1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-14 11:49:01 +00:00
Commit Graph

3493 Commits

Author SHA1 Message Date
david
398e53b3de Keep trace of the list of addresses a name resolved to, and print out
how many there were if there were more than one.
2009-10-27 06:08:04 +00:00
david
030411ffd8 Don't repeat the host name and IP address in "Host is up/down" messages.
Don't print the "Nmap scan report" header if there's nothing to put
under it.
2009-10-27 05:26:40 +00:00
david
cb9222bd20 Fix TargetGroup::is_resolved_address. It was actually checking against
the address that was the start of a netmask range.
2009-10-27 05:08:05 +00:00
david
c9fb13b4bb Add methods to TargetGroup to record the name or address that was the
"base address" from which a group of addresses were derived, for example
in "scanme.nmap.org/24", "scanme.nmap.org" would be the base address.
Use these methods to set the target name of that one host even when
addresses come from a netmask.
2009-10-26 23:15:43 +00:00
david
e33810abae Make the argument to Target::setTargetName const. 2009-10-26 23:12:20 +00:00
david
d837d751bc Don't print an rDNS record if it is blank. 2009-10-26 21:17:13 +00:00
david
01f70c5432 Write an "Nmap scan report" heading before scan results. It includes the
reverse DNS if it differs from the forward hostname.
2009-10-26 19:09:56 +00:00
david
d09218c755 Use targetname, the forward DNS name, in Target::NameIP if it is
available, in preference to hostname, the reverse DNS name. NameIP is
used to represent the host in output messages.
2009-10-26 18:17:08 +00:00
fyodor
7f62aa5196 Add a task for standardizing on Zenmap source code file header comments 2009-10-26 06:18:18 +00:00
fyodor
36ff94f9b1 Made some changes suggested by Jah at http://seclists.org/nmap-dev/2009/q4/173, but I didn't make all of them because the file has also been changed by Rob and I'm not sure which still apply 2009-10-25 23:45:51 +00:00
fyodor
cef7b83a8a Delete WanPacket.dll as it is apparently no longer used 2009-10-25 23:42:27 +00:00
fyodor
9cd76905a1 Applied Winpcap installer patch from Rob Nicholls which:
o UPgrades to latest version of WinPcap (4.1.1)

o corrects a long-standing bug in our WinPcap installer (we surrounded
  the install path in the registry with double quotes, which meant we
  wouldn't uninstall our older versions during an install)

o removed the GUI option to select where the WinPcap files are
  installed (all of the important ones end up in the Windows directory
  anyway).  WinPcap folder is installed in the same Program Files
  location on x64 platforms as the official WinPcap installer uses
  (although we're not sure that is the best place)

o Rob notes that he's successfully tested the installer on XP SP3,
  2003 SP2 x86, Vista SP2 x86 and Windows 7 x64
2009-10-25 23:26:40 +00:00
david
7ef692bf52 Credit Matt Selsky for noticing the SSL certificate date parsing bug. 2009-10-24 05:19:52 +00:00
david
c6a3d03dcd FIx SSL certificate date parsing to subtract 1 from the month to fit the
convention of a struct tm. The bug was reported by Matt Selsky.
2009-10-24 05:18:20 +00:00
david
719d9c9442 Add the user's specified host name to XML output, if available. It looks
like this:

<hostnames>
<hostname name="openbsd.org" type="user"/>
<hostname name="cvs.openbsd.org" type="PTR"/>
</hostnames>
2009-10-24 01:01:08 +00:00
david
f037a4828c Remove some dead code. 2009-10-23 23:48:14 +00:00
david
c66cf4f568 Fix some output I missed cleaning up after indent. 2009-10-23 23:45:55 +00:00
david
6ac2ec8a77 Reindent output.cc. 2009-10-23 23:44:17 +00:00
fyodor
1b8c512f50 We really need to integrate OS and version detection submissions and corrections which are piling up 2009-10-23 06:19:26 +00:00
fyodor
3736ed1b92 Changes from chat with David today 2009-10-23 06:14:58 +00:00
david
91478be449 Don't use the AI_NUMERICSERV flag, which isn't available on OS X, in the
getaddrinfo call in l_nsock_bind. We always use decimal port numbers anyway.
2009-10-21 18:04:15 +00:00
fyodor
b32e147878 Add tasks for upgrading our Winpcap and Libpcap to latest versions 2009-10-20 23:50:17 +00:00
fyodor
85ec3660aa note more explicitly which versions of Windows are supported 2009-10-19 20:45:38 +00:00
david
18fb4bdf64 Tiny whitespace changes. 2009-10-14 16:07:47 +00:00
fyodor
f30b2217f6 A few more changes during discussion w/David 2009-10-13 21:39:16 +00:00
fyodor
c0697a5f68 Some changes from chat w/David 2009-10-13 21:26:24 +00:00
tomsellers
c5d1fe5590 Minor change to ssl-cert.nse to bring display of certificate
fingerprints (MD5/SHA) in line with documentation which indicates
that they are not displayed unless verbose output is requested.
2009-10-13 03:01:51 +00:00
tomsellers
3b4fa34257 [NSE] Modified NSE script ssl-cert.nse to support TLS negotiation
against SMTP ports that support it. Depends on Patrick's addition the
  of the reconnect_ssl method.  [Tom Sellers, David]
2009-10-13 01:19:33 +00:00
david
4dca11125f [Zenmap] Fixed a crash that could occur when entering certain
characters in the target entry (those whose UTF-8 encoding contains
a byte that counts as whitespace in the Windows locale):
  File "zenmapGUI\ScanNotebook.pyo", line 184, in _target_entry_changed
  File "zenmapCore\NmapOptions.pyo", line 719, in render_string
  UnicodeDecodeError: 'utf8' codec can't decode byte 0xc3 in position 1:
    unexpected end of data
One such character is a with grave accent, U+00E0, which in UTF-8 is
C0 A0, where the A0 is interpreted as a no-break space when the
string is interpreted byte by byte. [David]
2009-10-12 03:25:54 +00:00
david
a8821f3cf4 Add the NSE function nmap.bind, which sets the source address of a
socket.
2009-10-11 23:08:43 +00:00
david
3fd8f0a0c5 Remove the allocation and freeing of a fixed-size dynamic buffer and
replace it with a static buffer.
2009-10-11 21:54:39 +00:00
david
dd6eb63b36 Fix NSE trace printing of IPv6 addresses. The code was using a plain
sockaddr instead of sockaddr_storage so it got only a fraction of the
address and the inet_ntop function would look outside of the structure
into adjacent memory. A scan of localhost would look like this:

NSE: TCP ::a00:0:600:0:1234 > ::a00:4d2:0:0:25 | CONNECT

Here, for example, that 4d2 is the port number 1234 from the other
structure. Now it prints correctly:

NSE: TCP ::1:1234 > ::1:25 | CONNECT
2009-10-11 21:51:51 +00:00
david
cca80f0304 Fix a typo in smtp-open-relay.nse. 2009-10-11 21:10:27 +00:00
david
d7f6706df3 [Nsock] Made it a fatal error instead of silent memory corruption
when an attempt is made to use a file descriptor whose number is not
less than FD_SETSIZE. This applies only on non-Windows platforms
where FD_SETSIZE is a limit on the value of file descriptors as well
as a limit on the number of descriptors in the set. The error will
look like
  nsock_core.c:186: Attempt to FD_SET fd 1024, which is not less
  than FD_SETSIZE (1024). Try using a lower parallelism.
Thanks to Brandon Enright for discovering the problem and much help
debugging it, and to Jay Fink for submitting an initial patch. [David]
2009-10-11 19:23:39 +00:00
david
a681119026 Add to CHANGELOG:
o [Ncat] Fixed proxy connections in connect mode on Windows. Because
  the dup function does not work on Windows, an assertion failure
  would be raised reading
    (fh >= 0 && (unsigned)fd < (unsigned)_nhandle)
  [David]
2009-10-10 03:22:35 +00:00
fyodor
1b767b9cbc Add Oracle Enterprise Manager Agent version detection signature (and added it to the ports list). Patch by Matt Selsky 2009-10-10 00:27:14 +00:00
david
020fcc0b62 Add to CHANGELOG:
o [Ncat] Fixed the combination of --max-conns and --exec on Windows.
  The count of connected clients was not decreased when the program
  spawned by --exec finished. With --max-conns 5, for example, no more
  connections would be allowed after the fifth, even if some of the
  earlier ones had ended. Jon Greaves reported the problem and Venkat
  contributed a patch.

o [Ncat] The code that manages the count of connected clients has been
  made robust with respect to signals. The code was contributed by
  Solar Designer.
2009-10-09 18:45:10 +00:00
fyodor
4467a32059 Reordered some items for prioritization. Also, one of the items added during this meeting was finished by David before the meeting was even over :) 2009-10-06 21:46:55 +00:00
fyodor
fd314f948b TODO improvements from chat w/David 2009-10-06 21:38:59 +00:00
daniel
d965b42e6f Update the SCTP TODO list. 2009-10-06 19:31:52 +00:00
batrick
afa84d2320 [NSE] Added the reconnect_ssl method for sockets. We sometimes need
to reconnect a socket with SSL because the initial communication on the socket
is done without SSL. See this thread [1] for more details.

[1] http://seclists.org/nmap-dev/2009/q4/3
2009-10-06 13:02:12 +00:00
batrick
b356ce2580 Added smb-check-vulns.nse to the vuln category. 2009-10-06 12:04:35 +00:00
david
e7afd943f0 Remove the ununsed UltraProbe::internalProbe member. 2009-10-02 22:52:10 +00:00
fyodor
8cfe264522 regenerate script.db after the updates to the safe/intrusive categories 2009-10-01 19:08:33 +00:00
fyodor
fea1ab7c39 Moved a bunch of scripts to the "safe" category, and some others to "intrusive" after
discussion on nmap-dev about how best to handle these.  I also updated the docs and
am about to regenerate script.db.  See this thread for more info:
http://seclists.org/nmap-dev/2009/q3/1008.html
2009-10-01 19:07:16 +00:00
joao
8dfb8af45e Removing outdated params from tryssl description 2009-10-01 03:20:37 +00:00
david
361f10fc90 Update NSEDoc to say that nmap.get_port_state can return nil if you pass
it a port that was not scanned.
2009-09-29 14:58:44 +00:00
fyodor
3836a8205d Add a new item related to better usage of the 'safe' category 2009-09-29 04:21:04 +00:00
david
fa40ea3c58 Add to CHANGELOG:
o The files read by the -iL (input from file) and --excludefile
  options now support comments that start with # and go to the end of
  the line. This was implemented by Tom Sellers.
2009-09-29 02:11:13 +00:00
david
ab8fcad92d Document the possibility of having comments in -iL and --excludefile in
refguide.xml.
2009-09-29 02:08:36 +00:00