1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-22 07:29:01 +00:00
Commit Graph

4571 Commits

Author SHA1 Message Date
david
8ed86b8696 Some improvements to the Ndiff man page: a description of text output
and a shell script for daily scanning with cron. Still a work in
progress.
2009-07-16 18:47:58 +00:00
david
0622056f86 Remove some dead code from RPC scan. There was a "tries" variable and
code to increase the scan delay if tries increased too much. But the
main loop did an unconditional continue before incrementing tries, so it
was always 0. I looked back at the history and saw that it was always
like this for RPC scan. tries was only incremented for the other scan
types handled by pos_scan, which now are done by ultra_scan. So I
removed the tries accounting and dependent code.
2009-07-16 04:50:47 +00:00
david
a79ddef79f Made RPC grinding work from service detection again by changing the
looked-for service name from "rpc" to "rpcbind", the name it has in
nmap-service-probes.
2009-07-16 04:29:29 +00:00
batrick
a8891ec0ca If the old _index metamethod does not exist then do not use it. This would
cause "attempt to index a nil value" errors when whatever is being made
"strict" did not have a metatable (the global environment for example).
2009-07-16 03:43:23 +00:00
batrick
0be861959f ssh-hostkey no longer looks for the action global which
may not exist (and thus triggers an error from strict.lua). We instead
setup dummy portrule/action functions, print the debug error for why the script
will not run, and return.
2009-07-16 03:41:36 +00:00
fyodor
fd39bf6970 2009-07-16 03:10:08 +00:00
david
401fa9d2d3 Be more careful about checking address families in hostInExclude.
Before, a variable was set to NULL if it was not AF_INET, and was later
dereferenced in handling target groups containing IPv4 addresses. This
never actually caused a problem because Nmap's -6 switch is global, so
if an AF_INET6 address was passed to hostInExclude, none of the target
groups could have contained IPv4 addresses and the NULL dereference
would not have occurred. It might have broken easily in the future
though. Now the IPv4 target groups make sure they are dealing with an
AF_INET address.
2009-07-16 02:47:44 +00:00
jah
bfa1e3ef9b Added a note that the registry details for Redist package need updating
whenever the Redist package is upgraded.
2009-07-15 22:27:34 +00:00
jah
b1ca97694d Update the uninstall registry key for the upgraded vcredist_x86.exe package
(r13075).
(See http://seclists.org/nmap-dev/2009/q3/0164.html )
2009-07-15 22:04:53 +00:00
joao
4530194599 Fix global to local variables 2009-07-15 21:29:41 +00:00
joao
f0415b5393 Fix global to local variable loc 2009-07-15 21:21:19 +00:00
batrick
04685b77a5 Changed default --max-parallelism for the NSE Nsock library binding to 20
after discussion in the NSE meeting. We are using this value due to machines
on very poor network connections occupying a niche in Nmap's user base.
2009-07-15 15:27:16 +00:00
batrick
ba4e924634 Corrected the NSEDoc formatting and wording. 2009-07-15 15:19:33 +00:00
batrick
9d5de2a9d1 Added strict library for libraries (and scripts). The module function is
replaced so that all NSE modules will have strict declared global checking at
runtime. This should catch most developer errors early. Please see [1] for
further reference into the problem.

[1] http://seclists.org/nmap-dev/2009/q3/0070.html
2009-07-15 15:14:00 +00:00
david
1961eed908 Use CRLF, not just LF, in auth-owners.nse. Send CRLF in the request and
strip it from the response. Previously only LF was stripped from the
response so each user name had a CR at the end of it (invisible in the
terminal).
2009-07-15 14:54:03 +00:00
batrick
67f31fd170 Fixed a global access for 'opts' using check_globals script. 2009-07-15 14:16:14 +00:00
batrick
35f94dcaf3 Removed two functions no longer being used. 2009-07-15 08:53:19 +00:00
david
dab741f30f Make nse_selectedbyname return false if the "NSE_SELECTED_BY_NAME" key
is not in the registry. That function is called indirectly by
nmap.verbosity, which may be called before _R["NSE_SELECTED_BY_NAME"]
has been given a value. I was getting this error with any script scan:

NSE: failed to initialize the script engine:
attempt to call a nil value
stack traceback:
        [C]: in function 'verbosity'
        ./nse_main.lua:136: in function 'print_verbose'
        ./nse_main.lua:680: in main chunk
        [C]: ?

QUITTING!
2009-07-15 02:54:03 +00:00
fyodor
276def3c2e changes from NSE meeting 2009-07-15 01:28:34 +00:00
batrick
01c25ab29e [NSE] Patch to move the call NSE_SELECTED_BY_NAME to nse_main.cc for
improved locality. Other Lua Registry functions called by C were wrapped in
a C API inside nse_main.cc.
2009-07-14 22:41:25 +00:00
fyodor
ad10a7c672 Latest TODO after chat w/David 2009-07-14 22:27:17 +00:00
fyodor
7c4abd869b some reorg 2009-07-14 20:05:41 +00:00
batrick
490c0c3b57 Add destructor for mutex "trylock" case (was forgotten in mutex destructor
patch).
2009-07-14 11:36:39 +00:00
batrick
9dce0cd070 Fixed a compiler warning. 2009-07-14 09:56:09 +00:00
batrick
543af4c57d Increased the default parallelism for NSE to 40. This patch is the result
of testing to determine an ideal default value. A post on nmap-dev will
soon follow further describing the results and motivation.
2009-07-14 05:19:47 +00:00
david
7ce852170b Move format_difftime to after the action function where it belongs. 2009-07-13 22:49:50 +00:00
david
40b0f784e7 Make http-date.nse capable of printing time differences in years. A web
server with a date in 2007 was producing the output

|_ http-date: Sun, 07 Jan 2007 08:17:36 GMT; -918d13h46m40s from local time.

Now it is

|_ http-date: Sun, 07 Jan 2007 09:01:44 GMT; -2y187d13h46m40s from local time.
2009-07-13 22:48:53 +00:00
david
426ed74a8b Add the http-date.nse script. Also the function http.parse_date that
parses an HTTP date in any of three possible formats.

http-date.nse gets the Date: header field value from and HTTP server,
then displays it with how much it differs from local time.
2009-07-13 22:03:02 +00:00
joao
c455e12b7d http.lua using a different approach to deal with ssl connections. Now it is using the comm.tryssl method. 2009-07-13 15:24:14 +00:00
daniel
47940be062 Update TODO.sctp to reflect recent progress in Ncat SCTP support. 2009-07-13 09:48:24 +00:00
david
635850af8b Small documentation updates for script output support in Ndiff. 2009-07-13 06:06:58 +00:00
david
ba53f578b3 Show script output in Ndiff text output. 2009-07-13 05:59:05 +00:00
david
b9f994e71d Add script output to Ndiff XML output. 2009-07-13 05:34:13 +00:00
david
fda75eea6c Move the text output of port diffs from the HostDiff class to the
PortDiff class.
2009-07-13 04:19:21 +00:00
fyodor
c29429ecb5 2009-07-13 01:34:45 +00:00
david
7dbe9e55d3 Add to CHANGELOG:
o A bug in Nsock was fixed: On systems where a nonblocking connect
  could succeed immediately, connections that were requested to be
  tunnelled through SSL would actually be plain text. This could be
  verified with an Ncat client and server running on localhost. This
  was observed to happen with localhost connections on FreeBSD 7.2.
  Non-localhost connections were likely not affected. The bug was
  reported by Daniel Roethlisberger. [David]
2009-07-13 00:06:38 +00:00
david
276a2f195c [NSE] Scripts that are listed by name with the --script option now
have their verbosity level automatically increased by one. Many
will print negative results ("no infection found") at a higher
verbosity level. The idea is that if you ask for a script
specifically, you are more interested in such results.
2009-07-12 19:35:56 +00:00
fyodor
6a9f1caf3f 2009-07-12 08:19:56 +00:00
fyodor
2447224881 2009-07-12 06:59:29 +00:00
fyodor
e9bf63538d Add web application attack TODO--comparision w/Nessus http://blog.tenablesecurity.com/2009/06/enhanced-web-application-attacks-added-to-nessus.html 2009-07-12 01:26:07 +00:00
venkat
5398e697d0 Remove stray character left over in r14198. 2009-07-12 00:57:11 +00:00
venkat
d51dd6e956 Added proxy code change entry 2009-07-12 00:51:37 +00:00
fyodor
ed5eda1a1e Note how nice it would be if we had Nmap/Zenmap/Ncat promotional and training videos 2009-07-12 00:28:02 +00:00
fyodor
97144b2ae1 trivial spacing differences 2009-07-12 00:19:53 +00:00
david
5abf361663 Visually simplify the code that builds the port table. 2009-07-11 02:26:02 +00:00
kris
8d65f4e28d Make Ncat's --send-only actually not receive from the network when used in
listen and/or broker modes.
2009-07-11 00:16:39 +00:00
david
a660b37026 Parse script results. 2009-07-10 23:55:29 +00:00
david
4b99c96667 Run whois.nse in complex.xml so it has a hostscript. 2009-07-10 23:50:44 +00:00
david
72949e27e8 Remove the test for the sort order of addresses. The idea behind that
was that if a host had multiple addresses of the same type, they should
be sorted numerically, not alphabetically. So 20.0.0.1 should come
before 100.0.0.1. But the way Nmap works, I don't think a host can have
more than one address of the same type, and it's not worth the code it
would take to make them sort properly if it did.
2009-07-10 23:30:32 +00:00
david
3d3e3b8515 Regnerate test scan files, add script scanning, version detection, and
OS detection to complex.xml.
2009-07-10 23:28:28 +00:00