1
0
mirror of https://github.com/nmap/nmap.git synced 2026-02-06 21:46:34 +00:00
Commit Graph

765 Commits

Author SHA1 Message Date
david
671167227f Add the oracle-sid-brute script from Patrik Karlsson. 2009-12-28 17:35:46 +00:00
david
d5b2404441 Fix the RTSPRequest service probe, which I accidentally changed to read
"RTSP/2.0" instead of "RTSP/1.0" during an integration commit, r16327.
Patch by Matt Selsky.
2009-12-24 22:41:24 +00:00
fyodor
1b776a8b2b Update changelong in prep for next release 2009-12-24 21:51:27 +00:00
david
f8ed0bfefa Fix a crash when filtering with inroute: in a scan that doesn't have
traceroute data.
2009-12-23 01:43:50 +00:00
david
d75ba5b6aa Add a Kerberos service probe (udp/88) and match lines contributed by
Patrik Karlsson.
2009-12-22 16:47:24 +00:00
david
a1566e895f Add to CHANGELOG:
o Reduced memory usage in several areas. The size of the internal
  representation of nmap-os-db was reduced more than 90%. The size of
  individual Port structures without service scan results was reduced
  about 70%. When a port receives no response, Nmap now avoids
  allocating a Port structure at all, so scans against filtered hosts
  can be light on memory. Thanks to Pavel Kankovsky for the Post size
  reduction patch. [David]
2009-12-20 03:35:45 +00:00
david
f2ae05968b Add the scripts
citrix-brute-xml
  citrix-enum-apps
  citrix-enum-apps-xml
  citrix-enum-servers
  citrix-enum-servers-xml
and the citrixxml modules, all by Patrik Karlsson.
2009-12-14 07:30:38 +00:00
david
3f7be738ad Allow encoding OID component greater than 127 in snmp.lua. Previously
the code just took each value mod 256 and stored it as a single byte.
The OID 1.3.1000.5 would encode as follows

tag len 1.3 1000%256  5
 06  03  2b       e8 05

What you're supposed to do is break each value into 7-bit chunks, and
set the high bit in every octet but the last. Now it is correctly
encoded as

tag len 1.3 1000  5
 06  04  2b 8768 05

The length also would not have been correct for lengths over 127, and
that is fixed also.
2009-12-14 00:55:05 +00:00
david
696d5cb66d Consolidate recent new scripts in the CHANGELOG. 2009-12-13 22:47:29 +00:00
david
f9fc544e32 Add retrieval of the current time to ntp-info.nse. This is adapted from
code submitted by Richard Sammet.
2009-12-12 23:27:23 +00:00
david
6a57dd876a Add the ntp-info script from Richard Sammet. This version is modified
from the one he submitted in the thread at
http://seclists.org/nmap-dev/2009/q4/550. It doesn't yet include the
time retrieval he posted in a later message.
2009-12-12 22:42:39 +00:00
david
971a11f3fe Add the nfs-showmount script by Patrik Karlsson. 2009-11-26 16:52:30 +00:00
david
a4c2e4fc9b Add a UDP SIPOptions service probe. 2009-11-26 01:52:13 +00:00
david
dc569f0417 Add Citrix MetaFrame UDP payload from Thomas Buchanan. 2009-11-25 20:49:08 +00:00
fyodor
a0da2ad148 Remove some junk lines that got left in the CHANGELOG 2009-11-23 07:19:33 +00:00
fyodor
e4cd139765 OK, I think I'm done with this gigantic CHANGELOG (nearly 700 lines describing more than 100 significant changes for this release)! Feel free to fix typos, etc. if you see any 2009-11-23 07:09:19 +00:00
fyodor
a8c6c0cce0 I'm still not quite done with the CHANGELOG--this release has a LOT of improvements! Also, I changed the version to 5.10BETA1 and regenerated the appropriate files 2009-11-21 11:23:37 +00:00
ron
76db1dc4d5 Small update to the changelog 2009-11-20 16:06:34 +00:00
fyodor
61190c7818 Some initial work on the CHANGELOG -- much more is needed though 2009-11-19 08:28:06 +00:00
david
a4fc71afb6 Return the last host before skipping an octet in an IPv4 range exclude
group. Not doing this was the cause of off-by-one errors that led to
assertion failures and, potentially, excluded hosts being scanned. Here
is the comment I added:

  /* The decision to skip a range was based on the address that came immediately
     before what our current array contains now. For example, if we have just
     handed out 0.0.0.0 from the the range 0-5.0.0.0, and we're asked to skip
     the first octet, we want to advance to 1.0.0.0. But 1.0.0.0 is what is in
     the current array right now, because TargetGroup::get_next_host advances
     the array after returning an address. If we didn't step back we would
     erroneously skip ahead to 2.0.0.0. */
2009-11-18 01:17:59 +00:00
tomsellers
b5444fa390 Add a new script, db2-info.nse, that enhances DB2 database instance detection.
The script provides detection when version probes fail, but will default to 
the value provided the version probes if that value is more precise. The 
script also detects the server platform and database instance name. 
[Tom]
2009-11-12 11:44:02 +00:00
david
e22ebd5580 Reset ss.numqueries_outstanding to 0 when giving up on an RPC port
because of a lack of responses. Otherwise there is no way for that
number to decrease after moving on to the next port, leading to an
infinite loop. Lionel Cons reported the problem and provided a debug log
at http://seclists.org/nmap-dev/2009/q4/364.
2009-11-11 17:49:31 +00:00
ron
3f72477d9a Updated CHANGELOG to reflect my merge 2009-11-08 21:41:47 +00:00
david
cb8c8bd804 o Added support for connecting to nameservers over IPv6. IPv6 addresses
can be used in /etc/resolv.conf or with the --dns-servers option. The
  parallel reverse DNS resolver still only support IPv4 addresses, but
  it can look them up over IPv6. [Ankur Nandwani]
2009-11-06 18:45:48 +00:00
ron
b733248462 Updated telnet-brute.nse to use unpwdb instead of a hardcoded list of accounts 2009-11-05 14:50:54 +00:00
david
1fa16fa8c6 Add to CHANGELOG:
o Removed IP ID matching in packet headers returned in ICMP errors.
  This was already the case for some operating systems that are known
  the IDs of sent IP packets. In rare cases of ID mangling, requiring
  a match could cause replies to be ignored even after other tests had
  shown them to be relevant. See http://seclists.org/nmap-dev/2009/q2/580
  for an example of host order affecting scan results, caused by this
  phonomenon. [David]

o Added some additional matching rules to keep a reply to a SYN probe
  from matching an ACK probe to the same port, or vice versa, in ping
  scans that include both scan types. Such a mismatch could cause an
  ineffective timing ping or traceroute probe to be selected. [David]
2009-11-05 02:25:12 +00:00
david
2b8b5e2f6a o [Zenmap] There is a new command-line option, --confdir, which allows
setting the per-user configuration directory. Its value defaults to
  $HOME/.zenmap. This was suggested by Jesse McCoppin.
2009-10-28 20:36:52 +00:00
david
9a1ec98da3 Upgrade libpcap to version 1.0.0. 2009-10-27 19:33:50 +00:00
david
a56ff60c50 Add to CHANGELOG:
o Nmap now prefers to display the hostname supplied by the user instead
  of the reverse-DNS name in most places. If a reverse DNS record
  exists, and it differs from the user-supplied name, it is printed
  like this:
    Nmap scan report for www.google.com (74.125.53.103)
    rDNS record for 74.125.53.103: pw-in-f103.1e100.net
  See http://seclists.org/nmap-dev/2009/q4/199 for a summary of other
  minor changes to output. [David]
2009-10-27 15:46:35 +00:00
fyodor
9cd76905a1 Applied Winpcap installer patch from Rob Nicholls which:
o UPgrades to latest version of WinPcap (4.1.1)

o corrects a long-standing bug in our WinPcap installer (we surrounded
  the install path in the registry with double quotes, which meant we
  wouldn't uninstall our older versions during an install)

o removed the GUI option to select where the WinPcap files are
  installed (all of the important ones end up in the Windows directory
  anyway).  WinPcap folder is installed in the same Program Files
  location on x64 platforms as the official WinPcap installer uses
  (although we're not sure that is the best place)

o Rob notes that he's successfully tested the installer on XP SP3,
  2003 SP2 x86, Vista SP2 x86 and Windows 7 x64
2009-10-25 23:26:40 +00:00
david
7ef692bf52 Credit Matt Selsky for noticing the SSL certificate date parsing bug. 2009-10-24 05:19:52 +00:00
tomsellers
3b4fa34257 [NSE] Modified NSE script ssl-cert.nse to support TLS negotiation
against SMTP ports that support it. Depends on Patrick's addition the
  of the reconnect_ssl method.  [Tom Sellers, David]
2009-10-13 01:19:33 +00:00
david
4dca11125f [Zenmap] Fixed a crash that could occur when entering certain
characters in the target entry (those whose UTF-8 encoding contains
a byte that counts as whitespace in the Windows locale):
  File "zenmapGUI\ScanNotebook.pyo", line 184, in _target_entry_changed
  File "zenmapCore\NmapOptions.pyo", line 719, in render_string
  UnicodeDecodeError: 'utf8' codec can't decode byte 0xc3 in position 1:
    unexpected end of data
One such character is a with grave accent, U+00E0, which in UTF-8 is
C0 A0, where the A0 is interpreted as a no-break space when the
string is interpreted byte by byte. [David]
2009-10-12 03:25:54 +00:00
david
a8821f3cf4 Add the NSE function nmap.bind, which sets the source address of a
socket.
2009-10-11 23:08:43 +00:00
david
d7f6706df3 [Nsock] Made it a fatal error instead of silent memory corruption
when an attempt is made to use a file descriptor whose number is not
less than FD_SETSIZE. This applies only on non-Windows platforms
where FD_SETSIZE is a limit on the value of file descriptors as well
as a limit on the number of descriptors in the set. The error will
look like
  nsock_core.c:186: Attempt to FD_SET fd 1024, which is not less
  than FD_SETSIZE (1024). Try using a lower parallelism.
Thanks to Brandon Enright for discovering the problem and much help
debugging it, and to Jay Fink for submitting an initial patch. [David]
2009-10-11 19:23:39 +00:00
david
a681119026 Add to CHANGELOG:
o [Ncat] Fixed proxy connections in connect mode on Windows. Because
  the dup function does not work on Windows, an assertion failure
  would be raised reading
    (fh >= 0 && (unsigned)fd < (unsigned)_nhandle)
  [David]
2009-10-10 03:22:35 +00:00
david
020fcc0b62 Add to CHANGELOG:
o [Ncat] Fixed the combination of --max-conns and --exec on Windows.
  The count of connected clients was not decreased when the program
  spawned by --exec finished. With --max-conns 5, for example, no more
  connections would be allowed after the fifth, even if some of the
  earlier ones had ended. Jon Greaves reported the problem and Venkat
  contributed a patch.

o [Ncat] The code that manages the count of connected clients has been
  made robust with respect to signals. The code was contributed by
  Solar Designer.
2009-10-09 18:45:10 +00:00
david
fa40ea3c58 Add to CHANGELOG:
o The files read by the -iL (input from file) and --excludefile
  options now support comments that start with # and go to the end of
  the line. This was implemented by Tom Sellers.
2009-09-29 02:11:13 +00:00
david
2e3b86618b Use a STARTF_USESHOWWINDOW technique to allow running the nmap process without
using the Windows shell. The only reason for using the shell was to inhibit the
ceration of a terminal window, and this does the same thing. This solves
problems related to running through a shell: cancelling a scan wouldn't kill
the nmap process, and running from directories with names containing shell
metacharacters wouldn't work.
2009-09-28 22:02:57 +00:00
david
a99b8e5e6b Update Zenmap French translation by Henri Doreau. 2009-09-27 16:00:48 +00:00
david
9a25c8a0b4 Add a CHANGELOG entry for new traceroute. 2009-09-17 15:45:09 +00:00
ron
86e7a63bf6 Added a script called http-malware-host.nse. Its future intention is to discover hosts that are serving malware (for example, that are compromised and have malicious code inserted). At the moment, it checks for one specific attack discussed here: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/ 2009-09-16 14:15:13 +00:00
ron
32d9c9fe98 Added a check for a SMBv2 vulnerability (CVE-2009-3103) to smb-check-vulns. Due to its nature (it performs a DoS, then checks if the system is still online), the script isn't run by default and requires a special script-arg to work. 2009-09-14 15:23:06 +00:00
david
b40356ed3f Fixed an integer overflow that could occur when a target with a low
TCP timestamp clock frequency uses large timestamp values, such that
a naive uptime calculation shows a boot time before the epoch. Also
fixed a printf format specifier mismatch that was revealed by the
overflow. Toby Simmons reported the problem and helped with the fix.
2009-09-10 18:03:18 +00:00
ron
0e1a013dbf Updated CHANGELOG with my newest script. I have more to add to the CHANGELOG from my recent activities, but that'll have to wait. 2009-09-10 03:31:15 +00:00
david
972533bca9 Install the nselib/data directory on "make install". For some reason
this has been overlooked, and scripts that need data files would not
work after installation.
2009-08-31 23:26:17 +00:00
david
d99e5ec7ea Cast struct ifconf.ifc_buf to (char *) to fix a compiler error on
NetBSD, where that member has type void *. Jay Fink reported the
problem.
2009-08-31 18:55:57 +00:00
david
7d6d5ada0b o [Zenmap] If you have any hosts or services selected, they will
remain selected after aggregating another scan or running a filter
  (as long as they are still up and visible). Before the selection was
  lost whenever the scan inventory was changed.
2009-08-26 20:10:14 +00:00
david
4c6bafb3fa o There is a new OS detection pseudo-test, SCAN.DC, which records how
the network distance in SCAN.DS was calculated. Its value can be "L"
  for localhost, "D" for a direct connection, "I" for an ICMP TTL
  calculation, and "T" for a traceroute hop count. This is mainly for
  the benefit of OS integration, when it is sometimes important to
  distinguish between DS=1%DC=I (probably the result of forged TTLs)
  and DS=1%DC=D (a true one-hop connection.) [David]
2009-08-23 23:58:28 +00:00
david
09ba9eda1f Add a Russian Zenmap translation from Alexander Khodyrev. 2009-08-20 15:38:30 +00:00