1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Files
nmap/nping/NpingTargets.cc
2025-04-16 00:00:05 +00:00

385 lines
14 KiB
C++

/***************************************************************************
* NpingTargets.cc -- Class that handles target spec parsing and allows to *
* obtain the different targets that need to be ping-ed. *
* *
***********************IMPORTANT NMAP LICENSE TERMS************************
*
* The Nmap Security Scanner is (C) 1996-2025 Nmap Software LLC ("The Nmap
* Project"). Nmap is also a registered trademark of the Nmap Project.
*
* This program is distributed under the terms of the Nmap Public Source
* License (NPSL). The exact license text applying to a particular Nmap
* release or source code control revision is contained in the LICENSE
* file distributed with that version of Nmap or source code control
* revision. More Nmap copyright/legal information is available from
* https://nmap.org/book/man-legal.html, and further information on the
* NPSL license itself can be found at https://nmap.org/npsl/ . This
* header summarizes some key points from the Nmap license, but is no
* substitute for the actual license text.
*
* Nmap is generally free for end users to download and use themselves,
* including commercial use. It is available from https://nmap.org.
*
* The Nmap license generally prohibits companies from using and
* redistributing Nmap in commercial products, but we sell a special Nmap
* OEM Edition with a more permissive license and special features for
* this purpose. See https://nmap.org/oem/
*
* If you have received a written Nmap license agreement or contract
* stating terms other than these (such as an Nmap OEM license), you may
* choose to use and redistribute Nmap under those terms instead.
*
* The official Nmap Windows builds include the Npcap software
* (https://npcap.com) for packet capture and transmission. It is under
* separate license terms which forbid redistribution without special
* permission. So the official Nmap Windows builds may not be redistributed
* without special permission (such as an Nmap OEM license).
*
* Source is provided to this software because we believe users have a
* right to know exactly what a program is going to do before they run it.
* This also allows you to audit the software for security holes.
*
* Source code also allows you to port Nmap to new platforms, fix bugs, and
* add new features. You are highly encouraged to submit your changes as a
* Github PR or by email to the dev@nmap.org mailing list for possible
* incorporation into the main distribution. Unless you specify otherwise, it
* is understood that you are offering us very broad rights to use your
* submissions as described in the Nmap Public Source License Contributor
* Agreement. This is important because we fund the project by selling licenses
* with various terms, and also because the inability to relicense code has
* caused devastating problems for other Free Software projects (such as KDE
* and NASM).
*
* The free version of Nmap is distributed in the hope that it will be
* useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Warranties,
* indemnification and commercial support are all available through the
* Npcap OEM program--see https://nmap.org/oem/
*
***************************************************************************/
#include "nping.h"
#include "NpingOps.h"
#include "global_structures.h"
#include "output.h"
#include "nbase.h"
#include "utils.h"
#include "NpingTargets.h"
#include "common.h"
#include "common_modified.h"
extern NpingOps o;
NpingTargets::NpingTargets(){
memset(specs, 0, 1024*(sizeof(char *)) );
memset(skipspec, 0, 1024*(sizeof(bool)) );
speccount=0;
current_spec=-1;
finished=false;
targets_fetched=0;
current_target=0;
ready=false;
} /* End of NpingTargets constructor */
NpingTargets::~NpingTargets(){
} /* End of NpingTargets destructor */
/** Adds a target specification to an internal array of specs */
int NpingTargets::addSpec(char *spec){
if(spec==NULL)
return OP_FAILURE;
if( this->speccount >= 1024 )
return OP_FAILURE;
specs[ this->speccount ] = spec;
this->speccount++;
return OP_SUCCESS;
} /* End of NpingTargets */
/** Returns next target */
int NpingTargets::getNextTargetAddressAndName(struct sockaddr_storage *t, size_t *tlen, char *hname, size_t hlen){
struct sockaddr_storage next;
memset(&next, 0, sizeof(struct sockaddr_storage));
size_t nextlen=0;
int r=0;
int family= (o.getIPVersion()==IP_VERSION_6) ? AF_INET6 : AF_INET;
if( t==NULL || tlen==NULL )
nping_fatal(QT_3,"getNextTarget(): NULL values supplied.");
/* Return failure if there are no specs or we noticed that we were finished in
* a previous call. */
if ( this->speccount <= 0 || finished==true )
return OP_FAILURE;
/* If this is the first time we call to this method */
if (this->current_spec == -1 ){
current_spec=0;
if ( !skipspec[ current_spec ] ){
if ( current_group.parse_expr( specs[ current_spec ], family ) != 0 ){
skipspec[ current_spec ]=true; /* Make sure we skip it next time */
return OP_FAILURE;
}
}
else{ /* We are skipping current target, return the next one */
return this->getNextTargetAddressAndName(t, tlen, hname, hlen);
}
}
r=current_group.get_next_host(&next, &nextlen);
if ( r!=0 ){ /* We exhausted current group */
/* Is there any other group? */
if (++current_spec == speccount){ /* No more specs to parse */
finished=true;
return OP_FAILURE;
}
/* Ok, there are more groups, so let's go with the next spec */
if ( !skipspec[ current_spec ] ){
if ( current_group.parse_expr( specs[ current_spec ], family ) != 0 ){
skipspec[ current_spec ]=true;
return this->getNextTargetAddressAndName(t, tlen, hname, hlen);
}
}
else{ /* We are skipping current target, return the next one */
return this->getNextTargetAddressAndName(t, tlen, hname, hlen);
}
r=current_group.get_next_host(&next, &nextlen);
if (r != 0)
nping_fatal(QT_3,"BUG: TargetGroups are supposed to contain at least one IP! ");
}
memcpy( t, &next, sizeof( struct sockaddr_storage ) );
/* If current spec is a named host (not a range), store name in supplied buff */
if(current_group.get_namedhost()){
if( hname!=NULL && hlen>0 )
strncpy(hname, specs[ current_spec ], hlen);
}else{ /* If current spec is not a named host, insert NULL in the first position */
if( hname!=NULL && hlen>0 )
hname[0]='\0';
}
*tlen=nextlen;
targets_fetched++;
return OP_SUCCESS;
} /* End of getNextTarget() */
int NpingTargets::getNextIPv4Address(u32 *addr){
struct sockaddr_storage t;
size_t tlen;
char buff[257];
memset(buff, 0, 257);
if( addr == NULL )
nping_fatal(QT_3, "getNextIPv4Address(): NULL value supplied. ");
if ( this->getNextTargetAddressAndName(&t, &tlen, buff, 256) != OP_SUCCESS )
return OP_FAILURE;
struct sockaddr_in *p=( struct sockaddr_in *)&t;
if(p->sin_family!=AF_INET)
nping_fatal(QT_3, "getNextIPv4Address(): Trying to obtain an IPv4 address from an IPv6 target.");
*addr = p->sin_addr.s_addr;
return OP_SUCCESS;
} /* End of getNextIPv4Address() */
int NpingTargets::rewindSpecs(){
current_spec=-1;
finished=false;
targets_fetched=0;
return OP_SUCCESS;
} /* End of rewind() */
unsigned long int NpingTargets::getTargetsFetched(){
return this->Targets.size();
} /* getTargetsFetched() */
int NpingTargets::getTargetSpecCount(){
return this->speccount;
} /* End of getTargetSpecCount() */
/** This method should be called when all the target specs have been entered
* using addSpec(). What it does is to create a NpingTarget objects for
* each IP address extracted from the specs. Objects are stored in an internal
* vector. */
int NpingTargets::processSpecs(){
char buff[MAX_NPING_HOSTNAME_LEN+1];
struct sockaddr_storage ss;
size_t slen=0;
bool result=false;
struct route_nfo rnfo;
memset(&ss, 0, sizeof(struct sockaddr_storage));
memset(buff, 0, MAX_NPING_HOSTNAME_LEN+1);
/* Rewind spec index just in case someone has been playing around with it */
o.targets.rewindSpecs();
/* Get next host IP address and, if it is a named host, its hostname */
while ( this->getNextTargetAddressAndName(&ss, &slen, buff, MAX_NPING_HOSTNAME_LEN) == OP_SUCCESS ){
NpingTarget *mytarget = new NpingTarget();
mytarget->setTargetSockAddr(&ss, slen);
if( buff[0]=='\0')
mytarget->setNamedHost(false);
else{
mytarget->setSuppliedHostName(buff);
mytarget->setNamedHost(true);
}
/* For the moment, we only run this code if we are not dealing with IPv6 */
if( !o.ipv6() ){
/* Get all the information needed to send packets to this target.
* (Only in case we are not in unprivileged modes) */
if(o.getMode()!=TCP_CONNECT && o.getMode()!=UDP_UNPRIV){
result=route_dst( &ss, &rnfo, o.getDevice(), NULL );
if(result==false){
nping_warning(QT_2, "Failed to determine route to host %s. Skipping it...", mytarget->getTargetIPstr() );
delete mytarget;
continue;
}
#ifdef WIN32
if (!o.havePcap() && rnfo.ii.device_type == devt_loopback){
nping_warning(QT_2, "Skipping %s because Windows does not allow localhost scans (try --unprivileged).", mytarget->getTargetIPstr() );
delete mytarget;
continue;
}
#endif
/* Determine next hop */
if( rnfo.direct_connect ){
mytarget->setDirectlyConnected(true);
mytarget->setNextHop(&ss, slen);
}
else{
mytarget->setDirectlyConnected(false);
mytarget->setNextHop(&rnfo.nexthop, sizeof(struct sockaddr_storage));
}
/* Source IP address that we should use when targeting this host */
mytarget->setSourceSockAddr(&rnfo.srcaddr, sizeof(struct sockaddr_storage));
/* If user requested to spoof IP source address, set it */
if( o.spoofSource() ){
mytarget->setSpoofedSourceSockAddr( o.getSourceSockAddr(), sizeof(struct sockaddr_storage));
}
/* Network interface */
mytarget->setDeviceNames( rnfo.ii.devname, rnfo.ii.devfullname );
mytarget->setDeviceType( rnfo.ii.device_type );
/* Set source MAC address */
mytarget->setSrcMACAddress( rnfo.ii.mac );
if( rnfo.ii.device_up == false )
nping_warning(QT_2, "Device used for target host %s seems to be down.", mytarget->getTargetIPstr());
/* Determine next hop MAC address and target MAC address */
if( o.sendEth() ){
#ifdef WIN32
if (o.havePcap() && rnfo.ii.device_type == devt_loopback) {
mytarget->setNextHopMACAddress(mytarget->getSrcMACAddress());
}
else {
#endif
mytarget->determineNextHopMACAddress();
mytarget->determineTargetMACAddress(); /* Sets Target MAC only if is directly connected to us */
#ifdef WIN32
}
#endif
}
/* If we are in debug mode print target details */
if(o.getDebugging() >= DBG_3)
mytarget->printTargetDetails();
}
}else{
struct sockaddr_storage ss;
struct sockaddr_in6 *s6=(struct sockaddr_in6 *)&ss;
memset(&ss, 0, sizeof(sockaddr_storage));
s6->sin6_family=AF_INET6;
mytarget->setSourceSockAddr(&ss, sizeof(struct sockaddr_storage));
}
/* Insert current target into targets array */
this->Targets.push_back(mytarget);
}
/* getNextTarget() checks this to ensure user has previously called processSpecs() */
this->ready=true;
o.targets.rewind();
return OP_SUCCESS;
} /* End of getTargetSpecCount() */
NpingTarget *NpingTargets::getNextTarget(){
/* When !ready it means that processSpecs() has not been called yet. This
* happens when user hits CTRL-C early. */
if( this->ready == false )
return NULL;
/* Did we reach the end of the vector in the last call? */
if( this->current_target >= this->Targets.size() )
return NULL;
nping_print(DBG_4, "Next target returned by getNextTarget(): Targets[%lu/%lu] --> %s \n", this->current_target, (unsigned long) this->Targets.size(), this->Targets.at(this->current_target)->getTargetIPstr() );
return this->Targets.at( this->current_target++ );
} /* End of getNextTarget() */
int NpingTargets::rewind(){
current_target=0;
return OP_SUCCESS;
} /* End of rewind() */
/* Frees all of the Targets. Returns the number of freed targets. The number
* return should match value returned by getTargetsFetched(). */
unsigned long int NpingTargets::freeTargets(){
unsigned long int cnt=0;
while(!this->Targets.empty()) {
this->currenths = Targets.back();
delete currenths;
Targets.pop_back();
cnt++;
}
return cnt;
} /* End of freeTargets() */
NpingTarget *NpingTargets::findTarget(struct sockaddr_storage *tt){
size_t i=0;
struct sockaddr_storage ss;
size_t ss_len;
struct sockaddr_in *s_ip4=(struct sockaddr_in *)&ss;
struct sockaddr_in6 *s_ip6=(struct sockaddr_in6 *)&ss;
struct sockaddr_in *t_ip4=(struct sockaddr_in *)tt;
struct sockaddr_in6 *t_ip6=(struct sockaddr_in6 *)tt;
if (tt==NULL)
return NULL;
for(i=0; i<this->Targets.size(); i++){
this->Targets[i]->getTargetSockAddr(&ss, &ss_len);
/* Are we are dealing with IPv4 addresses? */
if( s_ip4->sin_family==AF_INET && t_ip4->sin_family==AF_INET){
if( !memcmp(&(s_ip4->sin_addr), &(t_ip4->sin_addr), sizeof(struct in_addr)) )
return this->Targets[i];
}
/* Are they IPv6 addresses? */
else if( s_ip6->sin6_family==AF_INET6 && t_ip6->sin6_family==AF_INET6 ){
if( !memcmp(&(s_ip6->sin6_addr), &(t_ip6->sin6_addr), sizeof(struct in6_addr)) )
return this->Targets[i];
}
/* Unknown type of address, skipping... */
else{
continue;
}
}
return NULL;
} /* End of findTarget() */