1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Commit Graph

164 Commits

Author SHA1 Message Date
dmiller
c58b7b2526 Fix #2496: new targets couldn't be added because singleton object was not created 2022-06-27 23:01:44 +00:00
dmiller
dd690b3e0b Bump copyright date and update some links [ci skip] 2022-02-18 17:38:46 +00:00
fyodor
3aec3f3a07 Update to latest copyright templates. Main change is that Insecure.Com LLC is now Nmap Software LLC 2021-11-23 16:04:37 +00:00
dmiller
1fd272f8dd const all the things! 2021-04-23 20:37:41 +00:00
dmiller
0de714e8d3 New option --unique to prevent scanning same address twice. See #2180 2020-11-15 04:57:44 +00:00
dmiller
ef8213a36c Reintegrate Nmap 7.90 release branch 2020-10-05 23:00:30 +00:00
dmiller
bdc676238f Fix --resume from IPv6 scans 2020-07-13 16:10:00 +00:00
dmiller
d639a53088 Bump copyright date in license headers 2019-05-28 21:36:04 +00:00
dmiller
824f9dcb2f Rearrange declarations to put all addrset functions in nbase.h, hide struct addrset internals. 2018-11-01 04:35:00 +00:00
dmiller
27807aadb4 Straighten out some headers and the (struct) addrset type 2018-11-01 04:34:59 +00:00
dmiller
d03b10ea36 Deprecate/disable -PR option as it was not really being checked.
Fixes #1361
2018-10-24 03:55:42 +00:00
dmiller
9a6f9c5abe Replace redundant checks with a call to o.RawScan() 2018-10-24 03:55:41 +00:00
dmiller
59efc272ec Don't allow -Pn to override a MAC address failure with --send-eth 2018-08-17 03:02:40 +00:00
dmiller
42661c4447 Avoid scanning targets we can't reach anyway.
See d8ff55b72e (commitcomment-30112744)
2018-08-16 22:38:12 +00:00
dmiller
16193bc5e8 Don't quit if no MAC can be found, just mark the target as down. Unusual case, see #1293 2018-08-05 20:22:43 +00:00
fyodor
ff62300249 Bump copyright dates to 2018 and slightly improve wording (doesn't change meaning) of Nmap license header text 2018-01-28 21:18:17 +00:00
dmiller
a66e75173e Keep resolved, scanned addresses separate from unscanned addresses. 2017-08-07 14:25:13 +00:00
dmiller
817dd2a944 Move TargetGroup class to TargetGroup files; make NetBlock class private 2017-08-06 03:20:40 +00:00
dmiller
675ae460b3 Move NewTargets class to its own h/cc files 2017-08-05 21:11:00 +00:00
dmiller
0ef9cc7f83 Correct a comment: there has only been one target_needs_new_hostgroup since 2012 2017-08-05 20:49:53 +00:00
dmiller
cde6853481 Simplify get_next_host and name resolution. 2017-08-04 02:05:20 +00:00
dmiller
d5e7649829 Simplify AF checking for literal IP addresses. 2017-08-03 22:05:18 +00:00
dmiller
9c7ea727a7 Update license terms for 2017 2017-06-07 12:32:38 +00:00
dmiller
e813de759a Reduce use of utils.h for error functions 2017-04-20 22:39:08 +00:00
dmiller
86edcb0e5b Remove some unused includes 2017-04-19 19:06:47 +00:00
dmiller
891c3be3b9 remove tcpip.h from other headers' includes 2017-04-19 13:53:57 +00:00
fyodor
4bd67aa2fb Update the Nmap license/header text to reflect latest updates to docs/legal-notices.xml 2016-12-14 00:12:23 +00:00
abhishek
9d288db7fd Add support for decoys in IPv6 closes #433 and fixes #98 2016-08-17 06:09:09 +00:00
tudor
3ba4a87c75 o.ping_group_sz can be increased above 4096 with a higher --min-hostgroup value, calls to target_needs_new_hostgroup limited as much as possible 2016-08-09 06:12:17 +00:00
dmiller
67fd101b01 Enable Nmap, Nping to use Npcap over Winpcap if available. 2016-06-14 14:16:46 +00:00
dmiller
6e33d6ac3c Bump date in copyright headers 2016-04-04 15:38:44 +00:00
dmiller
fcae4fa15d Fix build failures under --without-liblua 2015-10-26 16:16:02 +00:00
dmiller
ffad433b43 Reduce more inclusions of .h files by forward-declaring classes 2015-07-02 04:14:51 +00:00
dmiller
be6414dfea Fix a memory leak when an address fails to resolve 2015-06-30 13:08:30 +00:00
dmiller
68409b2226 Update copyright date to 2015 2015-06-03 13:01:29 +00:00
dmiller
5adfb3b1de Update copyright notice to 2014 2014-08-16 01:52:33 +00:00
jay
8d5ec9e310 Reapply r33420, r33421. Fix a missing right parenthesis. https://xkcd.com/859/ 2014-08-15 12:09:22 +00:00
fyodor
f6f59a7cd7 Auto regeneration with latest template files, etc. 2014-08-13 22:57:43 +00:00
jay
d4cf544df6 Fix a missing bracket at the end of the IMPORTANT NMAP LICENSE TERMS part in each file 2014-08-02 19:29:50 +00:00
dmiller
f17edebfc2 Fix IPv4 source address for host discovery
Reported here: http://seclists.org/nmap-dev/2014/q3/137

Hostgroups should have a common outgoing interface and source address,
determined by target_needs_new_hostgroup. Source address for raw IP
probes (sendIPScanProbe) is taken from the list of decoys (o.decoys),
which always at least contains a "self" element at index o.decoyturn.
This element was not being set while filling a hostgroup for massping,
so it was using whatever the value from the last hostgroup had. This
only matters when mixing targets that require different source
addresses, as demonstrated by scanning localhost and some other address.
2014-07-28 22:23:07 +00:00
d33tah
421176fc00 Get rid of double newline at the EOF I accidentally introduced in the
last commit.
2014-06-18 11:30:02 +00:00
d33tah
e3d1c178e3 Add newlines at the EOF in conformance to Daniel's coding standards
proposal. This only affects Nmap's root directory. We might also need to
modify the code which autogenerates Nmap's source code files such as IPv6
fingerprinting code.
2014-06-18 10:18:58 +00:00
dmiller
c9714990c7 Remove trailing whitespace from C/C++ files
https://secwiki.org/w/Nmap/Code_Standards
2014-02-12 20:25:51 +00:00
d33tah
ccd0c02a4c Add a lacking space in the license comment. The command I used to do this is:
for file in `grep "* including the terms and conditions of this license text as well.       \*" * -r --files-with-match `; do sed "s/\* including the terms and conditions of this license text as well.       \*/* including the terms and conditions of this license text as well.        */g" -i $file; done
2013-09-11 19:06:20 +00:00
fyodor
6e01ecd452 Update an email address, fix a typo, and slightly reword a sentence. 2013-07-30 00:02:00 +00:00
fyodor
83fb10ec56 Update the Nmap copyright/license files. This isn't the new Nmap Public Source License we've been discussing on the list, but rather just a 'quick patch' to hopefully prevent some of the abuse we've been seeing from companies lately. More details on the changes will be posted to the dev list. Also, the copyright year was updated to 2013 (which is the only change to Nsock license statements). 2013-07-28 22:05:05 +00:00
david
aa76963dcd Check for an address family mismatch after parsign NetBlocks.
This caused a segfault in reverse DNS resolution when the v4hostip of an
IPv6 target was accessed:
./nmap -sL 2001:500:88:200::10
2013-04-22 21:56:09 +00:00
david
5583156725 Check for an empty host batch before ping scanning.
This was a regression related to target deferral. It caused a null
pointer dereference if all your targets failed to resolve or were
excluded.
2013-03-01 02:10:53 +00:00
david
0b20c18f90 Limit the number of HostGroupState targets we will defer.
This prevents potentially reading (and buffering) every input host while
looking for more targets to fill up the current hostgroup. One of the
criteria that can split hostgroups is interface. Suppose you have an
input list of targets whose interfaces are
	eth0 eth0 eth0 wlan0 wlan0 wlan0 wlan0 wlan0 wlan0...
The first three eth0 will go in the first group, and then the following
wlan0 will start to be buffered while we look for more eth0. But we will
only look ahead 64 targets, then go ahead and scan the three eth0.
2013-02-26 03:39:25 +00:00
david
136b8fa280 Add a defer buffer to HostGroupState.
This allows some targets to be skipped over yet remembered so they can
be dealt with later. The idea is that because ping groups are not
allowed
to have duplicate IPs, we continue searching for non-duplicates in order
to fill up a ping group, then return to what were formerly duplicates.
This prevents potentially large ping groups from being split into small
groups.

For example, if the list of targets is
        A B C D A B E A F G
the ping groups used to be
        (A B C D) (A B E) (A F G)
but now they are
        (A B C D E F G) (A B) (A]

A similar thing can be done for port scan hostgroups, but this already
does most of the work because ping groups are generally bigger than
hostgroups and have pretty much the same restrictions.
2013-02-26 03:39:24 +00:00