1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-30 01:59:02 +00:00
Commit Graph

1014 Commits

Author SHA1 Message Date
patrik
d79e431e7a nse_check_globals cleanup 2013-01-28 04:28:38 +00:00
david
37ab88e840 Change 'VPN' to 'security-misc' in ike-fingerprints.
We don't have a 'VPN' device type.
http://nmap.org/book/osdetect-device-types.html
2013-01-28 03:11:21 +00:00
david
710b460ac1 Add ike-version and ike library by Jesper Kückelhahn.
http://seclists.org/nmap-dev/2013/q1/49
2013-01-28 03:06:39 +00:00
djalal
6f5cf53780 o [NSE] Made the vulnerability library able to preserve vulnerability
information across multiple ports of the same host.
2013-01-19 19:00:11 +00:00
paulino
76d4889eea Adds entry for Oracle GlassFish 2013-01-15 07:06:24 +00:00
david
e03dcf3d8a Do a connect on rpc-grind UDP sockets to invoke socket_lock.
This connect should be side effect–free except for calling socket_lock,
which prevents the creation of an excessive number of sockets. Not using
the lock was causing "Too many open files" errors.

We should have a cleaner general solution for this, and not require
scripts to "connect" their unconnected UDP sockets. I seem to remember
that there was a good reason for not enforcing the lock on socket
creation, but only on connect, as we do.

http://seclists.org/nmap-dev/2012/q4/435
2012-12-31 19:06:33 +00:00
patrik
16d50c48da Squashed commit of the following:
commit fb1fa9373592e81ee004b99cf813e07bf253fbe1
Author: Patrik Karlsson <patrik@cqure.net>
Date:   Sun Dec 16 11:49:36 2012 -0500

    Fix bug where brute library failed to report error on invalid iterators
2012-12-16 16:51:47 +00:00
david
ab802a6f21 Update some more headers. 2012-12-06 02:25:46 +00:00
david
ec53dc049a Update with new mailing list addresses. 2012-12-06 02:23:34 +00:00
patrik
38ad563a8f Fix missing export _ENV in gps library 2012-12-02 16:15:59 +00:00
david
4c9a3ef4de Add multicast group name output to broadcast-igmp-discovery.
Patch by Vasily Kulikov.
http://seclists.org/nmap-dev/2012/q4/350
2012-11-29 19:58:30 +00:00
david
b15d8825a3 Whitespace in http-fingerprints. 2012-11-21 00:47:30 +00:00
david
4c6253d544 New http-fingerprints.
Contributed by Jesper Kückelhahn.
Sitecore, Moodle, typo3, SquirrelMail, RoundCube.
http://seclists.org/nmap-dev/2012/q4/287
2012-11-21 00:47:29 +00:00
fyodor
abc16cc78f Spell out rdp acronym 2012-11-16 02:25:08 +00:00
fyodor
5272dd5a82 spell out OSPF acronym 2012-11-16 02:24:02 +00:00
fyodor
dccd153b72 Spell out jdwp acronym 2012-11-16 02:15:00 +00:00
fyodor
755e7cdfb3 add author name to Patrik's IPP library 2012-11-16 02:13:27 +00:00
david
4c298e6e67 Add support for ECDSA to ssh-hostkey.nse.
Patch by Adam Števko. http://seclists.org/nmap-dev/2012/q4/181
2012-10-31 17:57:26 +00:00
patrik
6c4a1ff1ab more code cleanup 2012-10-25 20:05:15 +00:00
patrik
165a8c0929 code cleanup, removed buffered DB2Socket class and replace with receive_buf 2012-10-25 19:41:53 +00:00
henri
16ea382e9b Added a maximum number of retries to mitigate a remote DoS in the RPC
packets parsing code. The number was chosen high to avoid decreasing
accuracy. It's just about having an upper limit.
2012-10-20 14:59:53 +00:00
robert
8430ba2792 Added support for SQL Server 2012 (tested against RTM and fully patched), and added version numbers for latest service packs on older versions of SQL Server (as they've not been updated for far too long). 2012-10-18 06:45:47 +00:00
patrik
855a82fbc3 refactoring and code cleanup 2012-10-14 19:15:39 +00:00
patrik
89dab3fe14 code re-factoring and cleanup 2012-10-10 22:19:49 +00:00
patrik
121cc35de6 nse_check_globals cleanup 2012-10-07 12:54:31 +00:00
patrik
40b1c4705b check_globals cleanup 2012-10-07 12:39:21 +00:00
patrik
81b6bae5eb Squashed commit of the following:
commit e5cb0a18d5474730310f1797016e1106c33ca059
Author: Patrik Karlsson <patrik@cqure.net>
Date:   Sun Oct 7 10:47:35 2012 +0200

    compatibility fixes to spnego authentication in smb and smbauth libraries

    the spnego authentication blob now decodes properly in wireshark
    fixes in spnego authentication for both Window 2003 and Windows 7
2012-10-07 08:54:34 +00:00
henri
1f31f2e991 Typos 2012-10-06 21:24:50 +00:00
henri
ff60e9f9e0 Typos 2012-10-06 21:19:22 +00:00
patrik
6cfa5aea0f o [NSE] Added oracle-brute-stealth which exploits CVE-2012-3137, a weakness
in the Oracle O5LOGIN authentication scheme. [Dhiru Kholia]
2012-10-06 19:59:45 +00:00
patrik
655f766445 reverted bad commits 2012-10-06 19:38:15 +00:00
patrik
10a34f626a Squashed commit of the following:
commit 5de9e4fa623f88a9b48ef0704244ff843005573a
Author: Patrik Karlsson <patrik@cqure.net>
Date:   Sat Oct 6 21:19:08 2012 +0200

    Applied patch from Dhiru Kholia adding oracle-brute-stealth and needed changes

    reworked the patch slightly and added;
    - support for specifying account on command line
    - johnfile argument for writing hashes directly to file
2012-10-06 19:25:13 +00:00
patrik
2e5a448aa5 Revert "Squashed commit of the following:"
This reverts commit 71f5f22e79bdb44fffa14edd5d3ffa570efde8ed.
2012-10-06 19:25:04 +00:00
david
b19647254d Typo. 2012-09-23 21:15:20 +00:00
dmiller
520651a9ed Check for timeout when trying reserved ports
rpc.Comm.Connect was trying to bind to 424 reserved ports, which is
overkill. Since nsock doesn't do an actual bind(2) call until
socket:connect for TCP, that meant up to 424 connect calls, each of
which is currently leaking a socket. This commit contains 3 fixes:

1. Add nmap.new_socket calls for non-privileged code path that were
moved inside the privileged loop to originally address the leak.

2. Check for TIMEOUT on each of the TCP connect calls and abandon the
Connect, avoiding many timeouts.

3. Try 10 random reserved ports (from 1 to 1024) instead of 400+.
Should be good odds of finding one unused, even when lots of threads are
trying (though empirical results would be helpful). Also, this should
reduce load since thread n won't need to fail n-1 bind attempts.
2012-09-21 02:39:48 +00:00
david
23625913a8 Create (and close) a new socket in rpc Connect, don't reuse one.
It appears that connecting more than one with the same nse_nsock socket
leaks socket descriptor. For example,

local s = nmap.new_socket()
s:connect(host, port) --> TIMEOUT
s:connect(host, port) --> TIMEOUT
s:close()

leaks a socket descriptor, the one used in the first connect. Nsock
should really take care of this, but let's do this workaround because
rpc-grind has been causing problems due to using the above pattern:

http://seclists.org/nmap-dev/2012/q3/864
http://seclists.org/nmap-dev/2012/q3/872
http://seclists.org/nmap-dev/2012/q3/949

The difficulty is that the rpc library will tolerate around 400 of those
timeouts per RPC connection, which leads to rapidly running out of
descriptors.
2012-09-21 01:08:14 +00:00
david
cc126ea7d4 Fix removal (assignment to nil) of elements in stdnse.output_table.
There was a reverse table that was meant to map keys to their position
in the order table, to make it easy to table.remove an entry from order.
But removing something from order would shift the indices of all
following elements by 1, and those elements were not updated
correspondingly in the reverse table. Instead, do a linear lookup for
the the element to remove from order, after checking that the element
exists at all.

http://seclists.org/nmap-dev/2012/q3/905
2012-09-20 06:47:42 +00:00
david
8f39b485a0 Add cassandra scripts from Vlatko Kosturjak. 2012-09-20 06:30:48 +00:00
david
a4a046ac4c Let dnet:ip_send take a destination address.
Previously we always took the destination address from the packet
buffer, which failed for IPv6 link-local addresses because the packet
buffer does not contain the scope id.
2012-09-15 17:56:19 +00:00
david
44c5c227d3 Revert "Document dnet:ip_send to take a destination address."
This reverts r29795. It's not finished yet.
2012-09-15 15:06:15 +00:00
david
78cf2dfb06 Document dnet:ip_send to take a destination address. 2012-09-15 15:05:11 +00:00
david
6d0e34ad7b nmap.ip_send is for both IPv4 and IPv6. 2012-09-15 07:27:27 +00:00
kroosec
ca43a6d59f Added http fingerprints by Jesper Kückelhahn for Sitecore CMS. 2012-09-12 21:57:49 +00:00
david
d9b73da3a1 Give sample return values for smb.get_os. 2012-09-08 17:05:33 +00:00
david
e9b2a8aa5d Add stdnse.format_timestamp function.
This function follows RFC 3339 and is going to be the standard formatter
for dates and times in structured output.
2012-09-08 16:09:04 +00:00
david
ac87c9b251 Add stdnse.date_to_timestamp function.
This takes a broken-down date table, as produced by os.date("*t"), and
converts it into an integer number of seconds since the epoch UTC,
interpreting it as a time in a given time zone. Simply passing a date
table to os.time is not good enough, because os.time always assumes the
date table represents a local time; i.e., you will get different results
from running os.time({year=2012,month=1,day=1,hour=12,min=0,sec=0})
depending on what time zone you run it in.
2012-09-08 16:08:58 +00:00
patrik
b8ce3d3274 Removed debug print statement 2012-09-02 22:45:16 +00:00
patrik
f9e457ec7c nse-check-globals cleanup 2012-08-31 15:22:29 +00:00
patrik
13411ab6d1 Fixed a bunch of errors related to inproper responses from webservers. 2012-08-31 15:17:14 +00:00
aca
c13d7c719a Added msrpc-enum script and msrpc lua changes 2012-08-31 10:00:54 +00:00