1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 14:11:29 +00:00
Commit Graph

26 Commits

Author SHA1 Message Date
dmiller
74a88c0804 Let ssl-cert grab certs from DTLS services. Fix rules for TCP-only scripts 2024-06-03 19:00:33 +00:00
dmiller
7c61f7c9c3 TLS 1.3 support for NSE. Fixes #1691 2021-07-02 20:01:30 +00:00
dmiller
cd3253f5a2 New script, https-redirect 2018-06-28 03:43:27 +00:00
dmiller
eff6c09118 Change ssl scripts to use string unpacking instead of bin.lua 2017-03-10 17:29:53 +00:00
dmiller
a2ed5c4a30 Lua strings are 1-indexed. This is not a bug for now, but is incorrect. 2016-06-18 15:49:18 +00:00
dmiller
20d6d17c2c Support (unlikely) TLS NPN checking for STARTTLS-type services 2016-04-11 20:42:03 +00:00
dmiller
f4619edece Update http urls for nmap.org to https 2015-11-05 20:41:05 +00:00
dmiller
9fbad88213 Avoid blank output in tls-nextprotoneg when server doesn't offer any protocols 2015-08-06 21:10:35 +00:00
dmiller
339f0ffd7d Fix NSEdoc: wrap lines, fix bulleted lists 2015-07-11 04:01:05 +00:00
dmiller
55c3348fae Use tls.client_hello defaults for some scripts 2015-03-06 20:00:00 +00:00
dmiller
4d106cbe23 Remove unneeded requires 2015-02-28 12:43:59 +00:00
batrick
810f7d4803 more stdnse.print_debug -> stdnse.debug
This is a catchall pattern with a few exclusions.

$ sed -i 's/stdnse.print_debug( *\([0-9]*\) *, *\(.*\))/stdnse.debug\1(\2)/' *.nse
$ sed -i 's/stdnse.print_debug(\(.*\))/stdnse.debug1(\1)/' *.nse

Excluded:
$ svn revert db2-das-info.nse
$ svn revert flume-master-info.nse
$ svn revert http-headers.nse
$ svn revert http-methods.nse
$ svn revert http-unsafe-output-escaping.nse
$ svn revert http-userdir-enum.nse
$ svn revert http-vuln-cve2011-3192.nse
$ svn revert http-vuln-wnr1000-creds.nse
$ svn revert http-wordpress-plugins.nse
$ svn revert telnet-brute.nse
2014-08-02 02:46:16 +00:00
batrick
c94d5970ff stdnse.print_debug -> stdnse.debug1
sed -i 's/stdnse.print_debug("%s: \([^"]*\)", SCRIPT_NAME/stdnse.debug1("\1"/' *.nse
2014-08-01 21:31:04 +00:00
dmiller
51a633ac3c NSE: Add TLS_RSA_WITH_3DES_EDE_CBC_SHA to default ciphers
As noted (http://seclists.org/nmap-dev/2014/q3/121), some versions of
Windows require a KB before supporting AES, so add a 3DES option.
2014-07-23 01:52:41 +00:00
dmiller
453f655f89 Add mandatory cipher suite to appropriate scripts
The TLS standard (TLS 1.2, but also probably the others) states:

> In the absence of an application profile standard specifying
> otherwise, a TLS-compliant application MUST implement the cipher
> suite TLS_RSA_WITH_AES_128_CBC_SHA

This was causing some problems with some implementations (See
http://seclists.org/nmap-dev/2014/q3/119)
2014-07-22 22:20:34 +00:00
dmiller
ac5a89a8e1 Remove unused NSE library requires
for lib in nselib/*.lua*; do l=${lib#*/}; l=${l%.lua*}; find . -name \
  \*.lua -o -name \*.nse | xargs grep -l "require .$l\>" | xargs grep \
  -c "\<$l\." | grep ':0$' | awk -F: '{print "'$l'", $1}'; done

Did not remove calls to stdnse.silent_require since these can be used to
abort script execution if OpenSSL is not included, even if the script
does not directly call openssl.* (perhaps it uses comm.tryssl instead,
for instance).

Also did not remove require "strict", since that library is special and
modifies the environment.
2014-02-13 16:39:17 +00:00
dmiller
298be5bfaa Re-indent some scripts. Whitespace-only commit
https://secwiki.org/w/Nmap/Code_Standards
2014-01-31 17:36:09 +00:00
dmiller
4eaa21e7cb Integrate David's ssl-enum-ciphers improvements
From this thread: http://seclists.org/nmap-dev/2014/q1/105

* Extensions now better supported in tls.lua
* ssl-enum-ciphers sends all EC options to ensure servers reply with
  supported EC suites
* tls.lua supports multiple messages of a single type within 1 record
* tls.record_buffer will read an entire TLS record into a buffer
* ssl-date and tls-nextprotoneg updated to use tls.record_buffer
2014-01-30 18:12:14 +00:00
dmiller
620f9fdb34 Remove trailing whitespace in lua files
Whitespace is not significant, so this should not be a problem.
https://secwiki.org/w/Nmap/Code_Standards
2014-01-23 21:51:58 +00:00
dmiller
645ef2a0bd Update ssl-date to use tls lib 2014-01-16 18:10:04 +00:00
dmiller
760da1788f Let tls-nextprotoneg use tls.lua library
Required fixes to tls lib's extensions (did not previously support
extension data)
2014-01-16 18:10:02 +00:00
dmiller
1b07c5ce54 Add xmloutput to tls-nextprotoneg.nse 2013-10-18 18:34:54 +00:00
patrik
217b27bace nse_check_globals cleanup 2012-07-24 10:08:43 +00:00
kroosec
e1793d5961 tls-nextprotoneg: Replaced hard fixed protocols search for a dynamic extraction one. 2012-07-13 10:29:35 +00:00
kroosec
bc2b9a99b5 Added http1.1 to the list of known protocols. (Checked by Chromium) 2012-07-08 19:00:34 +00:00
kroosec
b7cc883a0f Added tls-nextprotoneg, a script that enumerates a TLS server's supported protocols by using the next protocol negotiation extension. 2012-07-07 14:38:56 +00:00