1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-19 22:19:02 +00:00
Commit Graph

6463 Commits

Author SHA1 Message Date
david
289b96c191 Regenerate ca-bundle.crt using the instructions in certs/README. 2011-09-19 22:14:29 +00:00
fyodor
3c01ee3217 latest todo file updates 2011-09-19 22:01:42 +00:00
fyodor
e87e454c0c update the version number in nmap.h too 2011-09-19 21:57:53 +00:00
fyodor
6ed56140bd Update version number to 5.61TEST1 2011-09-19 21:52:08 +00:00
fyodor
dc886eb5c9 Releasing 5.61TEST1 experimental version today, if all goes well with the build and testing 2011-09-19 21:50:07 +00:00
fyodor
8e042f399a Some updates from last week 2011-09-19 20:41:50 +00:00
david
9bf2ec3884 Merge from /nmap-exp/luis/nmap-os6.
svn merge --ignore-ancestry svn://svn.insecure.org/nmap@26621 svn://svn.insecure.org/nmap-exp/luis/nmap-os6

This is the IPv6 OS detection branch. "nmap -6 -O" works now, though at
this point it only prints fingerprints and not OS guesses, because we
need to collect more submissions.
2011-09-19 18:31:46 +00:00
david
f41753c4e9 Add a sockaddr dst argument to send_ip function that use raw sockets.
Heretofore we have always extracted teh destination address directly
from the packet contents. But the raw packet bytes do not contain enough
information in one case: IPv6 link-local addresses. For those we really
need the scope ID, and for that we must pass this information all the
way down.

Before this, I got "no route to host" on OS link-local addresses. I
think that it was working on Linux only on accident, by the OS picking a
default interface or something.
2011-09-19 16:13:35 +00:00
david
d91b131da0 Make various accessors and parameters const. 2011-09-19 16:13:33 +00:00
david
5898afd06b Canonicalize interface addresses returned from libdnet.
Mac OS X appears to have a new address convention that I can't find
documented. The link-local address fe80:4::X:X:X:X stands for
fe80::X:X:X:X%en0, if en0 is the interface with index 4. (I.e., it would
be fe80::X:X:X:X%4 on Windows.) The number 4 could be different numbers.

The interface addresses seem to be stored with these pseudo-zone IDs at
a low level, because they appear that way when they come from libdnet.
This is what "nmap --iflist" shows:

lo0  (lo0)   fe80:1::1/64                   loopback    up   16384
en0  (en0)   fe80:4::xxxx:xxxx:xxxx:xxxx/64 ethernet    up   1500  XX:XX:XX:XX:XX:XX

The OS X network tools seem to hide this. This is what "ifconfig" and
"netstat -rn -f inet6" show:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
en0: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
        inet6 fe80::xxxx:xxxx:xxxx:xxxx%en0 prefixlen 64 scopeid 0x4

fe80::1%lo0                             link#1                          UHLI            lo0
fe80::xxxx:xxxx:xxxx:xxxx%en0           XX:XX:XX:XX:XX:XX               UHLI            lo0

(Not the "scopeid 0x4".) Also, if you use one of these addresses, it
magically transforms into one without the pseudo-ID (getaddrinfo does
this):

$ ping6 fe80:4::1234
PING6(56=40+8+8 bytes) fe80::xxxx:xxxx:xxxx:xxxx%en0 --> fe80::1234%en0
$ ping6 fe80:1::1234
PING6(56=40+8+8 bytes) fe80::1%lo0 --> fe80::1234%lo0

This translation is messing up our netmask comparisons for the purpose
of routing. If you use a normal link-local address starting with fe80:0,
then it doesn't compare equal with the fe80:4/64 interface address. If
you try to use the 4, then getaddrinfo turns it into fe80:0 anyway, and
the comparison still fails.

So for this reason I added a canonicalize_address function, which calls
getnameinfo on an address, then calls getaddrinfo on the returned
string, to mangle an address the same way the OS would do it. One would
hope this is a no-op in cases other than the one I have described.

Now "nmap --iflist" shows:
lo0  (lo0)   fe80::1/64                   loopback    up   16384
en0  (en0)   fe80::xxxx:xxxx:xxxx:xxxx/64 ethernet    up   1500  XX:XX:XX:XX:XX:XX
2011-09-18 23:49:34 +00:00
david
1887aef067 Allow setting certain extension headers as ancillary data in send_ipv6_ip. 2011-09-18 23:46:54 +00:00
david
074e91c0e0 Add to CHANGELOG:
o Fixed compilation on OS X 10.7 Lion. Thanks to Patrik Karlsson and
  Babak Farroki for researching fixes.
2011-09-18 05:18:33 +00:00
david
66cf4fbe4a Define __APPLE_USE_RFC_3542.
Since OS X 10.7, we must declare whether we want the IPv6 sockets API to
work like RFC 2292 or RFC 3542. As far as I know, we are compatible with
both, so just pick the more recent one, which Apple says will become the
default in the future.
2011-09-18 05:11:25 +00:00
david
6a8aebbd01 Add to TODO:
o Fix "BOGUS!  Can't parse supposed IP packet" in packet trace of IPv6
  packets.
2011-09-17 19:21:55 +00:00
david
70d2105b9f Use if_nametoindex instead of SIOCGIFINDEX.
The latter isn't available on OS X.
2011-09-17 06:40:41 +00:00
batrick
2511cd1d2a fixed wrong (global) variable name 2011-09-16 18:33:52 +00:00
david
79a663d469 Add CPE to the IPv6 OS detection todo. 2011-09-16 17:44:57 +00:00
david
4e75c3f349 Remove the constructor from OS_Classification.
This is not needed not because cpe is not a simple pointer, and I want
to be able to initialize this with curly brackets like a struct.
2011-09-15 18:41:46 +00:00
david
8b01344caf In build_{icmp,igmp}_raw, fill with zeros when data is NULL.
This restores the previous behavior of these functions, which was broken
in r24127, which itself was fixing another bug.

r24127 solved the problem of --data-length appending zeroes, not random
data, to ICMP and IGMP packets. But in doing so, it added a check that
the data argument is not NULL. OS detection uses a data argument of
NULL, expecting these functions to fill in zeroes in this case. The
result of this was that the IE probes were being sent with empty
payloads instead of 120 and 150 bytes.
2011-09-15 17:57:00 +00:00
david
1c67d5e508 Expand a Window 7 fingerprint. 2011-09-15 16:38:54 +00:00
david
1a56b09beb Don't redundantly list the NULL compressor in ssl-num-ciphers.nse.
This can happen when we ask for a different compressor but the server
replies with NULL instead. Patch by Matt Selsky in
http://seclists.org/nmap-dev/2011/q2/1236.
2011-09-14 18:21:23 +00:00
david
49be2a7c61 Fix compressor names in ssl-enum-ciphers.nse.
patch from Matt Selsky in http://seclists.org/nmap-dev/2011/q2/1235.
2011-09-14 18:14:52 +00:00
david
748e8f908f CHANGELOG for ssl-enum-ciphers strength ratings. 2011-09-14 17:57:49 +00:00
david
2990c68107 Whitespace in ssl-enum-ciphers. 2011-09-14 17:57:49 +00:00
david
3cf16f31c3 Update output and NSEDoc for ssl-enum-ciphers. 2011-09-14 17:57:48 +00:00
david
44fcc2f455 ssl-enum-ciphers update for cipher strength from Gabriel Lawrence. 2011-09-14 17:57:47 +00:00
henri
cc4310b6d0 Cosmetic fix: consistently return 'false' in the hostrule 2011-09-14 10:03:41 +00:00
henri
bba444c842 Added application CPEs for Undernet IRCu 2011-09-13 10:13:42 +00:00
henri
a16d90e443 Added application CPEs for ISA server 2011-09-13 09:32:54 +00:00
henri
b2eb0b050f Fixed broken format introduced as of r26471 2011-09-13 09:29:04 +00:00
henri
ef7e4e4d31 Added application CPEs for netatalk 2011-09-13 09:11:31 +00:00
henri
45c2293dc2 Added application CPEs fro Apple AFP server 2011-09-13 08:51:07 +00:00
tomsellers
b841ee37b7 a couple more adjustments to account status handling in brute scripts.
Revert wording in oracle-brute.nse, add support for new category in ldap-brute.nse and reflect new wording in examples in afp-brute.nse
2011-09-13 01:44:30 +00:00
fyodor
5743a26565 trivial nsedoc change 2011-09-12 21:07:57 +00:00
david
c0acb48951 In ms-sql-info, change the hostrule conditions
state ~= "closed"
into
	state == "open" or state == "open|filtered"

(state ~= "closed") matches "filtered", so the script was running
against hosts that had all the relevant ports filtered.
2011-09-12 16:36:06 +00:00
djalal
0b20e734b4 Define 'State.DISABLED_VALID' value. 2011-09-12 14:21:21 +00:00
djalal
ae90b1b6f8 Declare the 'new_targets' inside the NOLUA conditional directives. 2011-09-11 22:53:57 +00:00
tomsellers
4e87a1df42 Added string for .PARAM account status, this will be useful later. 2011-09-11 21:28:28 +00:00
tomsellers
198fd3b3bb Changing account status strings for consistency. Adding two new account states, LOCKED_VALID & LOCKED_DISABLED. 2011-09-11 21:23:34 +00:00
fyodor
726022d23f Slightly improve the nsedoc for a couple libraries 2011-09-11 21:21:17 +00:00
david
d2462fa413 Use cpe:/o:sun:sunos; coe:/o:sun:solaris names are deprecated. 2011-09-11 21:11:32 +00:00
david
d2bce72bee Doc typo in address-info.nse. 2011-09-11 21:05:57 +00:00
fyodor
2ff08a24a1 Update some script nsedoc descriptions for consistency. The description should almost always start with an active verb and never with the script name or 'this script'. Admittedly that makes the first sentence a fragment. The first sentence should be capitalized 2011-09-11 20:50:56 +00:00
fyodor
a5d81c3b35 Improve some NSEDoc descriptions 2011-09-11 20:44:07 +00:00
fyodor
bff90f3d55 minor updates to the nsedoc descriptions for some scripts 2011-09-11 18:26:37 +00:00
tomsellers
24c8c06f1b Added support to nmap-service-probes for Microsoft SQL 2008 R2 RTM and SP1.
Added softmatch line for Microsoft SQL 2008 R2.

Added specificity to CPE data on Microsoft SQL Server matchlines.
Removed auto flag on the os cpe lines for MS SQL Server
2011-09-11 16:18:06 +00:00
tomsellers
03e49171dd Added ms-sql-brute.brute-windows-accounts to script documentation. Adjusted existing documentation to improve rendered result on NSEDOC web page. 2011-09-11 14:14:08 +00:00
tomsellers
22a029c21b Updating CHANGELOG info on recent changes. 2011-09-11 12:49:54 +00:00
tomsellers
035ae9e9b1 Updated account status text in brute force password discovery scripts in an effort to make the reporting more consistent across all scripts. This will have an impact on any code that parses these values.
In the case of a few of these scripts the only thing that was updated was the example text as the scripts relied on the creds library which handles the strings internally.
2011-09-11 12:13:13 +00:00
tomsellers
1c92c03401 Add a few scripts to the "broadcast" script category based on traffic behavior. 2011-09-11 11:58:18 +00:00