1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-08 21:51:28 +00:00
Commit Graph

68 Commits

Author SHA1 Message Date
david
95d0ced45a Typo. 2012-03-16 20:02:55 +00:00
david
f0dcb3c2ce Smooth out random starting timing offsets in OS scan.
Previously it was taking a random u8 mod 100, which meant that the
numbers 0-55 were 50% more likely to come up than any others. Make it a
u16 instead, so that the numbers 0-35 are only about 0.15% more likely.
2012-03-16 20:02:53 +00:00
david
1f43eed01b Remove an unnecessary else. 2012-03-08 20:11:10 +00:00
david
adef20d1e3 Use getFlags16 for TCP flags in vectorize.
We use as features even the four reserved TCP flags (some of them are no
longer reserved but declared for a particular purpose by some RFCs).
getFlags only returns 8 bits, leading to garbage in the feature vector
in the higher-order positions.

This doesn't affect the integrity of fingerprint submissions, because
they copy the packet contents directly and don't go through the getFlags
accessor.
2012-03-08 20:11:08 +00:00
fyodor
684f42c4ad One more adjustment to the license text. Notes that Zenmap, Ncat, and Nping use this license. Note that contributions made directly in the src repository are treated the same as those in the mailing list. 2012-03-01 06:53:35 +00:00
fyodor
e96a7b7b24 Update the headers for each code file. This updates code copyright dates to 2012, notes the awesome NSE in the list of technology, and slightly rewords the derivative works clarification 2012-03-01 06:32:23 +00:00
david
792d06108c Block comment on novelty detection. 2012-01-18 00:38:51 +00:00
david
d47ae571c0 Move FP_NOVELTY_THRESHOLD to FPEngine.h. 2012-01-17 20:33:21 +00:00
david
4b3bfeb7d9 Decrease the default feature variance when unknown. 2012-01-17 20:33:20 +00:00
david
6ca2b871b6 Calculate novelty based on distance from observed prints. 2012-01-17 20:33:19 +00:00
david
014accb239 Add placeholder novelty detector. 2012-01-17 20:31:10 +00:00
david
f235c4c071 FPmodel -> FPModel for uniformity. 2011-11-12 10:06:21 +00:00
david
7d638997db Regen FPmodel. 2011-11-12 06:00:56 +00:00
david
52da18b72d Include the target address in the NI IPv6 OS probe.
This was missing; likely this probe was never getting any responses. The
same probe in ipv6fp.py worked.
2011-10-25 09:41:19 +00:00
david
2daab6ceb2 Also show the match index in debugging OS output. 2011-09-30 05:58:48 +00:00
david
379db8e206 Print raw OS matching numbers with -d3. 2011-09-30 05:58:48 +00:00
david
6b2c828da9 Enable IPv6 OS results by default. 2011-09-30 05:58:45 +00:00
david
9bf2ec3884 Merge from /nmap-exp/luis/nmap-os6.
svn merge --ignore-ancestry svn://svn.insecure.org/nmap@26621 svn://svn.insecure.org/nmap-exp/luis/nmap-os6

This is the IPv6 OS detection branch. "nmap -6 -O" works now, though at
this point it only prints fingerprints and not OS guesses, because we
need to collect more submissions.
2011-09-19 18:31:46 +00:00