david
e77a084790
Restore original docs for ip-forwarding.target.
...
It was hidden as a @param isntead of an @args.
2013-01-24 18:11:06 +00:00
david
67fdf7fd63
CHANGELOG for Matousek NSEDoc fixes.
2013-01-24 18:04:43 +00:00
david
67aa5516f4
Fix various NSEDoc problems.
...
Found by David Matousek.
http://seclists.org/nmap-dev/2013/q1/88
2013-01-24 18:04:42 +00:00
david
11ba3ef045
Check NMAP_PRIVILEGED and NMAP_UNPRIVILEGED in Zenmap is_root.
...
You won't get the "you're not root" dialog if NMAP_PRIVILEGED is set.
Patch by Tyler Wagner.
http://seclists.org/nmap-dev/2013/q1/87
2013-01-24 17:18:13 +00:00
fyodor
572c5cf0cc
note some new Nping tasks that David and I discussed today and also some debugging results related to a potential nping issue previously discussed
2013-01-23 23:47:38 +00:00
henri
b4400d0a44
Added static inline wrappers to simplify calls to I/O engine functions.
2013-01-23 22:06:40 +00:00
henri
a7f2788b26
Removed another forgotten vestige of nsock_trace.
2013-01-23 22:06:35 +00:00
henri
0e5e939c00
Added a special NSOCK_LOG_NONE value, to disable all messages.
2013-01-23 21:25:01 +00:00
david
eb98386809
Remove vestiges of nsp_settrace.
...
Now you call nsock_set_log_function then nsock_set_loglevel.
http://seclists.org/nmap-dev/2013/q1/72
2013-01-22 23:40:16 +00:00
david
01e4c23692
CHANGELOG a side effect of target refactoring: mixed IPv4 ranges and netmasks.
2013-01-22 00:07:16 +00:00
david
e1fba2d663
Merge r30416:30527 from /nmap-exp/david/ipv6-ranges.
...
This is a refactoring of target parsing that stores different types of
target specifications as different classes. The eventual intention is to
allow easy iteration over each specification for the purpose of IPv6
multicast host discovery.
2013-01-22 00:01:08 +00:00
david
d04f16eb32
Add more to the CHANGELOG about slack descriptors.
2013-01-21 04:44:33 +00:00
david
60e26a8f42
CHANGELOG for nmap-fo.xsl.
2013-01-21 04:36:08 +00:00
david
3381ae7648
Put a link to the nmap-fo.xsl github.
2013-01-21 04:36:07 +00:00
david
deafe16025
Put the usage comment at the top of nmap-fo.xsl.
2013-01-21 04:36:06 +00:00
david
755ca70ea7
Move nmap_fo.xsl → nmap-fo.xsl.
...
For uniformity with other files in this directory.
2013-01-21 04:36:06 +00:00
david
e46697780d
Add nmap_fo.xsl, a stylesheet to transform Nmap XML to FO.
...
By Tilik Ammon.
http://seclists.org/nmap-dev/2013/q1/14
https://github.com/tilikammon/nmap-to-fo/raw/master/nmap_fo.xsl at
0cf869844e.
2013-01-21 04:36:05 +00:00
david
51c7dc5b7f
Increase the number of slack file descriptors in connect scan.
2013-01-21 04:36:03 +00:00
david
2a1abf7b84
Make some return values less confusing.
2013-01-20 12:12:29 +00:00
david
948b3e9bcd
Regen .mo files.
...
This fixes a search-and-replace in r30347 that broke these binary files.
Discovered by eric c4rtman.
http://seclists.org/nmap-dev/2013/q1/53
2013-01-20 11:34:53 +00:00
david
d4ddff34d4
Point the --webxml stylesheet at the new repository.
...
The old URL at svn.insecure.org was a redirect pointing at the new
svn.nmap.org.
Unfortunately, it appears that the new URL still doesn't work, because
of same-origin issues.
http://seclists.org/nmap-dev/2013/q1/56
2013-01-20 10:23:04 +00:00
djalal
6f5cf53780
o [NSE] Made the vulnerability library able to preserve vulnerability
...
information across multiple ports of the same host.
2013-01-19 19:00:11 +00:00
david
b1c4f7f012
Localize struct pingtech in scan_engine.cc.
2013-01-18 00:33:03 +00:00
david
58de96cfbe
Remove unused pingtune and tcpqueryinfo structs.
2013-01-18 00:33:02 +00:00
david
27c8ff9876
Fix NSEDoc in http-vhosts.
...
Noticed by David Matousec.
http://seclists.org/nmap-dev/2013/q1/39
2013-01-16 18:46:45 +00:00
david
42b6489312
Limit ventrilo-info to port 3784 (TCP or UDP).
...
Cf. r30460. We may want to run on more port numbers than just this one,
because the server can be configured to run on other ports. But we don't
want it to run for every open|filtered UDP port by default. We don't
ahve a good way to express anything in between.
2013-01-16 00:29:08 +00:00
david
0a5677085d
Some doc changes in ventrilo-info.
2013-01-16 00:29:07 +00:00
david
0faba68f11
Typo.
2013-01-16 00:29:06 +00:00
david
b1ad58d68d
Add ventrilo-info script from Marin Maržić.
...
http://seclists.org/nmap-dev/2012/q4/478
2013-01-16 00:29:05 +00:00
david
906a94e600
Fix spelling in some comments.
...
By Matt Selsky.
http://seclists.org/nmap-dev/2013/q1/34
2013-01-15 22:31:11 +00:00
paulino
76d4889eea
Adds entry for Oracle GlassFish
2013-01-15 07:06:24 +00:00
david
8ae9768b7e
Rearrange some variables for proper NSEDoc generation.
...
http://seclists.org/nmap-dev/2013/q1/26
2013-01-14 23:00:37 +00:00
david
a39d14de2f
TODO item to test TLS validation with a tool I learned about.
2013-01-12 00:04:44 +00:00
henri
0d58167dcf
fixed format string!
2013-01-10 19:19:15 +00:00
henri
d878062cc7
Added format attribute to __nsock_log_internal.
...
This allows log format strings to be checked at compile time.
2013-01-10 19:19:09 +00:00
fyodor
b9fe5bce4f
note a done task
2013-01-10 01:43:19 +00:00
david
da88c7f26a
Whitespace.
2013-01-08 04:37:34 +00:00
david
45cd30eea0
NMAP_ARGS typo.
2013-01-08 04:28:01 +00:00
henri
fb90c4ff33
Replaced the LOWER_MAX_FD macro by a static inline function.
2013-01-07 21:54:07 +00:00
fyodor
13401ed640
Note a done task
2013-01-04 19:40:22 +00:00
david
a6dd675fd3
Don't do operations with side effects inside asserts.
...
ncat_assert is safe because it cannot be disabled. <assert.h> assert is
also safe because we make sure that NDEBUG remains defined. Doing this
helps avoid potential bad effects of something changing in the future.
2013-01-04 18:59:56 +00:00
david
63d9e8b5d5
Use ncat_assert in place of assert everywhere.
2013-01-04 18:59:47 +00:00
david
b44d477344
Comment typo.
2013-01-04 18:59:44 +00:00
david
f86b575aa1
Remove -q (quash argv to "pine" option).
2013-01-04 18:59:11 +00:00
david
e03dcf3d8a
Do a connect on rpc-grind UDP sockets to invoke socket_lock.
...
This connect should be side effect–free except for calling socket_lock,
which prevents the creation of an excessive number of sockets. Not using
the lock was causing "Too many open files" errors.
We should have a cleaner general solution for this, and not require
scripts to "connect" their unconnected UDP sockets. I seem to remember
that there was a good reason for not enforcing the lock on socket
creation, but only on connect, as we do.
http://seclists.org/nmap-dev/2012/q4/435
2012-12-31 19:06:33 +00:00
david
4cf5d561cb
Limit murmur-version to five ports.
...
It can be configured to run on any port, but
http://mumble.sourceforge.net/FAQ/English#What_is_the_default_server_port_for_Murmur.3F
says the default is 64738. Include that port and the next four higher.
The script was running for every open|filtered port, which is excessive.
2012-12-30 00:52:36 +00:00
david
02659c3de2
Use version_port_or_service over port_or_service.
2012-12-30 00:39:30 +00:00
henri
941b73ac8a
Minor style fixes.
2012-12-29 15:59:59 +00:00
david
d24ab2d43c
Make dns-nsec-enum and dns-nsec3-enum reference each other.
2012-12-29 15:25:41 +00:00
david
83f9cf53c1
Remove executable bit from nmap-man-id.xml.
2012-12-25 01:28:30 +00:00