1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-21 06:59:01 +00:00

Minor source code header improvements

This commit is contained in:
fyodor
2006-08-25 01:47:49 +00:00
parent 1d2069a2bd
commit b28d51167c
70 changed files with 1520 additions and 1480 deletions

24
COPYING
View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

24
main.cc
View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

24
nmap.cc
View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

24
nmap.h
View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -3,17 +3,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -49,7 +49,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *
@@ -1338,7 +1338,7 @@ void printosscanoutput(Target *currenths) {
log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n"); log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n");
} }
if (osscanSys == 2 && !reason) { if (osscanSys == 2 && !reason) {
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n", log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
mergeFPs(FPR->FPs, FPR->numFPs, true, mergeFPs(FPR->FPs, FPR->numFPs, true,
currenths->v4hostip(), distance, currenths->MACAddress(), currenths->v4hostip(), distance, currenths->MACAddress(),
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport, FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
@@ -1364,7 +1364,7 @@ void printosscanoutput(Target *currenths) {
if ((o.verbose > 1 || o.debugging) && reason) if ((o.verbose > 1 || o.debugging) && reason)
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason); log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason);
if (osscanSys == 2 && !reason) { if (osscanSys == 2 && !reason) {
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n", log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
mergeFPs(FPR->FPs, FPR->numFPs, true, mergeFPs(FPR->FPs, FPR->numFPs, true,
currenths->v4hostip(), distance, currenths->MACAddress(), currenths->v4hostip(), distance, currenths->MACAddress(),
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport, FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
@@ -1599,7 +1599,14 @@ void printfinaloutput() {
if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan && if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan &&
o.pingtype != PINGTYPE_NONE) o.pingtype != PINGTYPE_NONE)
log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n"); log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n");
/* log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT,"\n"); */
if (o.osscan && o.servicescan)
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
else if (o.osscan)
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
else if (o.servicescan)
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0); log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0);
if (o.verbose && o.isr00t && o.RawScan()) if (o.verbose && o.isr00t && o.RawScan())
log_write(LOG_STDOUT|LOG_SKID, " %s\n", log_write(LOG_STDOUT|LOG_SKID, " %s\n",

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -12,29 +12,62 @@ sub min($$) {
return $b; return $b;
} }
sub fpunwrap($) {
my $fp = shift();
$fp =~ s/^\s*OS://mg;
$fp =~ s/\n//g;
$fp =~ s/\s+$//g;
$fp =~ s/\)/\)\n/g;
return $fp;
}
# first read in the fingerprint
my $printbuf = "";
my $wrapped = 0;
while(<>) { while(<>) {
chomp; chomp;
$line = $_; $line = $_;
if ($line eq "." || $line eq "") { last; } if (($line eq "." || $line eq "")) {
if ($printbuf) { last; }
} else { $printbuf .= "$line\n"; }
if ($line =~ /^\s*OS:/) { $wrapped = 1; }
}
if ($wrapped) {
$printbuf = fpunwrap($printbuf);
print "Unwrapped fingerprint:\n$printbuf\n";
}
# At this point I have an unwrapped FP in $printbuf
foreach $line (split /\n/, $printbuf) {
chomp($line);
# Itemize the lines we know how to deal with
if (!$line =~ /(Fingerprint\s+\S)|(Class\s+\S)|(^SEQ)|(^OPS)|(^WIN)|(^ECN)|(^T[1-7])|(^U1)|(^IE)|(^Contributed by)/i) { next; } if (!$line =~ /(Fingerprint\s+\S)|(Class\s+\S)|(^SEQ)|(^OPS)|(^WIN)|(^ECN)|(^T[1-7])|(^U1)|(^IE)|(^Contributed by)/i) { next; }
# If this is coming from the submission form, there may already be a Contributor attached
if ($line =~ /Contributed by (.*)/) { if ($line =~ /Contributed by (.*)/) {
if (!$fp{contrib}) { if (!$fp{contrib}) {
$fp{contrib} = $1; $fp{contrib} = $1;
} else { $fp{contrib} .= ", $1"; } } else { $fp{contrib} .= ", $1"; }
} }
# We also get a Fingerprint line describing what this system (supposedly) is if it is coming from
# the submission CGI.
elsif ($line =~ /Fingerprint\s+(.*)/i) { elsif ($line =~ /Fingerprint\s+(.*)/i) {
$fp{os} = $1; $fp{os} = $1;
} }
# If the submitter gave a classification, we have a Class line
elsif ($line =~ /Class\s+(.*)/i) { elsif ($line =~ /Class\s+(.*)/i) {
if (!$fp{class} or !($fp{class} =~ /\Q$line\E/)) { if (!$fp{class} or !($fp{class} =~ /\Q$line\E/)) {
$fp{class} .= $line . "\n"; $fp{class} .= $line . "\n";
} }
} }
# OK, time for the first real fingerprint line! The SEQ line
elsif ($line =~ /SEQ\(CL=([^%\)]+)(%SP=([^%]+)%GCD=([^%\)]+))?(%Val=([0-9A-F]+))?(%TI=([^%\)]+))?(%II=([^%\)]+))?(%SS=([^%\)]+))?(%TS=([^%\)]+))?\)/) { elsif ($line =~ /SEQ\(CL=([^%\)]+)(%SP=([^%]+)%GCD=([^%\)]+))?(%Val=([0-9A-F]+))?(%TI=([^%\)]+))?(%II=([^%\)]+))?(%SS=([^%\)]+))?(%TS=([^%\)]+))?\)/) {
# SEQ # SEQ
$cls = $1; $cls = $1;
@@ -97,13 +130,13 @@ while(<>) {
if ($oldlowlim) { if ($oldlowlim) {
if ($newlowlim != -1) { $newlowlim = max(0, min($oldlowlim, $newlowlim)); } if ($newlowlim != -1) { $newlowlim = max(0, min($oldlowlim, $newlowlim)); }
else { $newlowlim = max(0, min($oldlowlim, hex($sp) - 3)); } else { $newlowlim = max(0, min($oldlowlim, hex($sp))); }
} else { } else {
if ($newlowlim == -1) { $newlowlim = max(0, hex($sp) - 3); } if ($newlowlim == -1) { $newlowlim = max(0, hex($sp)); }
} }
if ($newhighlim == -1) { if ($newhighlim == -1) {
$newhighlim = max($oldhighlim, hex($sp) + 3); $newhighlim = max($oldhighlim, hex($sp));
} else { } else {
$newhighlim = max($oldhighlim, $newhighlim); $newhighlim = max($oldhighlim, $newhighlim);
} }
@@ -153,11 +186,11 @@ while(<>) {
} }
} elsif ($line =~ /^OPS/) { } elsif ($line =~ /^OPS/) {
# OPS # Time for the second test line -- Ops (Options)
foreach $num (1 .. 6) { foreach $num (1 .. 6) {
$o = ""; $o = "";
$oi = "o$num"; $oi = "o$num";
if ($line =~ /[(%]O$num=([0-9A-Z|]*)/) { if ($line =~ /[\(%]O$num=([0-9A-Z|]*)/) {
$o = $1; $o = $1;
if (!$o) { $o = "NULL"; } if (!$o) { $o = "NULL"; }
} }
@@ -171,11 +204,11 @@ while(<>) {
} }
} }
} elsif ($line =~ /^WIN/) { } elsif ($line =~ /^WIN/) {
# WIN # WIN - Window values
foreach $num (1 .. 6) { foreach $num (1 .. 6) {
$w = ""; $w = "";
$wi = "w$num"; $wi = "w$num";
if ($line =~ /[(%]W$num=([0-9A-F|]*)/) { if ($line =~ /[\(%]W$num=([0-9A-F|]*)/) {
$w = $1; $w = $1;
if (!$w) { $w = "NULL"; } if (!$w) { $w = "NULL"; }
} }
@@ -189,31 +222,31 @@ while(<>) {
} }
} }
} elsif ($line =~ /^ECN/) { } elsif ($line =~ /^ECN/) {
# ECN # ECN - Explicit Congestion Notification probe response
$resp = $df = $ttl = $win = $ops = $cc = $quirk = ""; $resp = $df = $ttl = $win = $ops = $cc = $quirk = "";
if ($line =~ /R=([NY])/) { if ($line =~ /R=([NY])/) {
$resp = $1; $resp = $1;
} }
if ($line =~ /[(%]DF=([NY])/) { if ($line =~ /[\(%]DF=([NY])/) {
$df = $1; $df = $1;
} }
if ($line =~ /[(%]TG?=([0-9A-F]+)/) { if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
$ttl = $1; $ttl = $1;
if (!$ttl) { $ttl = "NULL"; } if (!$ttl) { $ttl = "NULL"; }
} }
if ($line =~ /[(%]W=([0-9A-F|]*)/) { if ($line =~ /[\(%]W=([0-9A-F|]*)/) {
$win = $1; $win = $1;
if (!$win) { $win = "NULL"; } if (!$win) { $win = "NULL"; }
} }
if ($line =~ /[(%]O=([0-9A-Z|]*)/) { if ($line =~ /[\(%]O=([0-9A-Z|]*)/) {
$ops = $1; $ops = $1;
if (!$ops) { $ops = "NULL"; } if (!$ops) { $ops = "NULL"; }
} }
if ($line =~ /[(%]CC=([NY])/) { if ($line =~ /[\(%]CC=([NY])/) {
$cc = $1; $cc = $1;
} }
if ($line =~ /[(%]Q=(R?U?)/) { if ($line =~ /[\(%]Q=(R?U?)/) {
$quirk = $1; $quirk = $1;
if (!$quirk) { $quirk = "NULL"; } if (!$quirk) { $quirk = "NULL"; }
} }
@@ -279,36 +312,36 @@ while(<>) {
if ($line =~ /R=([NY])/) { if ($line =~ /R=([NY])/) {
$resp = $1; $resp = $1;
} }
if ($line =~ /[(%]DF=([NY])/) { if ($line =~ /[\(%]DF=([NY])/) {
$df = $1; $df = $1;
} }
if ($line =~ /[(%]TG?=([0-9A-F]+)/) { if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
$ttl = $1; $ttl = $1;
if (!$ttl) { $ttl = "NULL"; } if (!$ttl) { $ttl = "NULL"; }
} }
if ($num != 1 and $line =~ /[(%]W=([0-9A-F|]*)/) { if ($num != 1 and $line =~ /[\(%]W=([0-9A-F|]*)/) {
$win = $1; $win = $1;
if (!$win) { $win = "NULL"; } if (!$win) { $win = "NULL"; }
} }
if ($line =~ /[(%]S=([^%]+)/) { if ($line =~ /[\(%]S=([^%]+)/) {
$seq = $1; $seq = $1;
} }
if ($line =~ /[(%]A=([^%]+)/) { if ($line =~ /[\(%]A=([^%]+)/) {
$ack = $1; $ack = $1;
} }
if ($line =~ /[(%]F=([^%]*)/) { if ($line =~ /[\(%]F=([^%]*)/) {
$flags = $1; $flags = $1;
if (!$flags) { $flags = "NULL"; } if (!$flags) { $flags = "NULL"; }
} }
if ($num != 1 and $line =~ /[(%]O=([0-9A-Z|]*)/) { if ($num != 1 and $line =~ /[\(%]O=([0-9A-Z|]*)/) {
$ops = $1; $ops = $1;
if (!$ops) { $ops = "NULL"; } if (!$ops) { $ops = "NULL"; }
} }
if ($line =~ /[(%]RD=([0-9A-F]*)/) { if ($line =~ /[\(%]RD=([0-9A-F]*)/) {
$rd = $1; $rd = $1;
if (!$rd) { $rd = "NULL"; } if (!$rd) { $rd = "NULL"; }
} }
if ($line =~ /[(%]Q=(R?U?)/) { if ($line =~ /[\(%]Q=(R?U?)/) {
$quirk = $1; $quirk = $1;
if (!$quirk) { $quirk = "NULL"; } if (!$quirk) { $quirk = "NULL"; }
} }
@@ -396,42 +429,42 @@ while(<>) {
if ($line =~ /R=([NY])/) { if ($line =~ /R=([NY])/) {
$resp = $1; $resp = $1;
} }
if ($line =~ /[(%]DF=([NY])/) { if ($line =~ /[\(%]DF=([NY])/) {
$df = $1; $df = $1;
} }
if ($line =~ /[(%]TG?=([0-9A-F]+)/) { if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
$ttl = $1; $ttl = $1;
if (!$ttl) { $ttl = "NULL"; } if (!$ttl) { $ttl = "NULL"; }
} }
if ($line =~ /[(%]TOS=([^%]+)/) { if ($line =~ /[\(%]TOS=([^%]+)/) {
$tos = $1; $tos = $1;
if (!$tos) { $tos = "NULL"; } if (!$tos) { $tos = "NULL"; }
} }
if ($line =~ /[(%]IPL=([^%]+)/) { if ($line =~ /[\(%]IPL=([^%]+)/) {
$ipl = $1; $ipl = $1;
} }
if ($line =~ /[(%]UN=([0-9A-F]*)/) { if ($line =~ /[\(%]UN=([0-9A-F]*)/) {
$un = $1; $un = $1;
if (!$un) { $un = "NULL"; } if (!$un) { $un = "NULL"; }
} }
if ($line =~ /[(%]RIPL=([^%]+)/) { if ($line =~ /[\(%]RIPL=([^%]+)/) {
$ripl = $1; $ripl = $1;
} }
if ($line =~ /[(%]RID=([^%]+)/) { if ($line =~ /[\(%]RID=([^%]+)/) {
$rid = $1; $rid = $1;
} }
if ($line =~ /[(%]RIPCK=([^%]+)/) { if ($line =~ /[\(%]RIPCK=([^%]+)/) {
$ripck = $1; $ripck = $1;
if (!$ripck) { $ripck = "NULL"; } if (!$ripck) { $ripck = "NULL"; }
} }
if ($line =~ /[(%]RUCK=([^%]+)/) { if ($line =~ /[\(%]RUCK=([^%]+)/) {
$ruck = $1; $ruck = $1;
if (!$ruck) { $ruck = "NULL"; } if (!$ruck) { $ruck = "NULL"; }
} }
if ($line =~ /[(%]RUL=([^%]+)/) { if ($line =~ /[\(%]RUL=([^%]+)/) {
$rul = $1; $rul = $1;
} }
if ($line =~ /[(%]RUD=([A-Z|]+)/) { if ($line =~ /[\(%]RUD=([A-Z|]+)/) {
$rud = $1; $rud = $1;
} }
@@ -535,24 +568,24 @@ while(<>) {
if ($line =~ /R=([NY])/) { if ($line =~ /R=([NY])/) {
$resp = $1; $resp = $1;
} }
if ($line =~ /[(%]DFI=([^%]+)/) { if ($line =~ /[\(%]DFI=([^%]+)/) {
$dfi = $1; $dfi = $1;
} }
if ($line =~ /[(%]TG?=([0-9A-F]+)/) { if ($line =~ /[\(%]TG?=([0-9A-F]+)/) {
$ttl = $1; $ttl = $1;
if (!$ttl) { $ttl = "NULL"; } if (!$ttl) { $ttl = "NULL"; }
} }
if ($line =~ /[(%]TOSI=([^%]+)/) { if ($line =~ /[\(%]TOSI=([^%]+)/) {
$tosi = $1; $tosi = $1;
if (!$tosi) { $tosi = "NULL"; } if (!$tosi) { $tosi = "NULL"; }
} }
if ($line =~ /[(%]CD=([^%]+)/) { if ($line =~ /[\(%]CD=([^%]+)/) {
$cd = $1; $cd = $1;
} }
if ($line =~ /[(%]SI=([^%]+)/) { if ($line =~ /[\(%]SI=([^%]+)/) {
$si = $1; $si = $1;
} }
if ($line =~ /[(%]DLI=([A-Z|]+)/) { if ($line =~ /[\(%]DLI=([A-Z|]+)/) {
$dli = $1; $dli = $1;
} }
@@ -616,9 +649,9 @@ while(<>) {
# OK, now it is time to print out the merged Fprint ... # OK, now it is time to print out the merged Fprint ...
# Printing contributed by line was like a magnet for spammers and took # Printing contributed by line was like a magnet for spammers and took
# up a substantial amount of space in the file. Plus may make # up a substantial amount of space in the file.
# licensees nervous.
# if ($fp{contrib}) { print "# Contributed by $fp{contrib}\n"; } # if ($fp{contrib}) { print "# Contributed by $fp{contrib}\n"; }
print "Fingerprint $fp{os}\n"; print "Fingerprint $fp{os}\n";
if ($fp{class}) { print $fp{class}; } if ($fp{class}) { print $fp{class}; }
else { print "Class \n"; } else { print "Class \n"; }

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -1,16 +1,16 @@
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -46,7 +46,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

24
tcpip.h
View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

24
utils.h
View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *