mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
370 lines
19 KiB
C++
370 lines
19 KiB
C++
|
|
/***************************************************************************
|
|
* Target.h -- The Target class encapsulates much of the information Nmap *
|
|
* has about a host. Results (such as ping, OS scan, etc) are stored in *
|
|
* this class as they are determined. *
|
|
* *
|
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
|
* *
|
|
* The Nmap Security Scanner is (C) 1996-2016 Insecure.Com LLC. Nmap is *
|
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
|
* software; you may redistribute and/or modify it under the terms of the *
|
|
* GNU General Public License as published by the Free Software *
|
|
* Foundation; Version 2 ("GPL"), BUT ONLY WITH ALL OF THE CLARIFICATIONS *
|
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
|
* modify, and redistribute this software under certain conditions. If *
|
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
|
* vendors already license Nmap technology such as host discovery, port *
|
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
|
* Engine. *
|
|
* *
|
|
* Note that the GPL places important restrictions on "derivative works", *
|
|
* yet it does not provide a detailed definition of that term. To avoid *
|
|
* misunderstandings, we interpret that term as broadly as copyright law *
|
|
* allows. For example, we consider an application to constitute a *
|
|
* derivative work for the purpose of this license if it does any of the *
|
|
* following with any software or content covered by this license *
|
|
* ("Covered Software"): *
|
|
* *
|
|
* o Integrates source code from Covered Software. *
|
|
* *
|
|
* o Reads or includes copyrighted data files, such as Nmap's nmap-os-db *
|
|
* or nmap-service-probes. *
|
|
* *
|
|
* o Is designed specifically to execute Covered Software and parse the *
|
|
* results (as opposed to typical shell or execution-menu apps, which will *
|
|
* execute anything you tell them to). *
|
|
* *
|
|
* o Includes Covered Software in a proprietary executable installer. The *
|
|
* installers produced by InstallShield are an example of this. Including *
|
|
* Nmap with other software in compressed or archival form does not *
|
|
* trigger this provision, provided appropriate open source decompression *
|
|
* or de-archiving software is widely available for no charge. For the *
|
|
* purposes of this license, an installer is considered to include Covered *
|
|
* Software even if it actually retrieves a copy of Covered Software from *
|
|
* another source during runtime (such as by downloading it from the *
|
|
* Internet). *
|
|
* *
|
|
* o Links (statically or dynamically) to a library which does any of the *
|
|
* above. *
|
|
* *
|
|
* o Executes a helper program, module, or script to do any of the above. *
|
|
* *
|
|
* This list is not exclusive, but is meant to clarify our interpretation *
|
|
* of derived works with some common examples. Other people may interpret *
|
|
* the plain GPL differently, so we consider this a special exception to *
|
|
* the GPL that we apply to Covered Software. Works which meet any of *
|
|
* these conditions must conform to all of the terms of this license, *
|
|
* particularly including the GPL Section 3 requirements of providing *
|
|
* source code and allowing free redistribution of the work as a whole. *
|
|
* *
|
|
* As another special exception to the GPL terms, Insecure.Com LLC grants *
|
|
* permission to link the code of this program with any version of the *
|
|
* OpenSSL library which is distributed under a license identical to that *
|
|
* listed in the included docs/licenses/OpenSSL.txt file, and distribute *
|
|
* linked combinations including the two. *
|
|
* *
|
|
* Any redistribution of Covered Software, including any derived works, *
|
|
* must obey and carry forward all of the terms of this license, including *
|
|
* obeying all GPL rules and restrictions. For example, source code of *
|
|
* the whole work must be provided and free redistribution must be *
|
|
* allowed. All GPL references to "this License", are to be treated as *
|
|
* including the terms and conditions of this license text as well. *
|
|
* *
|
|
* Because this license imposes special exceptions to the GPL, Covered *
|
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
|
* software. The terms, conditions, and exceptions of this license must *
|
|
* be included as well. This license is incompatible with some other open *
|
|
* source licenses as well. In some cases we can relicense portions of *
|
|
* Nmap or grant special permissions to use it in other open source *
|
|
* software. Please contact fyodor@nmap.org with any such requests. *
|
|
* Similarly, we don't incorporate incompatible open source software into *
|
|
* Covered Software without special permission from the copyright holders. *
|
|
* *
|
|
* If you have any questions about the licensing restrictions on using *
|
|
* Nmap in other works, are happy to help. As mentioned above, we also *
|
|
* offer alternative license to integrate Nmap into proprietary *
|
|
* applications and appliances. These contracts have been sold to dozens *
|
|
* of software vendors, and generally include a perpetual license as well *
|
|
* as providing for priority support and updates. They also fund the *
|
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
|
* information. *
|
|
* *
|
|
* If you have received a written license agreement or contract for *
|
|
* Covered Software stating terms other than these, you may choose to use *
|
|
* and redistribute Covered Software under those terms instead of these. *
|
|
* *
|
|
* Source is provided to this software because we believe users have a *
|
|
* right to know exactly what a program is going to do before they run it. *
|
|
* This also allows you to audit the software for security holes. *
|
|
* *
|
|
* Source code also allows you to port Nmap to new platforms, fix bugs, *
|
|
* and add new features. You are highly encouraged to send your changes *
|
|
* to the dev@nmap.org mailing list for possible incorporation into the *
|
|
* main distribution. By sending these changes to Fyodor or one of the *
|
|
* Insecure.Org development mailing lists, or checking them into the Nmap *
|
|
* source code repository, it is understood (unless you specify otherwise) *
|
|
* that you are offering the Nmap Project (Insecure.Com LLC) the *
|
|
* unlimited, non-exclusive right to reuse, modify, and relicense the *
|
|
* code. Nmap will always be available Open Source, but this is important *
|
|
* because the inability to relicense code has caused devastating problems *
|
|
* for other Free Software projects (such as KDE and NASM). We also *
|
|
* occasionally relicense the code to third parties as discussed above. *
|
|
* If you wish to specify special license conditions of your *
|
|
* contributions, just say so when you send them. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, but *
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
|
|
* license file for more details (it's in a COPYING file included with *
|
|
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING) *
|
|
* *
|
|
***************************************************************************/
|
|
|
|
/* $Id$ */
|
|
|
|
#ifndef TARGET_H
|
|
#define TARGET_H
|
|
|
|
#include "nbase.h"
|
|
|
|
#include "libnetutil/netutil.h"
|
|
|
|
#ifndef NOLUA
|
|
#include "nse_main.h"
|
|
#endif
|
|
|
|
#include "portreasons.h"
|
|
#include "portlist.h"
|
|
#include "scan_engine.h"
|
|
#include "osscan.h"
|
|
#include "osscan2.h"
|
|
class FingerPrintResults;
|
|
|
|
#include <list>
|
|
#include <string>
|
|
|
|
#ifndef INET6_ADDRSTRLEN
|
|
#define INET6_ADDRSTRLEN 46
|
|
#endif
|
|
|
|
enum osscan_flags {
|
|
OS_NOTPERF=0, OS_PERF, OS_PERF_UNREL
|
|
};
|
|
|
|
struct host_timeout_nfo {
|
|
unsigned long msecs_used; /* How many msecs has this Target used? */
|
|
bool toclock_running; /* Is the clock running right now? */
|
|
struct timeval toclock_start; /* When did the clock start? */
|
|
time_t host_start, host_end; /* The absolute start and end for this host */
|
|
};
|
|
|
|
struct TracerouteHop {
|
|
struct sockaddr_storage tag;
|
|
bool timedout;
|
|
std::string name;
|
|
struct sockaddr_storage addr;
|
|
int ttl;
|
|
float rtt; /* In milliseconds. */
|
|
|
|
int display_name(char *buf, size_t len) {
|
|
if (name.empty())
|
|
return Snprintf(buf, len, "%s", inet_ntop_ez(&addr, sizeof(addr)));
|
|
else
|
|
return Snprintf(buf, len, "%s (%s)", name.c_str(), inet_ntop_ez(&addr, sizeof(addr)));
|
|
}
|
|
};
|
|
|
|
class Target {
|
|
public: /* For now ... TODO: a lot of the data members should be made private */
|
|
Target();
|
|
~Target();
|
|
/* Recycles the object by freeing internal objects and reinitializing
|
|
to default state */
|
|
void Recycle();
|
|
/* Returns the address family of the destination address. */
|
|
int af() const;
|
|
/* Fills a sockaddr_storage with the AF_INET or AF_INET6 address
|
|
information of the target. This is a preferred way to get the
|
|
address since it is portable for IPv6 hosts. Returns 0 for
|
|
success. ss_len must be provided. It is not examined, but is set
|
|
to the size of the sockaddr copied in. */
|
|
int TargetSockAddr(struct sockaddr_storage *ss, size_t *ss_len) const;
|
|
const struct sockaddr_storage *TargetSockAddr() const;
|
|
/* Note that it is OK to pass in a sockaddr_in or sockaddr_in6 casted
|
|
to sockaddr_storage */
|
|
void setTargetSockAddr(const struct sockaddr_storage *ss, size_t ss_len);
|
|
// Returns IPv4 target host address or {0} if unavailable.
|
|
struct in_addr v4host() const;
|
|
const struct in_addr *v4hostip() const;
|
|
const struct in6_addr *v6hostip() const;
|
|
/* The source address used to reach the target */
|
|
int SourceSockAddr(struct sockaddr_storage *ss, size_t *ss_len) const;
|
|
const struct sockaddr_storage *SourceSockAddr() const;
|
|
/* Note that it is OK to pass in a sockaddr_in or sockaddr_in6 casted
|
|
to sockaddr_storage */
|
|
void setSourceSockAddr(const struct sockaddr_storage *ss, size_t ss_len);
|
|
struct in_addr v4source() const;
|
|
const struct in_addr *v4sourceip() const;
|
|
const struct in6_addr *v6sourceip() const;
|
|
/* The IPv4 or IPv6 literal string for the target host */
|
|
const char *targetipstr() const { return targetipstring; }
|
|
/* The IPv4 or IPv6 literal string for the source address */
|
|
const char *sourceipstr() const { return sourceipstring; }
|
|
/* Give the name from the last setHostName() call, which should be
|
|
the name obtained from reverse-resolution (PTR query) of the IP (v4
|
|
or v6). If the name has not been set, or was set to NULL, an empty
|
|
string ("") is returned to make printing easier. */
|
|
const char *HostName() const { return hostname? hostname : ""; }
|
|
/* You can set to NULL to erase a name or if it failed to resolve -- or
|
|
just don't call this if it fails to resolve. The hostname is blown
|
|
away when you setTargetSockAddr(), so make sure you do these in proper
|
|
order
|
|
*/
|
|
void setHostName(const char *name);
|
|
/* Generates a printable string consisting of the host's IP
|
|
address and hostname (if available). Eg "www.insecure.org
|
|
(64.71.184.53)" or "fe80::202:e3ff:fe14:1102". The name is
|
|
written into the buffer provided, which is also returned. Results
|
|
that do not fit in buflen will be truncated. */
|
|
const char *NameIP(char *buf, size_t buflen) const;
|
|
/* This next version returns a STATIC buffer -- so no concurrency */
|
|
const char *NameIP() const;
|
|
|
|
/* Give the name from the last setTargetName() call, which is the
|
|
name of the target given on the command line if it's a named
|
|
host. */
|
|
const char *TargetName() { return targetname; }
|
|
/* You can set to NULL to erase a name. The targetname is blown
|
|
away when you setTargetSockAddr(), so make sure you do these in proper
|
|
order
|
|
*/
|
|
void setTargetName(const char *name);
|
|
|
|
/* If the host is directly connected on a network, set and retrieve
|
|
that information here. directlyConnected() will abort if it hasn't
|
|
been set yet. */
|
|
void setDirectlyConnected(bool connected);
|
|
bool directlyConnected() const;
|
|
int directlyConnectedOrUnset() const; /* 1-directly connected, 0-no, -1-we don't know*/
|
|
|
|
/* If the host is NOT directly connected, you can set the next hop
|
|
value here. It is OK to pass in a sockaddr_in or sockaddr_in6
|
|
casted to sockaddr_storage*/
|
|
void setNextHop(struct sockaddr_storage *next_hop, size_t next_hop_len);
|
|
/* Returns the next hop for sending packets to this host. Returns true if
|
|
next_hop was filled in. It might be false, for example, if
|
|
next_hop has never been set */
|
|
bool nextHop(struct sockaddr_storage *next_hop, size_t *next_hop_len);
|
|
|
|
void setMTU(int devmtu);
|
|
int MTU(void);
|
|
|
|
/* Sets the interface type to one of:
|
|
devt_ethernet, devt_loopback, devt_p2p, devt_other
|
|
*/
|
|
void setIfType(devtype iftype) { interface_type = iftype; }
|
|
/* Returns -1 if it has not yet been set with setIfType() */
|
|
devtype ifType() { return interface_type; }
|
|
/* Starts the timeout clock for the host running (e.g. you are
|
|
beginning a scan). If you do not have the current time handy,
|
|
you can pass in NULL. When done, call stopTimeOutClock (it will
|
|
also automatically be stopped of timedOut() returns true) */
|
|
void startTimeOutClock(const struct timeval *now);
|
|
/* The complement to startTimeOutClock. */
|
|
void stopTimeOutClock(const struct timeval *now);
|
|
/* Is the timeout clock currently running? */
|
|
bool timeOutClockRunning() { return htn.toclock_running; }
|
|
/* Returns whether the host is timedout. If the timeoutclock is
|
|
running, counts elapsed time for that. Pass NULL if you don't have the
|
|
current time handy. You might as well also pass NULL if the
|
|
clock is not running, as the func won't need the time. */
|
|
bool timedOut(const struct timeval *now);
|
|
/* Return time_t for the start and end time of this host */
|
|
time_t StartTime() { return htn.host_start; }
|
|
time_t EndTime() { return htn.host_end; }
|
|
|
|
/* Takes a 6-byte MAC address */
|
|
int setMACAddress(const u8 *addy);
|
|
int setSrcMACAddress(const u8 *addy);
|
|
int setNextHopMACAddress(const u8 *addy); // this should be the target's own MAC if directlyConnected()
|
|
|
|
/* Returns a pointer to 6-byte MAC address, or NULL if none is set */
|
|
const u8 *MACAddress() const;
|
|
const u8 *SrcMACAddress() const;
|
|
const u8 *NextHopMACAddress() const;
|
|
|
|
/* Set the device names so that they can be returned by deviceName()
|
|
and deviceFullName(). The normal name may not include alias
|
|
qualifier, while the full name may include it (e.g. "eth1:1"). If
|
|
these are non-null, they will overwrite the stored version */
|
|
void setDeviceNames(const char *name, const char *fullname);
|
|
const char *deviceName() const;
|
|
const char *deviceFullName() const;
|
|
|
|
int osscanPerformed(void);
|
|
void osscanSetFlag(int flag);
|
|
|
|
struct seq_info seq;
|
|
int distance;
|
|
enum dist_calc_method distance_calculation_method;
|
|
FingerPrintResults *FPR; /* FP results get by the OS scan system. */
|
|
PortList ports;
|
|
|
|
int weird_responses; /* echo responses from other addresses, Ie a network broadcast address */
|
|
unsigned int flags; /* HOST_UNKNOWN, HOST_UP, or HOST_DOWN. */
|
|
struct timeout_info to;
|
|
char *hostname; // Null if unable to resolve or unset
|
|
char * targetname; // The name of the target host given on the command line if it is a named host
|
|
|
|
struct probespec traceroute_probespec;
|
|
std::list <TracerouteHop> traceroute_hops;
|
|
|
|
/* If the address for this target came from a DNS lookup, the list of
|
|
resultant addresses (sometimes there are more than one). The address
|
|
actually used is always the first element in this list. */
|
|
std::list<struct sockaddr_storage> resolved_addrs;
|
|
|
|
#ifndef NOLUA
|
|
ScriptResults scriptResults;
|
|
#endif
|
|
|
|
state_reason_t reason;
|
|
|
|
/* A probe that is known to receive a response. This is used to hold the
|
|
current timing ping probe type during scanning. */
|
|
probespec pingprobe;
|
|
/* The state the port or protocol entered when the response to pingprobe was
|
|
received. */
|
|
int pingprobe_state;
|
|
|
|
private:
|
|
void Initialize();
|
|
void FreeInternal(); // Free memory allocated inside this object
|
|
// Creates a "presentation" formatted string out of the target's IPv4/IPv6 address
|
|
void GenerateTargetIPString();
|
|
// Creates a "presentation" formatted string out of the source IPv4/IPv6 address.
|
|
void GenerateSourceIPString();
|
|
struct sockaddr_storage targetsock, sourcesock, nexthopsock;
|
|
size_t targetsocklen, sourcesocklen, nexthopsocklen;
|
|
int directly_connected; // -1 = unset; 0 = no; 1 = yes
|
|
char targetipstring[INET6_ADDRSTRLEN];
|
|
char sourceipstring[INET6_ADDRSTRLEN];
|
|
mutable char *nameIPBuf; /* for the NameIP(void) function to return */
|
|
u8 MACaddress[6], SrcMACaddress[6], NextHopMACaddress[6];
|
|
bool MACaddress_set, SrcMACaddress_set, NextHopMACaddress_set;
|
|
struct host_timeout_nfo htn;
|
|
devtype interface_type;
|
|
char devname[32];
|
|
char devfullname[32];
|
|
int mtu;
|
|
/* 0 (OS_NOTPERF) if os detection not performed
|
|
* 1 (OS_PERF) if os detection performed
|
|
* 2 (OS_PERF_UNREL) if an unreliable os detection has been performed */
|
|
int osscan_flag;
|
|
};
|
|
|
|
#endif /* TARGET_H */
|
|
|