1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-19 22:19:02 +00:00
Commit Graph

4399 Commits

Author SHA1 Message Date
david
0b1816c0ff Pregenerate lex and yacc files and remove the build dependency on those
programs.
2009-10-27 22:43:09 +00:00
david
3889091495 Add a cast to silence a compiler warning. 2009-10-27 19:42:19 +00:00
david
9a1ec98da3 Upgrade libpcap to version 1.0.0. 2009-10-27 19:33:50 +00:00
david
a56ff60c50 Add to CHANGELOG:
o Nmap now prefers to display the hostname supplied by the user instead
  of the reverse-DNS name in most places. If a reverse DNS record
  exists, and it differs from the user-supplied name, it is printed
  like this:
    Nmap scan report for www.google.com (74.125.53.103)
    rDNS record for 74.125.53.103: pw-in-f103.1e100.net
  See http://seclists.org/nmap-dev/2009/q4/199 for a summary of other
  minor changes to output. [David]
2009-10-27 15:46:35 +00:00
david
f1dabda17c Fix some pointer declarations messed up by indent. 2009-10-27 15:41:22 +00:00
david
bf29b139bd Only print the first warning that a name resolves to multiple addresses
(the one that happens right after then name is resolved) with -vv. That
information is also printed out above the ports table later.
2009-10-27 06:16:22 +00:00
david
398e53b3de Keep trace of the list of addresses a name resolved to, and print out
how many there were if there were more than one.
2009-10-27 06:08:04 +00:00
david
030411ffd8 Don't repeat the host name and IP address in "Host is up/down" messages.
Don't print the "Nmap scan report" header if there's nothing to put
under it.
2009-10-27 05:26:40 +00:00
david
cb9222bd20 Fix TargetGroup::is_resolved_address. It was actually checking against
the address that was the start of a netmask range.
2009-10-27 05:08:05 +00:00
david
c9fb13b4bb Add methods to TargetGroup to record the name or address that was the
"base address" from which a group of addresses were derived, for example
in "scanme.nmap.org/24", "scanme.nmap.org" would be the base address.
Use these methods to set the target name of that one host even when
addresses come from a netmask.
2009-10-26 23:15:43 +00:00
david
e33810abae Make the argument to Target::setTargetName const. 2009-10-26 23:12:20 +00:00
david
d837d751bc Don't print an rDNS record if it is blank. 2009-10-26 21:17:13 +00:00
david
01f70c5432 Write an "Nmap scan report" heading before scan results. It includes the
reverse DNS if it differs from the forward hostname.
2009-10-26 19:09:56 +00:00
david
d09218c755 Use targetname, the forward DNS name, in Target::NameIP if it is
available, in preference to hostname, the reverse DNS name. NameIP is
used to represent the host in output messages.
2009-10-26 18:17:08 +00:00
fyodor
7f62aa5196 Add a task for standardizing on Zenmap source code file header comments 2009-10-26 06:18:18 +00:00
fyodor
36ff94f9b1 Made some changes suggested by Jah at http://seclists.org/nmap-dev/2009/q4/173, but I didn't make all of them because the file has also been changed by Rob and I'm not sure which still apply 2009-10-25 23:45:51 +00:00
fyodor
cef7b83a8a Delete WanPacket.dll as it is apparently no longer used 2009-10-25 23:42:27 +00:00
fyodor
9cd76905a1 Applied Winpcap installer patch from Rob Nicholls which:
o UPgrades to latest version of WinPcap (4.1.1)

o corrects a long-standing bug in our WinPcap installer (we surrounded
  the install path in the registry with double quotes, which meant we
  wouldn't uninstall our older versions during an install)

o removed the GUI option to select where the WinPcap files are
  installed (all of the important ones end up in the Windows directory
  anyway).  WinPcap folder is installed in the same Program Files
  location on x64 platforms as the official WinPcap installer uses
  (although we're not sure that is the best place)

o Rob notes that he's successfully tested the installer on XP SP3,
  2003 SP2 x86, Vista SP2 x86 and Windows 7 x64
2009-10-25 23:26:40 +00:00
david
7ef692bf52 Credit Matt Selsky for noticing the SSL certificate date parsing bug. 2009-10-24 05:19:52 +00:00
david
c6a3d03dcd FIx SSL certificate date parsing to subtract 1 from the month to fit the
convention of a struct tm. The bug was reported by Matt Selsky.
2009-10-24 05:18:20 +00:00
david
719d9c9442 Add the user's specified host name to XML output, if available. It looks
like this:

<hostnames>
<hostname name="openbsd.org" type="user"/>
<hostname name="cvs.openbsd.org" type="PTR"/>
</hostnames>
2009-10-24 01:01:08 +00:00
david
f037a4828c Remove some dead code. 2009-10-23 23:48:14 +00:00
david
c66cf4f568 Fix some output I missed cleaning up after indent. 2009-10-23 23:45:55 +00:00
david
6ac2ec8a77 Reindent output.cc. 2009-10-23 23:44:17 +00:00
fyodor
1b8c512f50 We really need to integrate OS and version detection submissions and corrections which are piling up 2009-10-23 06:19:26 +00:00
fyodor
3736ed1b92 Changes from chat with David today 2009-10-23 06:14:58 +00:00
david
91478be449 Don't use the AI_NUMERICSERV flag, which isn't available on OS X, in the
getaddrinfo call in l_nsock_bind. We always use decimal port numbers anyway.
2009-10-21 18:04:15 +00:00
fyodor
b32e147878 Add tasks for upgrading our Winpcap and Libpcap to latest versions 2009-10-20 23:50:17 +00:00
fyodor
85ec3660aa note more explicitly which versions of Windows are supported 2009-10-19 20:45:38 +00:00
david
18fb4bdf64 Tiny whitespace changes. 2009-10-14 16:07:47 +00:00
fyodor
f30b2217f6 A few more changes during discussion w/David 2009-10-13 21:39:16 +00:00
fyodor
c0697a5f68 Some changes from chat w/David 2009-10-13 21:26:24 +00:00
tomsellers
c5d1fe5590 Minor change to ssl-cert.nse to bring display of certificate
fingerprints (MD5/SHA) in line with documentation which indicates
that they are not displayed unless verbose output is requested.
2009-10-13 03:01:51 +00:00
tomsellers
3b4fa34257 [NSE] Modified NSE script ssl-cert.nse to support TLS negotiation
against SMTP ports that support it. Depends on Patrick's addition the
  of the reconnect_ssl method.  [Tom Sellers, David]
2009-10-13 01:19:33 +00:00
david
4dca11125f [Zenmap] Fixed a crash that could occur when entering certain
characters in the target entry (those whose UTF-8 encoding contains
a byte that counts as whitespace in the Windows locale):
  File "zenmapGUI\ScanNotebook.pyo", line 184, in _target_entry_changed
  File "zenmapCore\NmapOptions.pyo", line 719, in render_string
  UnicodeDecodeError: 'utf8' codec can't decode byte 0xc3 in position 1:
    unexpected end of data
One such character is a with grave accent, U+00E0, which in UTF-8 is
C0 A0, where the A0 is interpreted as a no-break space when the
string is interpreted byte by byte. [David]
2009-10-12 03:25:54 +00:00
david
a8821f3cf4 Add the NSE function nmap.bind, which sets the source address of a
socket.
2009-10-11 23:08:43 +00:00
david
3fd8f0a0c5 Remove the allocation and freeing of a fixed-size dynamic buffer and
replace it with a static buffer.
2009-10-11 21:54:39 +00:00
david
dd6eb63b36 Fix NSE trace printing of IPv6 addresses. The code was using a plain
sockaddr instead of sockaddr_storage so it got only a fraction of the
address and the inet_ntop function would look outside of the structure
into adjacent memory. A scan of localhost would look like this:

NSE: TCP ::a00:0:600:0:1234 > ::a00:4d2:0:0:25 | CONNECT

Here, for example, that 4d2 is the port number 1234 from the other
structure. Now it prints correctly:

NSE: TCP ::1:1234 > ::1:25 | CONNECT
2009-10-11 21:51:51 +00:00
david
cca80f0304 Fix a typo in smtp-open-relay.nse. 2009-10-11 21:10:27 +00:00
david
d7f6706df3 [Nsock] Made it a fatal error instead of silent memory corruption
when an attempt is made to use a file descriptor whose number is not
less than FD_SETSIZE. This applies only on non-Windows platforms
where FD_SETSIZE is a limit on the value of file descriptors as well
as a limit on the number of descriptors in the set. The error will
look like
  nsock_core.c:186: Attempt to FD_SET fd 1024, which is not less
  than FD_SETSIZE (1024). Try using a lower parallelism.
Thanks to Brandon Enright for discovering the problem and much help
debugging it, and to Jay Fink for submitting an initial patch. [David]
2009-10-11 19:23:39 +00:00
david
a681119026 Add to CHANGELOG:
o [Ncat] Fixed proxy connections in connect mode on Windows. Because
  the dup function does not work on Windows, an assertion failure
  would be raised reading
    (fh >= 0 && (unsigned)fd < (unsigned)_nhandle)
  [David]
2009-10-10 03:22:35 +00:00
fyodor
1b767b9cbc Add Oracle Enterprise Manager Agent version detection signature (and added it to the ports list). Patch by Matt Selsky 2009-10-10 00:27:14 +00:00
david
020fcc0b62 Add to CHANGELOG:
o [Ncat] Fixed the combination of --max-conns and --exec on Windows.
  The count of connected clients was not decreased when the program
  spawned by --exec finished. With --max-conns 5, for example, no more
  connections would be allowed after the fifth, even if some of the
  earlier ones had ended. Jon Greaves reported the problem and Venkat
  contributed a patch.

o [Ncat] The code that manages the count of connected clients has been
  made robust with respect to signals. The code was contributed by
  Solar Designer.
2009-10-09 18:45:10 +00:00
fyodor
4467a32059 Reordered some items for prioritization. Also, one of the items added during this meeting was finished by David before the meeting was even over :) 2009-10-06 21:46:55 +00:00
fyodor
fd314f948b TODO improvements from chat w/David 2009-10-06 21:38:59 +00:00
daniel
d965b42e6f Update the SCTP TODO list. 2009-10-06 19:31:52 +00:00
batrick
afa84d2320 [NSE] Added the reconnect_ssl method for sockets. We sometimes need
to reconnect a socket with SSL because the initial communication on the socket
is done without SSL. See this thread [1] for more details.

[1] http://seclists.org/nmap-dev/2009/q4/3
2009-10-06 13:02:12 +00:00
batrick
b356ce2580 Added smb-check-vulns.nse to the vuln category. 2009-10-06 12:04:35 +00:00
david
e7afd943f0 Remove the ununsed UltraProbe::internalProbe member. 2009-10-02 22:52:10 +00:00
fyodor
8cfe264522 regenerate script.db after the updates to the safe/intrusive categories 2009-10-01 19:08:33 +00:00