1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-21 21:59:08 +00:00
Commit Graph

702 Commits

Author SHA1 Message Date
david
9aebba220c Merge from svn://svn.insecure.org/nmap-exp/daniel/{nmap,ncat,nsock}-sctp.
This adds SCTP support (including SSL over SCTP) to Nsock and Ncat.
2009-07-25 00:03:48 +00:00
josh
588b510945 Updated the changelog to reflect the merging of the new zenmap-filter code
into the trunk.
2009-07-23 05:44:24 +00:00
venkat
f673eff211 added entry for ncat stats 2009-07-22 21:52:08 +00:00
david
9a13866a7a Apply a format string vulnerability patch by Dmitry Levin. The code in
question had already been made safe by Guillaume Rousse in r14432, but
Dmitry's patch also gets rid of a temporary buffer.
2009-07-22 16:01:23 +00:00
david
a76689b17f The ARP host discovery scan now filters ARP packets based on their
target address address field, not the destination address in the
enclosing ethernet frame. Some operating systems, including Windows
7 and Solaris 10, are known to at least sometimes send their ARP
replies to the broadcast address and Nmap wouldn't notice them. The
symptom of this was that root scans wouldn't work ("Host seems
down") but non-root scans would work. Thanks to Mike Calmus and
Vijay Sankar for reporting the problem, and Marcus Haebler for
suggesting the fix.
2009-07-22 15:13:48 +00:00
david
c30888e04e Make -fno-strict-aliasing unconditional when using GCC. It was intended
to be enabled when the GCC major version was greater than or equal to 4,
but the test was backwards to it was in effect for for versions less
than or equal to 4. So it was in effect already unconditional.
-fstrict-aliasing is supported all the way back in 2.95.2, and I suppose
-fno-strict-aliasing is too.
2009-07-22 00:32:57 +00:00
david
a88bda3d78 Make it a warning, not a fatal error, when we can't get the hardware address
for an interface, and skip the interface. The warning looks like

Warning: Unable to get hardware address for interface %s -- skipping it.

This happens when a FireWire interface (fw*) has an address configured on Mac
OS X. Previously Nmap would die in getinterfaces so it wasn't even possible to
scan over the other interfaces.
2009-07-20 18:59:58 +00:00
fyodor
1736dde56c Applied patch:
o Fixed a log_write call and a pfatal call to use a syntax which is
  safer from format strings bugs.  This allows Nmap to build with the
  gcc -Wformat -Werror=format-security options. [Guillaume Rousse]
2009-07-19 07:23:32 +00:00
fyodor
935d0677da Added Nmap 5.00 to the CHANGELOG 2009-07-18 22:23:23 +00:00
david
4d9094fb21 o Added the pjl-ready-message.nse script from Aaron Leininger. This
script allows viewing and setting the message displayed by printers
  that support the Printer Job Language.
2009-07-16 22:46:45 +00:00
david
f5ff7da42c Add to CHANGELOG:
o The Ndiff man page was expanded with examples and sample output.
2009-07-16 21:56:08 +00:00
david
a79ddef79f Made RPC grinding work from service detection again by changing the
looked-for service name from "rpc" to "rpcbind", the name it has in
nmap-service-probes.
2009-07-16 04:29:29 +00:00
david
635850af8b Small documentation updates for script output support in Ndiff. 2009-07-13 06:06:58 +00:00
david
7dbe9e55d3 Add to CHANGELOG:
o A bug in Nsock was fixed: On systems where a nonblocking connect
  could succeed immediately, connections that were requested to be
  tunnelled through SSL would actually be plain text. This could be
  verified with an Ncat client and server running on localhost. This
  was observed to happen with localhost connections on FreeBSD 7.2.
  Non-localhost connections were likely not affected. The bug was
  reported by Daniel Roethlisberger. [David]
2009-07-13 00:06:38 +00:00
david
276a2f195c [NSE] Scripts that are listed by name with the --script option now
have their verbosity level automatically increased by one. Many
will print negative results ("no infection found") at a higher
verbosity level. The idea is that if you ask for a script
specifically, you are more interested in such results.
2009-07-12 19:35:56 +00:00
venkat
5398e697d0 Remove stray character left over in r14198. 2009-07-12 00:57:11 +00:00
venkat
d51dd6e956 Added proxy code change entry 2009-07-12 00:51:37 +00:00
fyodor
97144b2ae1 trivial spacing differences 2009-07-12 00:19:53 +00:00
kris
8d65f4e28d Make Ncat's --send-only actually not receive from the network when used in
listen and/or broker modes.
2009-07-11 00:16:39 +00:00
david
3b18401d5d Do SSL_read in the same place as a normal socket read in ncat_broker.c
so that read errors for both can be handled in the same place. SSL_read
errors were not being handled at all, which would cause the Ncat broker
to use 100% CPU after a client disconnected. The problem was reported by
Kris at http://seclists.org/nmap-dev/2009/q2/0840.html.
2009-07-10 21:57:45 +00:00
david
df2611a5be [Ncat] Ncat now prints a message like "Connection refused." by
default when a socket error occurs. This used to require -v, but
printing no message at all could make a failed connection look like
success in a case like
  ncat remote < short-file
2009-07-10 20:08:41 +00:00
josh
e42d963ec1 [Ncat] Reworked the test program ncat/test/test-cmdline-split and added
additional cases.  Also rewrote cmdline_split in ncat_posix.c
2009-07-09 04:00:35 +00:00
david
ba2e2299f7 Make Ncat --broker imply --listen. 2009-07-08 03:55:12 +00:00
fyodor
fca6e39c60 Note Tom's version detection improvements 2009-07-07 06:46:16 +00:00
josh
f05fa16549 Added a test program to ncat/test to test the cmdline_split function in
ncat/ncat_posix.c.  This is done in preparation for an eventual rewrite of
cmdline_split.
2009-07-07 01:18:53 +00:00
david
3f8392d974 Add CHANGELOG entry for UDP payloads and add guidelines for payloads to
payloads.cc.
2009-07-06 18:34:29 +00:00
fyodor
549f3927a8 trivial typo fix 2009-07-05 09:38:34 +00:00
josh
294b15ce81 Fixed two memory leaks and a case where an open file may not be closed. 2009-07-02 03:36:43 +00:00
fyodor
971fb7551d Included release dates for the remainder of the CHANGELOG, which goes back to Nmap 2.05 (1999-02-08), also did some trivial normalization work to ensure releases are reported in the same format 2009-07-01 09:15:50 +00:00
fyodor
a3a273629e Correct a small option name mistake in the CHANGELOG 2009-07-01 06:48:58 +00:00
fyodor
9ca4041ec1 Merged -r13793:HEAD from nmap-exp/dev/nmap branch now that we're opening up trunk development
again.  Here are the items which were merged:

------------------------------------------------------------------------
r13971 | jah | 2009-06-29 14:30:27 -0700 (Mon, 29 Jun 2009) | 2 lines

Improved a pattern for matching HTTP status-line, tidy away some variables and
fix a typo.
------------------------------------------------------------------------
r13967 | daniel | 2009-06-29 13:47:04 -0700 (Mon, 29 Jun 2009) | 5 lines

o Added a convenience top-level BSD makefile redirecting BSD make
  to GNU make on BSD systems.  This should help prevent bogus
  error reports when users run "make" instead of "gmake" on BSD
  systems. [Daniel Roethlisberger]

------------------------------------------------------------------------
r13965 | batrick | 2009-06-29 06:50:11 -0700 (Mon, 29 Jun 2009) | 14 lines

[NSE] The NSE Nsock Library binding no longer relies on garbage collection to
monitor the use of socket "slots". A thread (script) attempting to connect must
first obtain one of a limited number of available socket locks (usually 10 or
--max-parallelism). The binding would use garbage collection of sockets to
determine when a thread has finished using its allocated sockets. This is
unfortunately slow and requires us to constantly run the garbage collector to
cause timely reallocation. I have changed the binding to now regularly inspect
allocated sockets in the nsock_loop function. Available sockets slots are now
immediately reallocated and done with far less execution time.

See [1] for benchmarks and further explanation.

[1] http://seclists.org/nmap-dev/2009/q2/0624.html

------------------------------------------------------------------------
r13964 | batrick | 2009-06-29 06:37:49 -0700 (Mon, 29 Jun 2009) | 10 lines

[NSE] Fixed a rare (and usually undetectable) bug that can cause a SEGFAULT.
The NSE nsock library binding may attempt to push values on the stack of
a thread that ended due to an error. It is possible that the internal
Lua stack was completely full and any further pushed values would result
in a segmentation memory violation.

This bug is very hard to reproduce with a SEGFAULT but is usually visible
when Lua assertion checks are turned on. A socket handler routine must be
called AFTER a thread has ended in error.

------------------------------------------------------------------------
r13963 | batrick | 2009-06-29 05:51:20 -0700 (Mon, 29 Jun 2009) | 3 lines

Fixed some global scoped variables to be local. This caused a many scripts to
overwrite each others' sockets, options, etc.

------------------------------------------------------------------------
r13939 | joao | 2009-06-27 16:07:35 -0700 (Sat, 27 Jun 2009) | 2 lines

Fixed port rule to include ssl pop3 port, now that pop3.lua supports SSL connections in function capabilities

------------------------------------------------------------------------
r13938 | joao | 2009-06-27 16:06:28 -0700 (Sat, 27 Jun 2009) | 2 lines

Added transparent SSL support using comm.tryssl

------------------------------------------------------------------------
r13937 | joao | 2009-06-27 16:05:19 -0700 (Sat, 27 Jun 2009) | 2 lines

Added transparent SSL support using comm.tryssl

------------------------------------------------------------------------
r13936 | joao | 2009-06-27 16:03:50 -0700 (Sat, 27 Jun 2009) | 2 lines

Added SSL transparent support using comm.tryssl

------------------------------------------------------------------------
r13935 | joao | 2009-06-27 16:02:39 -0700 (Sat, 27 Jun 2009) | 2 lines

Added SSL transparent support using comm.tryssl

------------------------------------------------------------------------
r13934 | joao | 2009-06-27 16:01:38 -0700 (Sat, 27 Jun 2009) | 2 lines

Added SSL transparent support using comm.tryssl

------------------------------------------------------------------------
r13933 | joao | 2009-06-27 16:00:27 -0700 (Sat, 27 Jun 2009) | 2 lines

SSL transparent support using comm.tryssl

------------------------------------------------------------------------
r13932 | joao | 2009-06-27 15:19:58 -0700 (Sat, 27 Jun 2009) | 2 lines

Included transparent ssl support to function pop3.capabilities using comm.tryssl

------------------------------------------------------------------------
r13931 | joao | 2009-06-27 15:19:06 -0700 (Sat, 27 Jun 2009) | 3 lines

New version of comm.lua with function tryssl, that transparently adds support to ssl connections


------------------------------------------------------------------------
r13930 | joao | 2009-06-27 14:50:38 -0700 (Sat, 27 Jun 2009) | 6 lines

Fixed buffering problem exposed by david on nmap-dev list.
The problem was solved using a buffer to receive the data, making the script work fine in cases where the ssh packets are fragmented.

A very similar solution was applied to ssh1.lua.


------------------------------------------------------------------------
r13928 | batrick | 2009-06-27 04:43:12 -0700 (Sat, 27 Jun 2009) | 18 lines

[NSE] We now propogate a NSE initiated yield on a script through all user
coroutines so that NSE may resume control. Previously, scripts that would yield
in a child coroutine (e.g. a script's child coroutine generated by Lua's
coroutine.create function) would give control back to the script. A script
would yield in this way by making a blocking socket operation. NSE would be
unable to correctly resume child coroutine when the socket operation is
finished processing.

By yielding the chain of coroutines a script has operating, we allow to NSE to
handle the socket operation properly. NSE would then resume the entire chain so
execution may correctly resume at the coroutine which initiated the socket
operation. This restores the "illusion" that a script executes without
interruption.

See [1] for more information, further explanation, and some use cases.

[1] http://seclists.org/nmap-dev/2009/q2/0586.html

------------------------------------------------------------------------
r13817 | david | 2009-06-18 15:57:29 -0700 (Thu, 18 Jun 2009) | 3 lines

Improve an OS fingerprint with a model number and broader matching.
Based on a follow-up report from a submitter.

------------------------------------------------------------------------
r13814 | josh | 2009-06-17 21:34:15 -0700 (Wed, 17 Jun 2009) | 3 lines

[zenmap] Added support to zenmap for the new SCTP options: -PY, -sY and -sZ


------------------------------------------------------------------------
r13797 | ron | 2009-06-17 11:02:18 -0700 (Wed, 17 Jun 2009) | 1 line

Applied a patch from Mak Kolibabi that enhances the output of smb-enum-processes. The output is now modeled after the output of the 'ps' tool for higher verbosity levels.
------------------------------------------------------------------------
r13795 | david | 2009-06-17 09:05:21 -0700 (Wed, 17 Jun 2009) | 6 lines

The configure script now allows cross-compiling by assuming that
libpcap is recent enough. Previously it would quit because a test
program could not be run. libpcap will always be recent enough when
the included copy is used. The patch was contributed by Mike
Frysinger.
2009-06-29 23:48:19 +00:00
ithilgore
aca370f88d Fixed typos with vsnprintf (was vnsprintf). 2009-06-28 17:33:35 +00:00
fyodor
d06068db0d note that the Zenmap display hanging problem is only on Mac OS X 2009-06-25 00:08:57 +00:00
fyodor
8e30fbbb7f add trivial SCTP NAT note 2009-06-24 21:20:27 +00:00
fyodor
aa2fd81f1c Prepare CHANGELOG for stable release candidate 2009-06-24 21:19:16 +00:00
david
0b508999c1 Fixed a memory bug (access of freed memory) when loading exclude
targets with --exclude. This was reported to occasionally cause a
crash. Will Cladek reported the bug and contributed an initial
patch.
2009-06-14 23:00:33 +00:00
fyodor
b0420dd8d5 fix typo 2009-06-13 05:13:47 +00:00
david
7b6a56c2a6 Clarify a CHANGELOG entry: Ncat connect mode only makes sockets blocking
before handing them off to --exec or --sh-exec.
2009-06-13 02:42:19 +00:00
fyodor
a04c5c81f4 Rebuilt stuff, starting release builds 2009-06-13 02:37:20 +00:00
fyodor
386f381dad OK, I think CHANGELOG is finally ready to go. This is another monster release! 2009-06-13 02:33:37 +00:00
fyodor
3d683755dc Almost done with CHANGELOG, about to spell check 2009-06-13 02:17:06 +00:00
fyodor
6f38892828 Working on the CHANGELOG for the 4.85BETA10 release, which I hope to make today if possible. I still have more CHANGELOG entries to add and shuffling/spell-checking/etc to perform 2009-06-12 10:04:11 +00:00
josh
62567d1208 [zenmap] Fixed two bugs. The first had to do with updates from new scans being
added to existing HostInfo objects.  This made examining scan diffs problematic
in zenmap.  The second had to do with canceling a scan and then removing it.
This would clear much of the information from the rest of the GUI.
2009-06-11 20:43:44 +00:00
josh
a36788b554 Updated the CHANGELOG to reflect a change in the zenmap profiles 2009-06-10 20:54:42 +00:00
david
e80f1188e2 [Ncat] There is a backwards-incompatible change in the way that
listen mode works. The new default behavior is to accept only one
connection, and quit when the connection ends. This was necessary to
prevent data loss in some situations; some programs require Ncat to
send an EOF before they flush their internal buffers and finish
processing the last bit of data. See
http://seclists.org/nmap-dev/2009/q2/0528.html for more information.
Use the new -k or --keep-open option to get the old behavior, in
which Ncat will accept multiple simultaneous connection, combine all
their input, and accept more connections after a disconnection.
2009-06-10 03:03:01 +00:00
david
4e117783a1 With --version-trace, show the names of probes as they are sent. Also
show the names of probes that had a match with --version-trace (used to
only happen with -d2). The patch is from Tom Sellers.
2009-06-08 23:42:57 +00:00
david
5e7c794952 Fix SSL in listen mode for BSD systems and others where a socket inherits its
non-blocking status from accept. A non-blocking socket makes SSL_accept fail if
we naively treat it like a blocking socket.
2009-06-08 00:05:11 +00:00
david
75a2244f97 Change "Save Snapshot" to "Save Graphic" in CHANGELOG. 2009-06-07 14:14:55 +00:00
josh
0b078f4af6 Rewrote the port list merge code in validate_scan_lists to be moremaintainable. 2009-06-06 04:33:35 +00:00
david
1eb18b3143 Use conditional compilation with OPENSSL_VERSION_NUMBER to support a
certain function that is not in OpenSSL before 0.9.7, but is required
for correct operation after 0.9.7. The technique is from Network
Security with OpenSSL, whose code is at http://www.opensslbook.com/code.html
(see ssl/common.c).
2009-06-06 02:13:54 +00:00