)/) {
|
if ($line =~ /[\(%]RUCK=([^%]+)/) {
|
||||||
$ruck = $1;
|
$ruck = $1;
|
||||||
if (!$ruck) { $ruck = "NULL"; }
|
if (!$ruck) { $ruck = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RUL=([^%]+)/) {
|
if ($line =~ /[\(%]RUL=([^%]+)/) {
|
||||||
$rul = $1;
|
$rul = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]RUD=([A-Z|]+)/) {
|
if ($line =~ /[\(%]RUD=([A-Z|]+)/) {
|
||||||
$rud = $1;
|
$rud = $1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -535,24 +568,24 @@ while(<>) {
|
|||||||
if ($line =~ /R=([NY])/) {
|
if ($line =~ /R=([NY])/) {
|
||||||
$resp = $1;
|
$resp = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]DFI=([^%]+)/) {
|
if ($line =~ /[\(%]DFI=([^%]+)/) {
|
||||||
$dfi = $1;
|
$dfi = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]TG?=([0-9A-F]+)/) {
|
if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
|
||||||
$ttl = $1;
|
$ttl = $1;
|
||||||
if (!$ttl) { $ttl = "NULL"; }
|
if (!$ttl) { $ttl = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]TOSI=([^%]+)/) {
|
if ($line =~ /[\(%]TOSI=([^%]+)/) {
|
||||||
$tosi = $1;
|
$tosi = $1;
|
||||||
if (!$tosi) { $tosi = "NULL"; }
|
if (!$tosi) { $tosi = "NULL"; }
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]CD=([^%]+)/) {
|
if ($line =~ /[\(%]CD=([^%]+)/) {
|
||||||
$cd = $1;
|
$cd = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]SI=([^%]+)/) {
|
if ($line =~ /[\(%]SI=([^%]+)/) {
|
||||||
$si = $1;
|
$si = $1;
|
||||||
}
|
}
|
||||||
if ($line =~ /[(%]DLI=([A-Z|]+)/) {
|
if ($line =~ /[\(%]DLI=([A-Z|]+)/) {
|
||||||
$dli = $1;
|
$dli = $1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -616,9 +649,9 @@ while(<>) {
|
|||||||
# OK, now it is time to print out the merged Fprint ...
|
# OK, now it is time to print out the merged Fprint ...
|
||||||
|
|
||||||
# Printing contributed by line was like a magnet for spammers and took
|
# Printing contributed by line was like a magnet for spammers and took
|
||||||
# up a substantial amount of space in the file. Plus may make
|
# up a substantial amount of space in the file.
|
||||||
# licensees nervous.
|
|
||||||
# if ($fp{contrib}) { print "# Contributed by $fp{contrib}\n"; }
|
# if ($fp{contrib}) { print "# Contributed by $fp{contrib}\n"; }
|
||||||
|
|
||||||
print "Fingerprint $fp{os}\n";
|
print "Fingerprint $fp{os}\n";
|
||||||
if ($fp{class}) { print $fp{class}; }
|
if ($fp{class}) { print $fp{class}; }
|
||||||
else { print "Class \n"; }
|
else { print "Class \n"; }
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -1,16 +1,16 @@
|
|||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -46,7 +46,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
services.cc
24
services.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
services.h
24
services.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
targets.cc
24
targets.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
targets.h
24
targets.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
tcpip.cc
24
tcpip.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
tcpip.h
24
tcpip.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
timing.cc
24
timing.cc
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
timing.h
24
timing.h
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
utils.cc
24
utils.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
24
utils.h
24
utils.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
Reference in New Issue
Block a user