1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Commit Graph

22 Commits

Author SHA1 Message Date
dmiller
d86a177456 Mark IPv6 host as up if ND response received outside timeout window, same as ARP/IPv4 2019-02-26 20:13:36 +00:00
dmiller
f519e64b1d Avoid matching ARP/ND response with probes sent after it was received. Fixes #863 2019-02-26 19:59:34 +00:00
dmiller
aaf5075c67 Move probespec to its own header to reduce includes of scan_engine.h 2018-07-13 18:18:28 +00:00
fyodor
ff62300249 Bump copyright dates to 2018 and slightly improve wording (doesn't change meaning) of Nmap license header text 2018-01-28 21:18:17 +00:00
dmiller
9c7ea727a7 Update license terms for 2017 2017-06-07 12:32:38 +00:00
dmiller
ab5e247cee Include netutil.h for IPPROTO_SCTP constant where necessary. Fixes #868 2017-04-26 18:55:16 +00:00
dmiller
9e81835ccb Ignore ICMP Time Exceeded for the purpose of host discovery.
http://seclists.org/nmap-dev/2015/q2/68
From: David Fifield <david () bamsoftware com>
Date: Wed, 29 Apr 2015 10:13:40 -0700

Previously, a Time Exceeded message meant the host was immediately
marked down, even if there were other probes still in transit. Now it
gets treated the same as no-response.

I found that a concurrent ICMP traceroute was interfering with host
discovery. Nmap was receiving and acting on the Time Exceeded messages
produced by the traceroute process. This caused it to mark a host as
down that actually was up.
2017-04-15 03:30:27 +00:00
dmiller
94bf0f879f Allow very late/unrelated ARP responses to affect host state. See #92 2016-12-23 22:58:01 +00:00
fyodor
4bd67aa2fb Update the Nmap license/header text to reflect latest updates to docs/legal-notices.xml 2016-12-14 00:12:23 +00:00
abhishek
9d288db7fd Add support for decoys in IPv6 closes #433 and fixes #98 2016-08-17 06:09:09 +00:00
tudor
89e4901d49 Simple fix that improves accuracy a lot during the host discovery phase 2016-08-07 14:56:46 +00:00
dmiller
5d726c7733 Handle ICMPv6 packets without a body
Two issues here: First, IP protocol scan can send packets with protocol
58 (ICMPv6) even over IPv4. This led to a bad interaction where the
packet was created (in build_protoscan_packet) without a data payload,
but setIP tried to set the packet's Identifier field (present in both
ICMPv6 and ICMP Echo Request packets), leading to a heap buffer
overflow. Instead, we now only try to set this identifier when the IP
version matches the ICMP version, indicating that we set the data
payload.

The other issue was a out-of-bounds read while packet tracing when an
ICMPv6 packet without a payload was sent or received, due to trying to
read the type and code. Now we check that the data length is sufficient
to contain an ICMPv6 header before attempting to read one.

Credit LLVM/Clang's AddressSanitizer with catching these bugs.
2016-07-28 05:11:35 +00:00
dmiller
6e33d6ac3c Bump date in copyright headers 2016-04-04 15:38:44 +00:00
dmiller
f4619edece Update http urls for nmap.org to https 2015-11-05 20:41:05 +00:00
dmiller
0f371d701a Consolidate TCP options for SYN into nmap.h 2015-07-14 03:08:17 +00:00
dmiller
80f8eb6bce Use forward-declaration of class Target instead of including Target.h in *.h 2015-06-30 04:04:48 +00:00
dmiller
eba17126a1 Fix assertion error #154 2015-06-07 14:38:05 +00:00
dmiller
68409b2226 Update copyright date to 2015 2015-06-03 13:01:29 +00:00
dmiller
a61d7dcc17 Match ICMP ID with returned probes to avoid interference with other scans. Fixes #110 2015-06-01 13:42:19 +00:00
dmiller
febc009a13 Fix -PE for IPv6 2015-02-20 18:56:39 +00:00
d33tah
b9fb766a4f Move a lot of raw/connect scanning routines. 2014-09-03 14:27:11 +00:00
d33tah
c86b862501 Introduce scan_engine_connect.cc, scan_engine_connect.h,
scan_engine_raw.cc, scan_engine_raw.h and add them to Windows and Unix
build systems.
2014-09-03 14:27:00 +00:00