1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-19 22:19:02 +00:00
Commit Graph

6403 Commits

Author SHA1 Message Date
david
6cf428d8c6 Fix some "and" -> "&&". 2011-07-19 23:42:33 +00:00
david
1646813162 Whitespace and formatting in osscan.cc. 2011-07-19 22:00:13 +00:00
david
9a64d66a1e Clarify an ambiguous if/else. 2011-07-19 21:40:32 +00:00
david
75cd409ba5 Fix some [-Wunused-but-set-variable] warnings. 2011-07-19 21:40:32 +00:00
fyodor
532eab87e7 Add a small bug/misfeature task 2011-07-19 18:55:03 +00:00
weilin
1dcf652410 Added ND ping for local IPv6 nets, merging from /nmap-exp/weilin/nmap-nd. 2011-07-19 02:31:54 +00:00
fyodor
737035118a Note some done stuff 2011-07-19 02:06:39 +00:00
david
e2bb7cc271 Fix an indexing bug in http-vhosts.nse. Found by Daniel Miller. 2011-07-18 20:44:22 +00:00
david
bbf254d90e Fix incorrect (broken) return value in p2p-conficker.nse. Spotted by
Daniel Miller.
2011-07-18 20:40:47 +00:00
david
f57b87a010 Capitalization in service probe. 2011-07-18 16:29:40 +00:00
david
6d371adee8 Formatting. 2011-07-18 16:29:38 +00:00
david
a2314b2041 Add port 9050, tor-socks, to the portrule for socks-open-proxy.nse. 2011-07-18 16:29:37 +00:00
djalal
01f4cdd83e o [NSE] Small improvements on the smtp-vuln-cve2011-1764 script:
- Check the port.version.product in the portrule to see if it matches
    the 'Exim smtpd'
  - If the script was not able to confirm the vulnerability but the Exim
    version is between 4.70 and 4.75, then report: "LIKELY VULNERABLE".
2011-07-18 11:42:41 +00:00
djalal
2c7cad079b o [NSE] Added smtp-vuln-cve2011-1764 script, which checks the Exim DKIM
Format String vulnerability (CVE-2011-1764).
2011-07-18 10:21:01 +00:00
djalal
cc062e2e1e o [NSE] Remove the mac-geolocation script entries since the it was deleted.
- Update the script.db file.
  - Add the script name to the 'OLD_SCRIPT_NAMES' variable in the Makefile.in file.
2011-07-18 09:58:50 +00:00
djalal
30bd1681b0 o [NSE] Made the following scripts in the default category:
giop-info.nse
  vnc-info.nse
  ncp-serverinfo.nse
  afp-serverinfo.nse
2011-07-18 09:50:18 +00:00
gorjan
1f9479a161 Removing the mac-geolocation script which used the no longer available Google Geolocation API service 2011-07-17 17:26:59 +00:00
gorjan
d780448af7 Updating the script to use an API key supplied by the user throught the script-args. 2011-07-17 17:22:58 +00:00
paulino
8215c3420f Fixes the way of creating the request line by changing string.format for regular string concatenation to allow null bytes in the requests. 2011-07-15 23:48:00 +00:00
paulino
deded46038 Adds apache axis2 login signature. 2011-07-15 23:43:10 +00:00
paulino
6a8a10794f Adds more paths for Coldfusion and Apache Axis2 2011-07-15 23:33:03 +00:00
djalal
ce11504eff Updated my TODO file. 2011-07-15 16:46:12 +00:00
patrik
4356fe16a5 * fixed a bug that would result in unnecessary connects and disconnect for
discovered accounts

* documented engine options

* added new engine option (nostore) that instructs the library not to store
  the discovered credentials in the credential database
2011-07-13 20:49:20 +00:00
patrik
c800c437a9 added check for unknown account state to avoid crash when retrieving accounts. 2011-07-13 20:46:15 +00:00
shinnok
e91c17f7a9 Add a new task in my TODO file and note a completed one. 2011-07-13 17:55:24 +00:00
gorjan
9b7d310355 Adding the broadcast-ping script. 2011-07-13 09:38:40 +00:00
gorjan
70b09c9598 Small fix: missed an 'end' 2011-07-13 09:34:19 +00:00
gorjan
c08ca750fa Added default values for the index and length parameters if no value is supplied in the Packet:raw(index,length) function of the nselib/packet.lua library 2011-07-13 09:27:54 +00:00
gorjan
5f3b402cf7 Putting back the old snmp-brute untill I'm finished writing the new one 2011-07-12 23:25:57 +00:00
patrik
aadac7c8d5 * Fixed a bug in the brute library prevented additional passwords from
being found if run in passonly mode.

* Fixed a bug in the brute library preventing detection of duplicate
  credential entries requested from the iterator.
2011-07-12 21:23:12 +00:00
patrik
23d2e0d31f o [NSE] Applied patch from Chris Woodbury that adds the following additional
information to the output of smb-os-discovery:
  + Forest name
  + FQDN
  + NetBIOS computer name
  + NetBIOS domain name
2011-07-12 06:08:43 +00:00
colin
575c954a12 Updated changelog to reflect changes in ncat r24839 due to merge from nmap-exp/colin/dual_listen 2011-07-12 01:21:37 +00:00
gorjan
59b7ac706a Removed unnecesary variable from l_list_interfaces() in nse_nmaplib.cc 2011-07-11 22:16:05 +00:00
djalal
dbe7a27698 o [NSE] Updated the categories of the following scripts:
irc-unrealircd-backdoor.nse
  iscsi-info.nse
  wdb-version.nse
  ftp-proftpd-backdoor.nse
  ssl-cert.nse
  ftp-vsftpd-backdoor.nse
  afp-path-vuln.nse
  targets-sniffer.nse
  broadcast-ms-sql-discover.nse
2011-07-11 22:03:17 +00:00
djalal
bd78274b20 o [NSE] Updated ftp-vsftpd-backdoor documentation since CVE-2011-2523 was just
assigned to this backdoor.
  Added a final 'exit' command to terminate the remote '/bin/sh', however I don't
  think that this is necessary since the backdoor was very simple: it did not
  fork(), and closing the stdin of the '/bin/sh' will terminate it.
2011-07-11 19:28:02 +00:00
djalal
c098d5e679 Simplify returned message when ProFTPD is not vulnerable. 2011-07-11 17:10:05 +00:00
djalal
36b535eba2 Removed an extra unused string.format argument :) 2011-07-11 15:33:52 +00:00
luis
66638df069 Note a little bug that I discovered when running nping's test script 2011-07-11 10:35:35 +00:00
paulino
b291f28e62 Added new entries for awstats totals under 'general' 2011-07-11 07:48:16 +00:00
gorjan
25f00f01ec Another possible fix for the NSEDoc arguments in the brute.lua library 2011-07-10 16:20:49 +00:00
patrik
4de3601473 o [NSE] Added script db2-discover into the default category [Patrik Karlsson] 2011-07-10 08:04:52 +00:00
patrik
1feb1bd582 o [NSE] Split script db2-discover into two scripts, adding a new
broadcast-db2-discover script. This script attempts to discover DB2
  database servers through broadcast requests. [Patrik Karlsson]
2011-07-10 08:01:26 +00:00
paulino
248b53abfa Adds entries under 'attack' for:
-OrangeHRM: http://www.exploit-db.com/exploits/17212/
-Tikiwiki: http://www.exploit-db.com/exploits/1244/
2011-07-09 20:44:22 +00:00
paulino
0528868eb9 Includes new fingerprints for Joomla submitted by Hani, moves drupal signatures to the cms section and adds new ones for Cisco, Airaya and Cirronet routers 2011-07-09 20:29:11 +00:00
paulino
1d150dd875 Fix to use stdnse.get_script_args() instead of getting the arguments from the registry. 2011-07-09 19:59:13 +00:00
patrik
5c43a48121 applied patch to json library from Daniel Miller adding the functions
make_array and make_object:
http://seclists.org/nmap-dev/2011/q3/15

These functions add support for treating Lua tables as JSON arrays or objects.
2011-07-09 19:49:05 +00:00
henri
5de4bf5793 Don't add a blank line at the top of the report. Other scripts don't. 2011-07-09 16:39:12 +00:00
fyodor
9c0ed2add3 note that I updated the CHANGELOG and we made the dev release 2011-07-09 00:51:57 +00:00
paulino
52b7dbac5e Updates script.db to include http-google-malware: 2011-07-08 23:45:49 +00:00
paulino
458504c1ab Adds http-google-malware:
description = [[
http-google-malware checks if hosts are on Google's blacklist of suspected malware and phishing servers. These lists are constantly updated and are part of Google's Safe Browsing service.

To do this the script queries the Google's Safe Browsing service and you need to have your own API key to access Google's Safe Browsing Lookup services. Sign up for yours at http://code.google.com/apis/safebrowsing/key_signup.html

* To learn more about Google's Safe Browsing:
http://code.google.com/apis/safebrowsing/

* To register and get your personal API key: 
http://code.google.com/apis/safebrowsing/key_signup.html
]]

---
-- @usage
-- nmap -p80 --script http-google-malware <host>
--
-- @output
-- PORT   STATE SERVICE
-- 80/tcp open  http
-- |_http-google-malware.nse: Host is known for distributing malware.
--
-- @args http-google-malware.url URL to check. Default: <code>http/https</code>://<code>host</code> 
-- @args http-google-malware.api API key for Google's Safe Browsing Lookup service
---
2011-07-08 18:45:49 +00:00