1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-29 09:39:03 +00:00
Commit Graph

724 Commits

Author SHA1 Message Date
ron
86e7a63bf6 Added a script called http-malware-host.nse. Its future intention is to discover hosts that are serving malware (for example, that are compromised and have malicious code inserted). At the moment, it checks for one specific attack discussed here: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/ 2009-09-16 14:15:13 +00:00
ron
32d9c9fe98 Added a check for a SMBv2 vulnerability (CVE-2009-3103) to smb-check-vulns. Due to its nature (it performs a DoS, then checks if the system is still online), the script isn't run by default and requires a special script-arg to work. 2009-09-14 15:23:06 +00:00
david
b40356ed3f Fixed an integer overflow that could occur when a target with a low
TCP timestamp clock frequency uses large timestamp values, such that
a naive uptime calculation shows a boot time before the epoch. Also
fixed a printf format specifier mismatch that was revealed by the
overflow. Toby Simmons reported the problem and helped with the fix.
2009-09-10 18:03:18 +00:00
ron
0e1a013dbf Updated CHANGELOG with my newest script. I have more to add to the CHANGELOG from my recent activities, but that'll have to wait. 2009-09-10 03:31:15 +00:00
david
972533bca9 Install the nselib/data directory on "make install". For some reason
this has been overlooked, and scripts that need data files would not
work after installation.
2009-08-31 23:26:17 +00:00
david
d99e5ec7ea Cast struct ifconf.ifc_buf to (char *) to fix a compiler error on
NetBSD, where that member has type void *. Jay Fink reported the
problem.
2009-08-31 18:55:57 +00:00
david
7d6d5ada0b o [Zenmap] If you have any hosts or services selected, they will
remain selected after aggregating another scan or running a filter
  (as long as they are still up and visible). Before the selection was
  lost whenever the scan inventory was changed.
2009-08-26 20:10:14 +00:00
david
4c6bafb3fa o There is a new OS detection pseudo-test, SCAN.DC, which records how
the network distance in SCAN.DS was calculated. Its value can be "L"
  for localhost, "D" for a direct connection, "I" for an ICMP TTL
  calculation, and "T" for a traceroute hop count. This is mainly for
  the benefit of OS integration, when it is sometimes important to
  distinguish between DS=1%DC=I (probably the result of forged TTLs)
  and DS=1%DC=D (a true one-hop connection.) [David]
2009-08-23 23:58:28 +00:00
david
09ba9eda1f Add a Russian Zenmap translation from Alexander Khodyrev. 2009-08-20 15:38:30 +00:00
david
8741504f67 Document what UDP payload probes we have in CHANGELOG. 2009-08-19 17:05:59 +00:00
david
3cc4ec9939 Add the ssl-cert.nse script, which retrieves the server SSL certificate. 2009-08-13 23:38:05 +00:00
david
68a7724194 [Ncat] The --idle-timeout option now exits when *both* stdin and the
socket have been idle for the given time. Previously it would exit
when *either* of them had been idle, meaning that the program would
quit contrary to your expectation when downloading a large file
without sending anything, for example.
2009-08-13 02:38:28 +00:00
david
48a008e2d7 Ncat now always prefixes its own output messages with "Ncat: "
or "NCAT DEBUG: " to make it clear that they are not coming from the
remote host. This only matters when output goes to a terminal, where
the standard output and standard error streams are mixed. [David]
2009-08-12 23:36:01 +00:00
david
f71b98ecd1 Change x11-access.nse CHANGELOG credit from "vladz" to "jlanthea" by
author request.
2009-08-08 20:51:36 +00:00
david
2f54cb191f Add the x11-access.nse script by vladz. See
http://seclists.org/nmap-dev/2009/q3/0479.html.
2009-08-08 19:49:05 +00:00
josh
637ec7aea0 Updated CHANGELOG to note the ctype audit changes. 2009-08-08 00:31:41 +00:00
kris
8b13026ef9 update ip_is_reserved(): 175/8 and 182/8 allocated this month 2009-08-03 19:35:16 +00:00
david
69e888bc4f Add to CHANGELOG:
o [Ncat, Ndiff] The exit codes of these programs now reflect whether
  they succeeeded. For Ncat, 0 means the connection was successful, 1
  indicates a network error, and 2 indicates any other error. For
  Ndiff, 0 means the scans were equal, 1 means they were different,
  and 2 indicates a runtime error. [David]
2009-07-30 14:43:16 +00:00
venkat
15e2997e66 Added entry for wildcard SSL certificate support to Ncat 2009-07-27 23:44:07 +00:00
david
eac15cb919 Apply a patch by Dmitry Levin that uses a network interface's full name,
including alias extension, in several places to avoid this error message
when an alias has an IP address but the primary interface doesn't:
Failed to lookup subnet/netmask for device (venet0): venet0: no IPv4 address assigned
The patch also considers an interface alias if the primary interface
does not appear in the list of interfaces (perhaps because it does not
have an IP address assigned) when building the table of routes.
2009-07-27 19:01:58 +00:00
david
6192fbdd31 Make the Ncat options --ssl-cert, --ssl-key, and --ssl-trustfile imply
--ssl.
2009-07-27 03:13:56 +00:00
venkat
55f72ba7b9 Added entry for ssl version fallback patch 2009-07-25 21:07:20 +00:00
david
9aebba220c Merge from svn://svn.insecure.org/nmap-exp/daniel/{nmap,ncat,nsock}-sctp.
This adds SCTP support (including SSL over SCTP) to Nsock and Ncat.
2009-07-25 00:03:48 +00:00
josh
588b510945 Updated the changelog to reflect the merging of the new zenmap-filter code
into the trunk.
2009-07-23 05:44:24 +00:00
venkat
f673eff211 added entry for ncat stats 2009-07-22 21:52:08 +00:00
david
9a13866a7a Apply a format string vulnerability patch by Dmitry Levin. The code in
question had already been made safe by Guillaume Rousse in r14432, but
Dmitry's patch also gets rid of a temporary buffer.
2009-07-22 16:01:23 +00:00
david
a76689b17f The ARP host discovery scan now filters ARP packets based on their
target address address field, not the destination address in the
enclosing ethernet frame. Some operating systems, including Windows
7 and Solaris 10, are known to at least sometimes send their ARP
replies to the broadcast address and Nmap wouldn't notice them. The
symptom of this was that root scans wouldn't work ("Host seems
down") but non-root scans would work. Thanks to Mike Calmus and
Vijay Sankar for reporting the problem, and Marcus Haebler for
suggesting the fix.
2009-07-22 15:13:48 +00:00
david
c30888e04e Make -fno-strict-aliasing unconditional when using GCC. It was intended
to be enabled when the GCC major version was greater than or equal to 4,
but the test was backwards to it was in effect for for versions less
than or equal to 4. So it was in effect already unconditional.
-fstrict-aliasing is supported all the way back in 2.95.2, and I suppose
-fno-strict-aliasing is too.
2009-07-22 00:32:57 +00:00
david
a88bda3d78 Make it a warning, not a fatal error, when we can't get the hardware address
for an interface, and skip the interface. The warning looks like

Warning: Unable to get hardware address for interface %s -- skipping it.

This happens when a FireWire interface (fw*) has an address configured on Mac
OS X. Previously Nmap would die in getinterfaces so it wasn't even possible to
scan over the other interfaces.
2009-07-20 18:59:58 +00:00
fyodor
1736dde56c Applied patch:
o Fixed a log_write call and a pfatal call to use a syntax which is
  safer from format strings bugs.  This allows Nmap to build with the
  gcc -Wformat -Werror=format-security options. [Guillaume Rousse]
2009-07-19 07:23:32 +00:00
fyodor
935d0677da Added Nmap 5.00 to the CHANGELOG 2009-07-18 22:23:23 +00:00
david
4d9094fb21 o Added the pjl-ready-message.nse script from Aaron Leininger. This
script allows viewing and setting the message displayed by printers
  that support the Printer Job Language.
2009-07-16 22:46:45 +00:00
david
f5ff7da42c Add to CHANGELOG:
o The Ndiff man page was expanded with examples and sample output.
2009-07-16 21:56:08 +00:00
david
a79ddef79f Made RPC grinding work from service detection again by changing the
looked-for service name from "rpc" to "rpcbind", the name it has in
nmap-service-probes.
2009-07-16 04:29:29 +00:00
david
635850af8b Small documentation updates for script output support in Ndiff. 2009-07-13 06:06:58 +00:00
david
7dbe9e55d3 Add to CHANGELOG:
o A bug in Nsock was fixed: On systems where a nonblocking connect
  could succeed immediately, connections that were requested to be
  tunnelled through SSL would actually be plain text. This could be
  verified with an Ncat client and server running on localhost. This
  was observed to happen with localhost connections on FreeBSD 7.2.
  Non-localhost connections were likely not affected. The bug was
  reported by Daniel Roethlisberger. [David]
2009-07-13 00:06:38 +00:00
david
276a2f195c [NSE] Scripts that are listed by name with the --script option now
have their verbosity level automatically increased by one. Many
will print negative results ("no infection found") at a higher
verbosity level. The idea is that if you ask for a script
specifically, you are more interested in such results.
2009-07-12 19:35:56 +00:00
venkat
5398e697d0 Remove stray character left over in r14198. 2009-07-12 00:57:11 +00:00
venkat
d51dd6e956 Added proxy code change entry 2009-07-12 00:51:37 +00:00
fyodor
97144b2ae1 trivial spacing differences 2009-07-12 00:19:53 +00:00
kris
8d65f4e28d Make Ncat's --send-only actually not receive from the network when used in
listen and/or broker modes.
2009-07-11 00:16:39 +00:00
david
3b18401d5d Do SSL_read in the same place as a normal socket read in ncat_broker.c
so that read errors for both can be handled in the same place. SSL_read
errors were not being handled at all, which would cause the Ncat broker
to use 100% CPU after a client disconnected. The problem was reported by
Kris at http://seclists.org/nmap-dev/2009/q2/0840.html.
2009-07-10 21:57:45 +00:00
david
df2611a5be [Ncat] Ncat now prints a message like "Connection refused." by
default when a socket error occurs. This used to require -v, but
printing no message at all could make a failed connection look like
success in a case like
  ncat remote < short-file
2009-07-10 20:08:41 +00:00
josh
e42d963ec1 [Ncat] Reworked the test program ncat/test/test-cmdline-split and added
additional cases.  Also rewrote cmdline_split in ncat_posix.c
2009-07-09 04:00:35 +00:00
david
ba2e2299f7 Make Ncat --broker imply --listen. 2009-07-08 03:55:12 +00:00
fyodor
fca6e39c60 Note Tom's version detection improvements 2009-07-07 06:46:16 +00:00
josh
f05fa16549 Added a test program to ncat/test to test the cmdline_split function in
ncat/ncat_posix.c.  This is done in preparation for an eventual rewrite of
cmdline_split.
2009-07-07 01:18:53 +00:00
david
3f8392d974 Add CHANGELOG entry for UDP payloads and add guidelines for payloads to
payloads.cc.
2009-07-06 18:34:29 +00:00
fyodor
549f3927a8 trivial typo fix 2009-07-05 09:38:34 +00:00
josh
294b15ce81 Fixed two memory leaks and a case where an open file may not be closed. 2009-07-02 03:36:43 +00:00