mirror of
https://github.com/nmap/nmap.git
synced 2026-02-04 12:36:34 +00:00
45b783c57395b2a37adfb345b46986e393e28d25
can only happen in the case of a directly connected target with no ping or port scan responses, like nmap -PN -sP --send-ip --traceroute <target>
Applied a configure.in patch from Petr Salinger in Debian bug #542388 which apparently fixes the libdnet build on GNU/kFreeBSD
Added a script called http-malware-host.nse. Its future intention is to discover hosts that are serving malware (for example, that are compromised and have malicious code inserted). At the moment, it checks for one specific attack discussed here: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
Added a script called http-malware-host.nse. Its future intention is to discover hosts that are serving malware (for example, that are compromised and have malicious code inserted). At the moment, it checks for one specific attack discussed here: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
Modified UDP-payload-related code to make it independent of the NmapOps class so it can be reused by other apps like Nping. More info at http://seclists.org/nmap-dev/2009/q3/0051.html
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.5%
Lua
28.1%
C++
16.8%
Shell
5.8%
Python
4.2%
Other
7.3%