pkgsrc/net/nmap/PLIST

823 lines
39 KiB
Text
Raw Normal View History

nmap: updated to 7.92 Nmap 7.92 [2021-08-08] o [Windows] Upgraded Npcap to version 1.50, the fastest and most stable release yet. Among the many exciting changes listed at https://npcap.org/changelog is support for Windows on ARM, which means Nmap can now run on lightweight Windows tablets like the Surface Pro X. o Updated Nmap's NPSL license to rewrite a poorly-worded clause which many folks interpreted as a "field of endeavor restriction" related to "proprietary software companies". We are retroactively offering Nmap versions 7.90 and 7.91 under this new Version 0.93 of the NPSL so that users and distributors may choose either version of the license. o [Windows] Updated our Windows builds to Visual Studio 2019, Windows 10 SDK, and the UCRT, removing support for Windows Vista and earlier. Npcap is required for packet injection and capture, not WinPcap. o New Nmap option --unique will prevent Nmap from scanning the same IP address twice, which can happen when different names resolve to the same address. [Daniel Miller] o [NSE] Added 3 NSE scripts, from 4 authors, bringing the total up to 604! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + nbns-interfaces queries NetBIOS name service (NBNS) to gather IP addresses of the target's network interfaces [Andrey Zhukov] + openflow-info gathers preferred and supported protocol versions from OpenFlow devices [Jay Smith, Mak Kolybabi] + port-states prints a list of ports that were found in each state, including states that were summarized as "Not shown: X closed ports" [Daniel Miller] o Several changes to UDP payloads to improve accuracy: + Fix an issue with -sU where payload data went out-of-scope before it was used, causing corrupted payloads to be sent. [Mariusz Ziulek] + Nmap's retransmission limits were preventing some UDP payloads from being tried with -sU and -PU. Now, Nmap sends each payload for a particular port at the same time without delay. [Daniel Miller] + New UDP payloads: - TS3INIT1 for UDP 3389 [colcrunch] - DTLS for UDP 3391 (RD Gateway) [Arnim Rupp] o [NSE] TLS 1.3 now supported by most scripts for which it is relevant, such as ssl-enum-ciphers. Some functions like ssl tunnel connections and certificate parsing will require OpenSSL 1.1.1 or later to fully support TLS 1.3. [Daniel Miller] o Changes to Nmap's XML output: + If a host times out, the XML <host> element will have the attribute timedout="true" and the host's timing info (srtt etc.) will still be printed. + The "extrareasons" element now includes a list of port numbers for each "ignored" state. The "All X ports" and "Not shown:" lines in normal output have been changed slightly to provide more detail. [Daniel Miller] o Fix an issue in addrset matching that was causing all targets to be excluded if the --excludefile listed a CIDR range that contains an earlier, smaller CIDR range. [Daniel Miller] o Setting --host-timeout=0 will disable the host timeout, which is set by -T5 to 15 minutes. Earlier versions of Nmap require the user to specify a very long timeout instead. o [NSE] Prevent the ssl-* NSE scripts from probing ports that were excluded from version scan, usually 9100-9107, since JetDirect will print anything sent to these ports. [Daniel Miller] o Nmap no longer produces cryptic message "Failed to convert source address to presentation format" when unable to find useable route to the target. [nnposter] o [Ncat] Use safety-checked versions of FD_* macros to abort early if number of connections exceeds FD_SETSIZE. [Pavel Zhukov] o [Ncat] Connections proxied via SOCKS4/SOCKS5 were intermittently dropping server data sent right after the connection got established, such as port banners. [Sami Pönkänen] o [Ncat] Fixed a bug in proxy connect mode which would close the connection as soon as it was opened in Nmap 7.90 and 7.91. o [NSE] Fixed NSE so it will not consolidate all port script output for targets which share an IP (e.g. HTTP vhosts) under one target. [Daniel Miller] o [Zenmap] Fixed an issue where a failure to execute Nmap would result in a Zenmap crash with "TypeError: coercing to Unicode" exception. o Nmap no longer considers an ICMP Host Unreachable as confirmation that a target is down, in accordance with RFC 1122 which says these errors may be transient. Instead, the probe will be destroyed and other probes used to determine aliveness. [Daniel Miller] o [Ncat] Ncat no longer crashes when used with Unix domain sockets. o [Ncat] Ncat is now again generating certificates with the duration of one year. Due to a bug, recent versions of Ncat were using only one minute. [Tobias Girstmair] o [NSE] URL/percent-encoding is now using uppercase hex digits to align with RFC 3986, section 2.1, and to improve compatibility with some real-world web servers. [nnposter] o [NSE] Script hostmap-crtsh got improved in several ways. The most visible are that certificate SANs are properly split apart and that identities that are syntactically incorrect to be hostnames are now ignored. [Michel Le Bihan, nnposter] o [NSE] Loading of a Nikto database failed if the file was referenced relative to the Nmap directory [nnposter] o [NSE] SMB2 dialect handling has been redesigned. Visible changes include: * Notable improvement in speed of script smb-protocols and others * Some SMB scripts are no longer using a hardcoded dialect, improving target interoperability * Dialect names are aligned with Microsoft, such as 3.0.2, instead of 3.02 [nnposter] o [NSE] Script smb2-vuln-uptime no longer reports false positives when the target does not provide its boot time. [nnposter] o [NSE] Client packets composed by the DHCP library will now contain option 51 (IP address lease time) only when requested. [nnposter] o [NSE] XML decoding in library citrixxml no longer crashes when encountering a character reference with codepoint greater than 255. (These references are now left unmodified.) [nnposter] o [NSE] Script mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base. [nnposter] o [NSE] It is now possible to control whether the SNMP library uses v1 (default) or v2c by setting script argument snmp.version. [nnposter]
2021-08-26 10:24:48 +02:00
@comment $NetBSD: PLIST,v 1.32 2021/08/26 08:24:48 adam Exp $
Update to 5.00 Fix for PR#41506 Fix missing @dirrm entries from PLIST* Before we go into the detailed changes, here are the top 5 improvements in Nmap 5: 1. The new Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks made easy with Ncat. 2. The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners. Ndiff makes it easy to automatically scan your network daily and report on any changes (systems coming up or going down or changes to the software services they are running). The other two tools now packaged with Nmap itself are Ncat and the much improved Zenmap GUI and results viewer. 3. Nmap performance has improved dramatically. We spent last summer scanning much of the Internet and merging that data with internal enterprise scan logs to determine the most commonly open ports. This allows Nmap to scan fewer ports by default while finding more open ports. We also added a fixed-rate scan engine so you can bypass Nmap's congestion control algorithms and scan at exactly the rate (packets per second) you specify. 4. We released Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition. 5. The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. All existing scripts have been improved, and 32 new ones added. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more. All NSE scripts and modules are described in the new NSE documentation portal. Details are here: http://nmap.org/changelog.html
2009-07-20 21:40:08 +02:00
bin/ncat
1999-01-15 01:08:53 +01:00
bin/nmap
Nmap 5.35DC1 [2010-07-16] Some of the highlights are: o [NSE] Added more scripts, bringing the total to 131! o Performed a major OS detection integration run. o Performed a large version detection integration run. o [Zenmap] Added the ability to print Nmap output to a printer. o [Nmap, Ncat, Nping] The default unit for time specifications is now seconds, not milliseconds, and times may have a decimal point. o Ports are now considered open during a SYN scan if a SYN packet (without the ACK flag) is received in response. o [Ncat] In listen mode, the --exec and --sh-exec options now accept a single connection and then exit, just like in normal listen mode. o UDP payloads are now stored in an external data file, nmap-payloads, instead of being hard-coded in the executable. o Added a new library, libnetutil, which contains about 2,700 lines of networking related code which is now shared between Nmap and Nping o Improved service detection match lines. o Improved our brute force password guessing list by mixing in some data sent in by Solar Designer of John the Ripper fame. o [Zenmap] IP addresses are now sorted by octet rather than their string representation. o [Ncat] When receiving a connection/datagram in listen mode, Ncat now prints the connecting source port along with the IP address. o Added EPROTO to the list of known error codes in service scan. o Updated IANA IP address space assignment list for random IP (-iR) generation. o Zenmap's "slow comprehensive scan profile" has been modified to use the best 7-probe host discovery combination we were able to find in extensive empirical testing o Zenmap now lets you save scan results in normal Nmap text output format or (as before) as XML. o [NSE] Raw packet sending at the IP layer is now supported, in addition to the existing Ethernet sending functionality. o Nmap now honors routing table entries that override interface addresses and netmasks. o [Ncat] The HTTP proxy server now accepts client connections over SSL, and added support for HTTP digest authentication of proxies, as both client and server. o Improved the MIT Kerberos version detection signatures. Plus many bugfixes and improvements. For full changelog, see http://nmap.org/changelog.html
2010-07-22 22:46:29 +02:00
bin/nping
man/de/man1/nmap.1
man/es/man1/nmap.1
man/fr/man1/nmap.1
man/hr/man1/nmap.1
man/hu/man1/nmap.1
man/it/man1/nmap.1
man/ja/man1/nmap.1
man/man1/ncat.1
man/man1/nmap.1
man/man1/nping.1
man/pl/man1/nmap.1
man/pt_BR/man1/nmap.1
man/pt_PT/man1/nmap.1
man/ro/man1/nmap.1
man/ru/man1/nmap.1
man/sk/man1/nmap.1
man/zh/man1/nmap.1
Update to 5.00 Fix for PR#41506 Fix missing @dirrm entries from PLIST* Before we go into the detailed changes, here are the top 5 improvements in Nmap 5: 1. The new Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks made easy with Ncat. 2. The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners. Ndiff makes it easy to automatically scan your network daily and report on any changes (systems coming up or going down or changes to the software services they are running). The other two tools now packaged with Nmap itself are Ncat and the much improved Zenmap GUI and results viewer. 3. Nmap performance has improved dramatically. We spent last summer scanning much of the Internet and merging that data with internal enterprise scan logs to determine the most commonly open ports. This allows Nmap to scan fewer ports by default while finding more open ports. We also added a fixed-rate scan engine so you can bypass Nmap's congestion control algorithms and scan at exactly the rate (packets per second) you specify. 4. We released Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition. 5. The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. All existing scripts have been improved, and 32 new ones added. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more. All NSE scripts and modules are described in the new NSE documentation portal. Details are here: http://nmap.org/changelog.html
2009-07-20 21:40:08 +02:00
share/ncat/ca-bundle.crt
Updated to version 3.55. Changes: ======== - Added MAC address printing. If Nmap receives packet from a target machine which is on an Ethernet segment directly connected to the scanning machine, Nmap will print out the target MAC address. Nmap also now contains a database (derived from the official IEEE version) which it uses to determine the vendor name of the target ethernet interface. The Windows version of Nmap does not yet have this capability. If any Windows developer types are interesting in adding it, you just need to implement IPisDirectlyConnected() in tcpip.cc and then please send me the patch. Here are examples from normal and XML output (angle brackets replaced with [] for HTML changelog compatability): MAC Address: 08:00:20:8F:6B:2F (SUN Microsystems) [address addr="00:A0:CC:63:85:4B" vendor="Lite-on Communications" addrtype="mac" /] - Updated the XML DTD to support the newly printed MAC addresses. Thanks to Thorsten Holz (thorsten.holz(a)mmweg.rwth-aachen.de) for sending this patch. - Added a bunch of new and fixed service fingerprints for version detection. These are from Martin Macok (martin.macok(a)underground.cz). - Normalized many of the OS names in nmap-os-fingerprints (fixed capitalization, typos, etc.). Thanks to Royce Williams (royce(a)alaska.net) and Ping Huang (pshuang(a)alum.mit.edu) for sending patches. - Modified the mswine32/nmap_performance.reg Windows registry file to use an older and more compatable version. It also now includes the value "StrictTimeWaitSeqCheck"=dword:00000001 , as suggested by Jim Harrison (jmharr(a)microsoft.com). Without that latter value, the TcpTimedWaitDelay value apparently isn't checked. Windows users should apply the new registry changes by clicking on the .reg file. Or do it manually as described in README-WIN32. This file is also now available in the data directory at http://www.insecure.org/nmap/data/nmap_performance.reg - Applied patch from Gisle Vanem (giva(a)bgnett.no) which allows the Windows version of Nmap to work with WinPCAP 3.1BETA (and probably future releases). The Winpcap folks apparently changed the encoding of adaptor names in this release. - Fixed a ping scanning bug that would cause this error message: "nmap: targets.cc:196: int hostupdate (Target **, Target *, int, int, int, timeout_info *, timeval *, timeval *, pingtune *, tcpqueryinfo *, pingstyle): Assertion `pt->down_this_block > 0' failed." Thanks to Beirne Konarski (beirne(a)neo.rr.com) for reporting the problem. - If a user attempts -PO (the letter O), print an error suggesting that they probably mean -P0 (Zero) to disable ping scanning. - Applied a couple patches (with minor changes) from Oliver Eikemeier (eikemeier(a)fillmore-labs.com) which fix an edge case relating to decoy scanning IP ranges that must be sent through different interfaces, and improves the Nmap response to certain error codes returned by the FreeBSD firewall system. The patches are from http://cvsweb.freebsd.org/ports/security/nmap/files/ . - Many people have reported this error: "checking for type of 6th argument to recvfrom()... configure: error: Cannot find type for 6th argument to recvfrom()". In most cases, the cause was a missing or broken C++ compiler. That should now be detected earlier with a clearer message. - Fixed the FTP bounce scan to better detect filered ports on the target network. - Fixed some minor bugs related to the new MAC address printing feature. - Fixed a problem with UDP-scanning port 0, which was reported by Sebastian Wolfgarten (sebastian(a)wolfgarten.com). - Applied patch from Ruediger Rissmann (RRI(a)zurich.ibm.com), which helps Nmap understand an EACCESS error, which can happen at least during IPv6 scans from certain platforms to some firewalled targets. - Renamed ACK ping scan option from -PT to -PA in the documentation. Nmap has accepted both names for years and will continue to do so. - Removed the notice that Nmap is reading target specifications from a file or stdin when you specify the -iL option. It was sometimes printed to stdout even when you wanted to redirect XML or grepable output there, because it was printed during options processing before output files were handled. This change was suggested by Anders Thulin (ath(a)algonet.se). - Added --source_port as a longer, but hopefully easier to remember, alias for -g. In other words, it tries to use the constant source port number you specify for probes. This can help against poorly configured firewalls that trust source port 20, 53, and the like. - Removed undocumented (and useless) -N option. - Fixed a version detection crash reported in excellent detail by Jedi/Sector One (j(a)pureftpd.org). - Applied patch from Matt Selsky (selsky(a)columbia.edu) which helps Nmap build with OpenSSL. - Modified the configure/build system to fix library ordering problems that prevented Nmap from building on certain platforms. Thanks to Greg A. Woods (woods(a)weird.com) and Saravanan (saravanan_kovai(a)HotPop.com) for the suggestions. - Applied a patch to Makefile.in from Scott Mansfield (thephantom(a)mac.com) which enables the use of a DESTDIR variable to install the whole Nmap directory structure under a different root directory. The configure --prefix option would do the same thing in this case, but DESTDIR is apparently a standard that package maintainers like Scott are used to. An example usage is "make DESTDIR=/tmp/packageroot". - Removed unnecessary banner printing in the non-root connect() ping scan. Thanks to Tom Rune Flo (tom(a)x86.no) for the suggestion and a patch. - Updated the headers at the top of each source file (mostly to advance the copyright year to 2004 and note that Nmap is a registered trademark).
2004-07-07 22:54:34 +02:00
share/nmap/nmap-mac-prefixes
Update to version 4.20 Changes: 4.20 o Integrated the latest OS fingerprint submissions. The 2nd generation DB size has grown to 231 fingerprints. Please keep them coming! New fingerprints include Mac OS X Server 10.5 pre-release, NetBSD 4.99.4, Windows NT, and much more. o Fixed a segmentation fault in the new OS detection system which was reported by Craig Humphrey and Sebastian Garcia. o Fixed a TCP sequence prediction difficulty indicator bug. The index is supposed to go from 0 ("trivial joke") to about 260 (OpenBSD). But some systems generated ISNs so insecurely that Nmap went berserk and reported a negative difficulty index. This generally only affects some printers, crappy cable modems, and Microsoft Windows (old versions). Thanks to Sebastian Garcia for helping me track down the problem. 4.20RC2 o Integrated all of your OS detection submissions since RC1. The DB has increased 13% to 214 fingerprints. Please keep them coming! New fingerprints include versions of z/OS, OpenBSD, Linux, AIX, FreeBSD, Cisco CatOS, IPSO firewall, and a slew of printers and misc. devices. We also got our first Windows 95 fingerprint, submitted anonymously of course :). o Fixed (I hope) the "getinterfaces: intf_loop() failed" error which was seen on Windows Vista. The problem was apparently in intf-win32.c of libdnet (need to define MIB_IF_TYPE_MAX to MAX_IF_TYPE rather than 32). Thanks to Dan Griffin (dan(a)jwsecure.com) for tracking this down! o Applied a couple minor bug fixes for IP options support and packet tracing. Thanks to Michal Luczaj (regenrecht(a)o2.pl) for reporting them. o Incorporated SLNP (Simple Library Network Protocol) version detection support. Thanks to Tibor Csogor (tibi(a)tiborius.net) for the patch. 4.20RC1 o Fixed (I hope) a bug related to Pcap capture on Mac OS X. Thanks to Christophe Thil for reporting the problem and to Kurt Grutzmacher and Diman Todorov for helping to track it down. o Integrated all of your OS detection submissions since ALPHA11. The DB has increased 27% to 189 signatures. Notable additions include the Apple Airport Express, Windows Vista RC1, OpenBSD 4.0, a Sony TiVo device, and tons of broadband routers, printers, switches, and Linux kernels. Keep those submissions coming! o Upgraded the included LibPCRE from version 6.4 to 6.7. Thanks to Jochen Voss (voss(a)seehuhn.de) for the suggestion (he found some bugs in 6.4) 4.20ALPHA11 o Integrated all of your OS detection submissions, bringing the database up to 149 fingerprints. This is an increase of 28% from ALPHA10. Notable additions include FreeBSD 6.1, a bunch of HP LaserJet printers, and HP-UX 11.11. We also got a bunch of more obscure submissions like Minix 3.1.2a and "Ember InSight Adapter for programming EM2XX-family embedded devices". Who doesn't have a few of those laying around? I'm hoping that all the obscure submissions mean that more of the mainstream systems are being detected out of the box! Please keep those submissions (obscure or otherwise) coming! 4.20ALPHA10 o Integrated tons of new OS fingerprints. The DB now contains 116 fingerprints, which is up 63% since the previous version. Please keep the submissions coming! 4.20ALPHA9 o Integrated the newly submitted OS fingerprints. The DB now contains 71 fingerprints, up 27% from 56 in ALPHA8. Please keep them coming! We still only have 4.2% as many fingerprints as the gen1 database. o Added the --open option, which causes Nmap to show only open ports. Ports in the states "open|closed" and "unfiltered" might be open, so those are shown unless the host has an overwhelming number of them. o Nmap gen2 OS detection used to always do 2 retries if it fails to find a match. Now it normally does just 1 retry, but does 4 retries if conditions are good enough to warrant fingerprint submission. This should speed things up on average. A new --max-os-tries option lets you specify a higher lower maximum number of tries. o Added --unprivileged option, which is the opposite of --privileged. It tells Nmap to treat the user as lacking network raw socket and sniffing privileges. This is useful for testing, debugging, or when the raw network functionality of your operating system is somehow broken. o Fixed a confusing error message which occured when you specified a ping scan or list scan, but also specified -p (which is only used for port scans). Thanks to Thomas Buchanan for the patch. o Applied some small cleanup patches from Kris Katterjohn 4.20ALPHA8 o Integrated the newly submitted OS fingerprints. The DB now contains 56, up 33% from 42 in ALPHA7. Please keep them coming! We still only have 3.33% as many signatures as the gen1 database. o Nmap 2nd generation OS detection now has a more sophisticated mechanism for guessing a target OS when there is no exact match in the database (see http://insecure.org/nmap/osdetect/osdetect-guess.html ) o Rewrote mswin32/nmap.rc to remove cruft and hopefully reduce some MFC-related compilation problems we've seen. Thanks to KX (kxmail(a)gmail.com) for doing this. o NmapFE now uses a spin button for verbosity and debugging options so that you can specify whatever verbosity (-v) or debugging (-d) level you desire. The --randomize-hosts option was also added to NmapFE. Thanks to Kris Katterjohn for the patches. o A dozen or so small patches to Nmap and NmapFE by Kris Katterjohn. o Removed libpcap/Win32 and libpcap/msdos as Nmap doesn't use them. This reduces the Nmap tar.bz2 by about 50K. Thanks to Kris Katterjohn for the suggestion. 4.20ALPHA7 o Did a bunch of Nmap 2nd generation fingerprint integration work. Thanks to everyone who sent some in, though we still need a lot more. Also thanks to Zhao for a bunch of help with the integration tools. 4.20ALPHA6 had 12 fingerprints, this new version has 42. The old DB (still included) has 1,684. o Updated nmap-mac-prefixes to reflect the latest OUI DB from the IEEE (http://standards.ieee.org/regauth/oui/oui.txt) as of September 6, 2006. Also added the unregistered PearPC virtual NIC prefix, as suggested by Robert Millan (rmh(a)aybabtu.com). o Applied some small internal cleanup patches by Kris Katterjohn. 4.20ALPHA6 o Fixed a bug in 2nd generation OS detection which would (usually) prevent fingerprints from being printed when systems don't respond to the 1st ICMP echo probe (the one with bogus code value of 9). Thanks to Brandon Enright for reporting and helping me debug the problem. o Fixed some problematic Nmap version detection signatures which could cause warning messages. Thanks to Brandon Enright for the initial patch. 4.20ALPHA5 o Worked with Zhao to improve the new OS detection system with better algorithms, probe changes, and bug fixes. We're now ready to start growing the new database! If Nmap gives you fingerprints, please submit them at the given URL. The DB is still extremely small. The new system is extensively documented at http://insecure.org/nmap/osdetect/ . o Nmap now supports IP options with the new --ip-options flag. You can specify any options in hex, or use "R" (record route), "T" (record timestamp), "U") (record route & timestamp), "S [route]" (strict source route), or "L [route]" (loose source route). Specify --packet-trace to display IP options of responses. For further information and examples, see http://insecure.org/nmap/man/ and http://seclists.org/nmap-dev/2006/q3/0052.html . Thanks to Marek Majkowski for writing and sending the patch. o Integrated all 2nd quarter service detection fingerprint submissions. Please keep them coming! We now have 3,671 signatures representing 415 protocols. Thanks to version detection czar Doug Hoyte for doing this. o Nmap now uses the (relatively) new libpcap pcap_get_selectable_fd API on systems which support it. This means that we no longer need to hack the included Pcap to better support Linux. So Nmap will now link with an existing system libpcap by default on that platform if one is detected. Thanks to Doug Hoyte for the patch. o Updated the included libpcap from 0.9.3 to 0.9.4. The changes I made are in libpcap/NMAP_MODIFICATIONS . By default, Nmap will now use the included libpcap unless version 0.9.4 or greater is already installed on the system. o Applied some nsock bugfixes from Diman Todorov. These don't affect the current version of Nmap, but are important for his Nmap Scripting Engine, which I hope to integrate into mainline Nmap in September. o Fixed a bug which would occasionally cause Nmap to crash with the message "log_vwrite: write buffer not large enough". I thought I conquered it in a previous release -- thanks to Doug Hoyte for finding a corner case which proved me wrong. o Fixed a bug in the rDNS system which prevented us from querying certain authoritative DNS servers which have recursion explicitly disabled. Thanks to Doug Hoyte for the patch. o --packet-trace now reports TCP options (thanks to Zhao Lei for the patch). Thanks to the --ip-options addition also found in this release, IP options are printed too. o Cleaned up Nmap DNS reporting to be a little more useful and concise. Thanks to Doug Hoyte for the patch. o Applied a bunch of small internal cleanup patches by Kris Katterjohn (kjak(a)ispwest.com). o Fixed the 'distclean' make target to be more comprehensive. Thanks to Thomas Buchanan (Thomas.Buchanan(a)thecompassgrp.net) for the patch. Nmap 4.20ALPHA4 o Nmap now provides progress statistics in the XML output in verbose mode. Here are some examples of the format (etc is "estimated time until completion) and times are in UNIX time_t (seconds since 1970) format. Angle braces have been replaced by square braces: [taskbegin task="SYN Stealth Scan" time="1151384685" /] [taskprogress task="SYN Stealth Scan" time="1151384715" percent="13.85" remaining="187" etc="1151384902" /] [taskend task="SYN Stealth Scan" time="1151384776" /] [taskbegin task="Service scan" time="1151384776" /] [taskend task="Service scan" time="1151384788" /] Thanks to Adam Vartanian (flooey(a)gmail.com) for the patch. o Updated the Windows installer to give an option checkbox for performing the Nmap performance registry changes. The default is to do so. Thanks to Adam Vartanian (flooey(a)gmail.com) for the patch. o Applied several code cleanup patches from Marek Majkowski. o Added --release-memory option, which causes Nmap to release all accessible memory buffers before quitting (rather than let the OS do it). This is only useful for debugging memory leaks. o Fixed a bug related to bogus completion time estimates when you request an estimate (through runtime interaction) right when Nmap is starting.a subsystem (such as a port scan or version detection). Thanks to Diman Todorov for reporting the problem and Doug Hoyte for writing a fix. o Nmap no longer gets random numbers from OpenSSL when it is available because that turned out to be slower than Nmap's other methods (e.g. /dev/urandom on Linux, /dev/arandom on OpenBSD, etc.). Thanks to Marek Majkowski for reporting the problem. o Updated the Windows binary distributions (self-installer and .zip) to include the new 2nd generation OS detection DB (nmap-os-db). Thanks to Sina Bahram for reporting the problem. o Fixed the --max-retries option, which wasn't being honored. Thanks to Jon Passki (jon.passki(a)hursk.com) for the patch. Nmap 4.20ALPHA3 o Added back Win32 support thanks to a patch by kx o Fixed the English translation of TCP sequence difficulty reported by Brandon Enright, and also removed fingerprint printing for 1st generation fingerprints (I don't really want to deal with those anymore). Thanks to Zhao Lei for writing this patch. o Fix a problem which caused OS detection to be done in some cases even if the user didn't request it. Thanks to Diman Todorov for the fix. Nmap 4.20ALPHA2 o Included nmap-os-db (the new OS detection DB) within the release. Oops! Thanks to Brandon Enright (bmenrigh(a)ucsd.edu) for catching this problem with 4.20ALPHA1. o Added a fix for the crash in the new OS detection which would come with the message "Probe doesn't exist! Probe type: 1. Probe subid: 1" Nmap 4.20ALPHA1 o Integrated initial 2nd generation OS detection patch! The system is documented at http://insecure.org/nmap/osdetect/ . Thanks to Zhao Lei for helping with the coding and design. o portlist.cc was refactored to remove some code duplication. Thanks to Diman Todorov for the patch.
2006-12-17 18:55:49 +01:00
share/nmap/nmap-os-db
Nmap 5.35DC1 [2010-07-16] Some of the highlights are: o [NSE] Added more scripts, bringing the total to 131! o Performed a major OS detection integration run. o Performed a large version detection integration run. o [Zenmap] Added the ability to print Nmap output to a printer. o [Nmap, Ncat, Nping] The default unit for time specifications is now seconds, not milliseconds, and times may have a decimal point. o Ports are now considered open during a SYN scan if a SYN packet (without the ACK flag) is received in response. o [Ncat] In listen mode, the --exec and --sh-exec options now accept a single connection and then exit, just like in normal listen mode. o UDP payloads are now stored in an external data file, nmap-payloads, instead of being hard-coded in the executable. o Added a new library, libnetutil, which contains about 2,700 lines of networking related code which is now shared between Nmap and Nping o Improved service detection match lines. o Improved our brute force password guessing list by mixing in some data sent in by Solar Designer of John the Ripper fame. o [Zenmap] IP addresses are now sorted by octet rather than their string representation. o [Ncat] When receiving a connection/datagram in listen mode, Ncat now prints the connecting source port along with the IP address. o Added EPROTO to the list of known error codes in service scan. o Updated IANA IP address space assignment list for random IP (-iR) generation. o Zenmap's "slow comprehensive scan profile" has been modified to use the best 7-probe host discovery combination we were able to find in extensive empirical testing o Zenmap now lets you save scan results in normal Nmap text output format or (as before) as XML. o [NSE] Raw packet sending at the IP layer is now supported, in addition to the existing Ethernet sending functionality. o Nmap now honors routing table entries that override interface addresses and netmasks. o [Ncat] The HTTP proxy server now accepts client connections over SSL, and added support for HTTP digest authentication of proxies, as both client and server. o Improved the MIT Kerberos version detection signatures. Plus many bugfixes and improvements. For full changelog, see http://nmap.org/changelog.html
2010-07-22 22:46:29 +02:00
share/nmap/nmap-payloads
Update nmap to 3.00. Changes: * Added protocol scan (-sO), which determines what IP protocols (TCP, IGMP, GRE, UDP, ICMP, etc) are supported by a given host. This uses a clever technique designed and implemented by Gerhard Rieger . * Nmap now recognizes more than 700 operating system versions and network devices (printers, webcams, routers, etc) thanks to thousands of contributions from the user community! Many operating systems were even recognized by Nmap prior to their official release. Nmap3 also recognizes 2148 port assignments, 451 SunRPC services, and 144 IP protocols. * Added Idlescan (-sI), which bounces the scan off a "zombie" machine. This can be used to bypass certain (poorly configured) firewalls and packet filters. In addition, this is the most stealthy Nmap scan mode, as no packets are sent to the target from your true IP address. * The base Nmap package now builds and functions under Windows! It is distributed in three forms: build-it-yourself source code, a simple command-line package, or along with a nice GUI interface (NmapWin) and a fancy installer. This is due to the hard work of Ryan Permeh (from eEye), Andy Lutomirski, and Jens Vogt. * Mac OS X is now supported, as well as the latest versions of Linux, OpenBSD, Solaris, FreeBSD, and most other UNIX platforms. Nmap has also been ported to several handheld devices -- see the Related Projects page for further information. * XML output (-oX) is now available for smooth interoperability between Nmap and other tools. * Added ICMP Timestamp and Netmask ping types (-PP and -PM). These (especially timestamp) can be useful against some hosts that do not respond to normal ping (-PI) packets. Nmap still allows TCP "ping" as well. * Nmap can now detect the uptime of many hosts when the OS Scan option (-O) is used. * Several new tests have been added to make OS detection more accurate and provide more granular version information. * Removed 128.210.*.* addresses from Nmap man page examples due to complaints from Purdue security staff. * The --data_length option was added, allowing for longer probe packets. Among other uses, this defeats certain simplistic IDS signatures. * You can now specify distinct port UDP and TCP port numbers in a single scan command using a command like 'nmap -sSU -p U:53,111,137,T:21-25,80,139,515,6000,8080 target.com'. See the man page for more usage info. * Added mysterious, undocumented --scanflags and --fuzzy options. * Nmap now provides IPID as well as TCP ISN sequence predictability reports if you use -v and -O. * SYN scan is now the default scan type for privileged (root) users. This is usually offers greater performance while reducing network traffic. * Capitalized all references to God in error messages. * Added List scan (-sL) which enumerates targets without scanning them. * The Nmap "random IP" scanning mode is now smart enough to skip many unallocated netblocks. * Tons of more minor features, bugfixes, and portability enhancements.
2002-08-03 14:23:57 +02:00
share/nmap/nmap-protocols
share/nmap/nmap-rpc
Update to version 3.45. Also closes PR pkg/22845 by Adrian Portelli. Changes: 3.45: ===== - Added new HTTPOptions and RTSPRequest probes suggested by MadHat (madhat(a)unspecific.com) - Integrated more service signatures from MadHat (madhat(a)unspecific.com), Brian Hatch (bri(a)ifokr.org), Niels Heinen (zillion(a)safemode.org), Solar Designer (solar(a)openwall.com), Seth Master (smaster(a)stanford.edu), and Curt Wilson (netw3_security(a)hushmail.com), - Applied a patch from Solar Eclipse (solareclipse(a)phreedom.org) which increases the allowed size of the 'extrainfo' version field from 80 characters to 128. The main benefit is to allow longer apache module version strings. - Fixed Windows compilation. - Applied some updates to README-WIN32 sent in by Kirby Kuehl (kkuehl(a)cisco.com). He improved the list of suggested registry changes and also fixed a typo or two. He also attached a .reg file automate the Nmap connect() scan performance enhancing registry changes. I am now including that with the Nmap Windows binary .zip distribution (and in mswin32/ of the source distro). - Applied a one-line patch from Dmitry V. Levin (ldv@altlinux.org) which fixes a test Nmap does during compilation to see if an existing libpcap installation is recent enough. 3.40PVT17: ========== - Wrote and posted a new paper on version scanning to http://www.insecure.org/nmap/versionscan.html . Updated nmap-service-probes and the Nmap man page to simply refer to this URL. - Integrated more service signatures from my own scanning as well as contributions from Brian Hatch (bri(a)ifokr.org), MadHat (madhat(a)unspecific.com), Max Vision (vision(a)whitehats.com), HD Moore (hdm(a)digitaloffense.net), Seth Master (smaster(a)stanford.edu), and Niels Heinen (zillion(a)safemode.org). MadHat also contributed a new probe for Windows Media Service. Many people set a LOT of signatures, which has allowed nmap-service-probes to grow from 295 to 356 signatures representing 85 service protocols! - Applied a patch (with slight changes) from Brian Hatch (bri(a)ifokr.org) which enables caching of SSL sessions so that negotiation doesn't have to be repeated when Nmap reconnects to the same between probes. - Applied a patch from Brian Hatch (bri@ifokr.org) which optimizes the requested SSL ciphers for speed rather than security. The list was based on empirical evidence from substantial benchmarking he did with tests that resemble nmap-service-scanning. - Updated the Nmap man page to discuss the new version scanning options (-sV, -A). - I now include nmap-version/aclocal.m4 in the distribution as this is required to rebuild the configure script ( thanks to Dmitry V. Levin (ldv(a)altlinux.org) for notifying me of the problem. - Applied a patch from Dmitry V. Levin (ldv(a)altlinux.org) which detects whether the PCRE include file is <pcre.h> or <pcre - Applied a patch from Dmitry V. Levin (ldv(a)altlinux.org) which fixes typos in some error messages. The patch apparently came from the highly-secure and stable Owl and Alt Linux distributions. Check them out at http://www.openwall.com/Owl/ and http://www.altlinux.com/ - Fixed compilation on Mac OS X - thanks to Brian Hatch (bri(a)ifokr.org> and Ryan Lowe (rlowe(a)pablowe.net) for giving me access to Mac OS X boxes. - Stripped down libpcre build system to remove libtool dependency and other cruft that Nmap doesn't need. (this was mostly a response to libtool-related issues on Mac OS X). - Added a new --version_trace option which causes Nmap to print out extensive debugging info about what version scanning is doing (this is a subset of what you would get with --packet_trace). You should usually use this in combination with at least one -d option. - Fixed a port number printing bug that would cause Nmap service fingerprints to give a negative port number when the actual port was above 32K. Thanks to Seth Master (smaster@stanford.edu) for finding this. - Updated all the header text again to clarify our interpretation of "derived works" after some suggestions from Brian Hatch (bri(a)ifokr.org) - Updated the Nsock config.sub/config.guess to the same newer versions that Nmap uses (for Mac OS X compilation). 3.40PVT16: ========== - Fixed a compilation problem on systems w/o OpenSSL that was discovered by Solar Designer. I also fixed some compilation problems on non-IPv6 systems. It now compiles and runs on my Solaris and ancient OpenBSD systems. - Integrated more services thanks to submissions from Niels Heinen (zillion(a)safemode.org). - Canonicalized the headers at the top of each Nmap/Nsock header src file. This included clarifying our interpretation of derived works, updating the copyright date to 2003, making the header a bit wider, and a few other light changes. I've been putting this off for a while, because it required editing about a hundred !#$# files! 3.40PVT15: ========== - Fixed a major bug in the Nsock time caching system. This could cause service detection to inexplicably fail against certain ports in the second or later machines scanned. Thanks to Solar Designer and HD Moore for helping me track this down. - Fixed some *BSD compilation bugs found by Zillion (zillion(a)safemode.org). - Integrated more services thanks to submissions from Fyodor Yarochkin (fygrave(a)tigerteam.net), and Niels Heinen (zillion(a)safemode.org), and some of my own exploring. There are now 295 signatures. - Fixed a compilation bug found by Solar Designer on machines that don't have struct sockaddr_storage. Nsock now just uses "struct sockaddr *" like connect() does. - Fixed a bug found by Solar Designer which would cause the Nmap portscan table to be truncated in -oN output files if the results are very long. - Changed a bunch of large stack arrays (e.g. int portlookup[65536]) into dynamically allocated heap pointers. The large stack variables apparently caused problems on some architectures. This issue was reported by osamah abuoun (osamah_abuoun(a)hotmail.com). 3.40PVT14: ========== - Added IPv6 support for service scan. - Added an 'sslports' directive to nmap-service-probes. This tells Nmap which service checks to try first for SSL-wrapped ports. The syntax is the same as the normal 'ports' directive for non-ssl ports. For example, the HTTP probe has an 'sslports 443' line and SMTP-detecting probes have and 'sslports 465' line. - Integrated more services thanks to submissions from MadHat (madhat(a)unspecific.com), Solar Designer (solar(a)openwall.com), Dug Song (dugsong(a)monkey.org), pope(a)undersec.com, and Brian Hatch (bri(a)ifokr.org). There are now 288 signatures, matching these 65 service protocols: chargen cvspserver daytime domain echo exec finger font-service ftp ftp-proxy http http-proxy hylafax ident ident imap imaps ipp ircbot ircd irc-proxy issrealsecure landesk-rc ldap meetingmaker microsoft-ds msrpc mud mysql ncacn_http ncp netbios-ns netbios-ssn netsaint netwareip nntp nsclient oracle-tns pcanywheredata pop3 pop3s postgres printer qotd redcarpet rlogind rpc rsync rtsp shell smtp snpp spamd ssc-agent ssh ssl telnet time upnp uucp vnc vnc-http webster whois winshell X11 - Added a Lotus Notes probe from Fyodor Yarochkin (fygrave(a)tigerteam.net). - Dug Song wins the "award" for most obscure service fingerprint submission. Nmap now detects Dave Curry's Webster dictionary server from 1986 :). - Service fingerprints now include a 'T=SSL' attribute when SSL tunneling was used. - More portability enhancements thanks to Solar Designer and his Linux 2.0 libc5 boxes. - Applied a patch from Gisle Vanem (giva(a)bgnett.no) which improves Windows emulation of the UNIX mmap() and munmap() memory mapping calls. 3.40PVT13: ========== - Added SSL-scan-through support. If service detection finds a port to be SSL, it will transparently connect to the port using OpenSSL and use version detection to determine what service lies beneath. This feature is only enabled if OpenSSL is available at build time. A new --with-openssl=DIR configure option is available if OpenSSL is not in your default compiler paths. You can use --without-openssl to disable this functionality. Thanks to Brian Hatch (bri(a)ifokr.org) for sample code and other assistance. Make sure you use a version without known exploitable overflows. In particular, versions up to and including OpenSSL 0.9.6d and 0.9.7-beta2 contained serious vulnerabilities described at http://www.openssl.org/news/secadv_20020730.txt . Note that these vulnerabilities are well over a year old at the time of this writing. - Integrated many more services thanks to submissions from Brian Hatch, HellNBack ( hellnbak(a)nmrc.org ), MadHat, Solar Designer, Simple Nomad, and Shawn Wallis (swallis(a)ku.edu). The number of signatures has grown from 242 to 271. Thanks! - Integrated Novell Netware NCP and MS Terminal Server probes from Simple Nomad (thegnome(a)nmrc.org). - Fixed a segfault found by Solar Designer that could occur when scanning certain "evil" services. - Fixed a problem reported by Solar Designer and MadHat ( madhat(a)unspecific.com ) where Nmap would bail when certain Apache version/info responses were particularly long. It could happen in other cases as well. Now Nmap just prints a warning. - Fixed some portability issues reported by Solar Designer ( solar(a)openwall.com ) 3.40PVT12: ========== - I added probes for SSL (session startup request) and microsoft-ds (SMB Negotiate Protocol request). - I changed the default read timeout for a service probe from 7.5s to 5s. - Fixed a one-character bug that broke many scans when -sV was NOT given. Thanks to Blue Boar (BlueBoar(a)thievco.com) for the report. 3.40PVT11: ========== - Integrated many more services thanks to submissions from Simple Nomad, Solar Designer, jerickson(a)inphonic.com, Curt Wilson, and Marco Ivaldi. Thanks! The match line count has risen from 201 to 242. - Implemented a service classification scheme to separate the vendor/product name from the version number and any extra info that is provided. Instead of v/[big version string]/, the new match lines include v/[vendor/productname]/[version]/[extrainfo]/ . See the docs at the top of nmap-service-probes for more info. This doesn't change the normal output (which lumps them together anyway), but they are separate in the XML so that higher-level programs can easily match against just a product name. Here are a few examples of the improved service element: <service name="ssh" product="OpenSSH" version="3.1p1" extrainfo="protocol 1.99" method="probed" conf="10" /> <service name="domain" product="ISC Bind" version="9.2.1" method="probed" conf="10" /> <state state="open" /><service name="rpcbind" version="2" extrainfo="rpc #100000" method="probed" conf="10" /> <service name="rndc" method="table" conf="3" /> - I went through nmap-service-probes and added the vendor name to more entries. I also added the service name where the product name itself didn't make that completely obvious. - SCO Corporation of Lindon, Utah (formerly Caldera) has lately taken to an extortion campaign of demanding license fees from Linux users for code that they themselves knowingly distributed under the terms of the GNU GPL. They have also refused to accept the GPL, claiming that some preposterous theory of theirs makes it invalid. Meanwhile they have distributed GPL-licensed Nmap in (at least) their "Supplemental Open Source CD". In response to these blatant violations, and in accordance with section 4 of the GPL, we hereby terminate SCO's rights to redistribute any versions of Nmap in any of their products, including (without limitation) OpenLinux, Skunkware, OpenServer, and UNIXWare. 3.40PVT10: ========== - Added "soft matches". These are similar to normal match lines in that they provide a regex for recognizing a service (but no version). But instead of stopping at softmatch service recognition, the scan continues looking for more info. It only launches probes that are known-capable of matching the softmatched service. If no version number is found, at least the determined service is printed. A service print for submission is also provided in that case. So this provides more informative results and improves efficiency. - Cleaned up the Windows support a bit and did more testing and fixing. Windows service detection seems to be working fine for me now, although my testing is still pretty limited. This release includes a Windows binary distribution and the README-WIN32 has been updated to reflect new compilation instructions. - More service fingerprints! Thanks to Solar Designer, Max Vision, Frank Denis (Jedi/Sector One) for the submissions. I also added a bunch from my own testing. The number of match lines went from 179 to 201. - Updated XML output to handle new version and service detection information. Here are a few examples of the new output: <port protocol="tcp" portid="22"><state state="open" /><service name="ssh" version="OpenSSH 3.1p1 (protocol 1.99)" method="probed" conf="10" /></port> <port protocol="tcp" portid="111"><state state="open" /><service name="rpcbind" version="2 (rpc #100000)" method="probed" conf="10" /></port> <port protocol="tcp" portid="953"><state state="open" /><service name="rndc" method="table" conf="3" /></port> - Fixed issue where Nmap would quit when ECONNREFUSED was returned when we try to read from an already-connected TCP socket. FreeBSD does this for some reason instead of giving ECONNRESET. Thanks to Will Saxon (WillS(a)housing.ufl.edu) for the report. - Removed the SERVICEMATCH_STATIC match type from nmap-service-probes. There wasn't much benefit of this over regular expressions, so it isn't worth maintaining the extra code. 3.40PVT9: ========= - Added/fixed numerous service fingerprints thanks to submissions from Max Vision, MadHat, Seth Master. Match lines went from 164 to 179. - The Winpcap libraries used in the Windows build process have been upgraded to version 3.0. - Most of the Windows port is complete. It compiles and service scan works (I didn't test very deeply) on my WinXP box with VS.Net 2003. I try to work out remaining kinks and do some cleanup for the next version. The Windows code was restructured and improved quite a bit, but much more work remains to be done in that area. I'll probably do a Windows binary .zip release of the next version. - Various minor fixes 3.40PVT8: ========= - Service scan is now OFF by default. You can activate it with -sV. Or use the snazzy new -A (for "All recommended features" or "Aggressive") option which turns on both OS detection and service detection. - Fixed compilation on my ancient OpenBSD 2.3 machine (a Pentium 60 :) - Added/fixed numerous service fingerprints thanks to submissions from Brian Hatch, HD Moore, Anand R., and some of my own testing. The number of match lines in this version grows from 137 to 164! Please keep 'em coming! - Various important and not-so-important fixes for bugs I encountered while test scanning. - The RPC grinder no longer prints a startup message if it has no RPC-detected ports to scan. - Some of the service fingerprint length limitations are relaxed a bit if you enable debugging (-d). 3.40PVT7: ========= - Added a whole bunch of services submitted by Brian Hatch (bri(a)ifokr.org). I also added a few Windows-related probes. Nmap-service-probes has gone from 101 match strings to 137. Please keep the submissions coming. - The question mark now only appears for ports in the OPEN state and when service detection was requested. - I now print a separator bar between service fingerprints when Nmap prints more than one for a given host so that users understand to submit them individually (suggested by Brian Hatch (bri(a)ifokr.org)) - Fixed a bug that would cause Nmap to print "empty" service fingerprints consisting of just a semi-colon. Thanks to Brian Hatch (bri(a)ifokr.org) for reporting this. 3.40PVT6: ========= - Banner-scanned hundreds of thousands of machines for ports 21,23,25,110,3306 to collect default banners. Where the banner made the service name/version obvious, I integrated them into nmap-service-probes. This increased the number of 'match' lines from 27 to more than 100. - Created the service fingerprint submission page at http://www.insecure.org/cgi-bin/servicefp-submit.cgi - Changed the service fingerprint format slightly for easier processing by scripts. - Applied a large portability patch from Albert Chin-A-Young (china(a)thewrittenword.com). This cleans up a number of things, particularly for IRIX, Tru64, and Solaris. - Applied NmapFE patch from Peter Marschall (peter(a)adpm.de) which "makes sure changes in the relay host and scanned port entry fields are displayed immediately, and also keeps the fields editable after de- and reactivating them." 3.40PVT4: ========= - Limited the size of service fingerprints to roughly 1024 bytes. This was suggested by Niels Heinen (niels(a)heinen.ws), because the previous limit was excessive. The number of fingerprints printed is also now limited to 10. - Fixed a segmentation fault that could occur when ping-scanning large networks. - Fixed service scan to gracefully handle host_timeout occurrences when they happen during a service scan. - Fixed a service_scan bug that would cause an error when hosts send data and then close() during the NULL probe (when we haven't sent anything). - Applied a patch from Solar Designer (solar(a)openwall.com) which corrects some errors in the Russian man page translation and also a couple typos in the regular man page. Then I spell-checked the man page to reduce future instances of foreigners sending in diffs to correct my English :). 3.40PVT3: ========= - Nmap now prints a "service fingerprint" for services that it is unable to match despite returning data. The web submission page it references is not yet available. - Service detection now does RPC grinding on ports it detects to be running RPC. - Fixed a bug that would cause Nmap to quit with an Nsock error when --host_timeout was used (or when -T5 was used, which sets it implicitly). - Fixed a bug that would cause Nmap to fail to print the OS fingerprint in certain cases. Thanks to Ste Jones (root(a)networkpenetration.com) for the problem report. 3.40PVT2: ========= - Nmap now has a simple VERSION detection scheme. The 'match' lines in nmap-service-probes can specify a template version string (referencing subexpression matches from the regex in a perl-like manner) so that the version is determined at the same time as the service. This handles many common services in a highly efficient manner. A more complex form of version detection (that initiates further communication w/the target service) may be necessary eventually to handle services that aren't as forthcoming with version details. - The Nmap port state table now wastes less whitespace due to using a new and stingy NmapOutputTable class. This makes it easier to read, and also leaves more room for version info and possibly other enhancements. - Added 's' option to match lines in nmap-service-probes. Just as with the perl 's' option, this one causes '.' in the regular expression to match any character INCLUDING newline. - The WinPcap header timestamp is no longer used on Windows as it sometimes can be a couple seconds different than gettimeofday() (which is really _ftime() on Windows) for some reason. Thanks to Scott Egbert (scott.egbert(a)citigroup.com) for the report. - Applied a patch by Matt Selsky (selsky(a)columbia.edu) which fixes configure.in in such a way that the annoying header file "present but cannot be compiled" warning for Solaris. - Applied another patch from Matt that (we hope) fixes the "present but cannot be compiled" warning -- this time for Mac OS X. - Port table header names are now capitalized ("SERVICE", "PORT", etc) 3.40PVT1: ========= - Initial implementation of service detection. Nmap will now probe ports to determine what is listening, rather than guessing based on the nmap-services table lookup. This can be very useful for services on unidentified ports and for UDP services where it is not always clear (without these probes) whether the port is really open or just firewalled. It is also handy for when services are run on the well-known-port of another protocol -- this is happening more and more as users try to circumvent increasingly strict firewall policies. - Nmap now uses the excellent libpcre (Perl Compatible Regular Expressions) library from http://www.pcre.org/ . Many systems already have this, otherwise Nmap will use the copy it now includes. If your libpcre is hidden away in some nonstandard place, give ./configure the new --with-libpcre=DIR directive. - Nmap now uses the C++ Standard Template Library (STL). This makes programming easier, but if it causes major portability or bloat problems, I'll reluctantly remove it. - Applied a patch from Javier Kohen (jkohen(a)coresecurity.com) which normalizes the names of many Microsoft entries in the nmap-os-fingerprints file. - Applied a patch by Florin Andrei (florin(a)sgi.com) to the Nmap RPM spec file. This uses the 'Epoch' flag to prevent the Redhat Network tool from marking my RPMs as "obsolete" and "upgrading" to earlier Redhat-built versions. A compilation flag problem is also fixed.
2003-09-20 16:15:27 +02:00
share/nmap/nmap-service-probes
Update nmap to 3.00. Changes: * Added protocol scan (-sO), which determines what IP protocols (TCP, IGMP, GRE, UDP, ICMP, etc) are supported by a given host. This uses a clever technique designed and implemented by Gerhard Rieger . * Nmap now recognizes more than 700 operating system versions and network devices (printers, webcams, routers, etc) thanks to thousands of contributions from the user community! Many operating systems were even recognized by Nmap prior to their official release. Nmap3 also recognizes 2148 port assignments, 451 SunRPC services, and 144 IP protocols. * Added Idlescan (-sI), which bounces the scan off a "zombie" machine. This can be used to bypass certain (poorly configured) firewalls and packet filters. In addition, this is the most stealthy Nmap scan mode, as no packets are sent to the target from your true IP address. * The base Nmap package now builds and functions under Windows! It is distributed in three forms: build-it-yourself source code, a simple command-line package, or along with a nice GUI interface (NmapWin) and a fancy installer. This is due to the hard work of Ryan Permeh (from eEye), Andy Lutomirski, and Jens Vogt. * Mac OS X is now supported, as well as the latest versions of Linux, OpenBSD, Solaris, FreeBSD, and most other UNIX platforms. Nmap has also been ported to several handheld devices -- see the Related Projects page for further information. * XML output (-oX) is now available for smooth interoperability between Nmap and other tools. * Added ICMP Timestamp and Netmask ping types (-PP and -PM). These (especially timestamp) can be useful against some hosts that do not respond to normal ping (-PI) packets. Nmap still allows TCP "ping" as well. * Nmap can now detect the uptime of many hosts when the OS Scan option (-O) is used. * Several new tests have been added to make OS detection more accurate and provide more granular version information. * Removed 128.210.*.* addresses from Nmap man page examples due to complaints from Purdue security staff. * The --data_length option was added, allowing for longer probe packets. Among other uses, this defeats certain simplistic IDS signatures. * You can now specify distinct port UDP and TCP port numbers in a single scan command using a command like 'nmap -sSU -p U:53,111,137,T:21-25,80,139,515,6000,8080 target.com'. See the man page for more usage info. * Added mysterious, undocumented --scanflags and --fuzzy options. * Nmap now provides IPID as well as TCP ISN sequence predictability reports if you use -v and -O. * SYN scan is now the default scan type for privileged (root) users. This is usually offers greater performance while reducing network traffic. * Capitalized all references to God in error messages. * Added List scan (-sL) which enumerates targets without scanning them. * The Nmap "random IP" scanning mode is now smart enough to skip many unallocated netblocks. * Tons of more minor features, bugfixes, and portability enhancements.
2002-08-03 14:23:57 +02:00
share/nmap/nmap-services
Updated to version 3.80 Changes: - Nmap now ships with and installs (in the same directory as other data files such as nmap-os-fingerprints) an XSL stylesheet for rendering the XML output as HTML. This stylesheet was written by Benjamin Erb ( see http://www.benjamin-erb.de/nmap/ for examples). It supports tables, version detection, color-coded port states, and more. The XML output has been augmented to include an xml-stylesheet directive pointing to nmap.xsl on the local filesystem. You can point to a different XSL file by providing the filename or URL to the new --stylesheet argument. Omit the xml-stylesheet directive entirely by specifying --no-stylesheet. The XML to HTML conversion can be done with an XSLT processor such as Saxon, Sablot, or Xalan, but modern browsers can do this on the fly -- simply load the XML output file in IE or Firefox. Some features don't currently work with Firefox's on-the-fly rendering. Perhaps some Mozilla wizard can fix that in either the XSL or the browser itself. I hate having things work better in IE :). It is often more convenient to have the stylesheet loaded from a URL rather than the local filesystem, allowing the XML to be rendered on any machine regardless of whether/where the XSL is installed. For privacy reasons (avoid loading of an external URL when you view results), Nmap uses the local filesystem by default. If you would like the latest version of the stylesheet load from the web when rendering, specify --stylesheet http://www.insecure.org/nmap/data/nmap.xsl . - Fixed fragmentation option (-f). One -f now sets sends fragments with just 8 bytes after the IP header, while -ff sends 16 bytes to reduce the number of fragments needed. You can specify your own fragmentation offset (must be a multiple of 8) with the new --mtu flag. Don't also specify -f if you use --mtu. Remember that some systems (such as Linux with connection tracking) will defragment in the kernel anyway -- so test first while sniffing with ethereal. These changes are from a patch by Martin Macok (martin.macok(a)underground.cz). - Nmap now prints the number (and total bytes) of raw IP packets sent and received when it completes, if verbose mode (-v) is enabled. The report looks like: Nmap finished: 256 IP addresses (3 hosts up) scanned in 30.632 seconds Raw packets sent: 7727 (303KB) | Rcvd: 6944 (304KB) - Fixed (I hope) an error which would cause the Windows version of Nmap to abort under some circumstances with the error message "Unexpected error in NSE_TYPE_READ callback. Error code: 10053 (Unknown error)". Problem reported by "Tony Golding" (biz(a)tonygolding.com). - Added new "closed|filtered" state. This is used for Idlescan, since that scan method can't distinguish between those two states. Nmap previously just used "closed", but this is more accurate. - Null, FIN, Maimon, and Xmas scans now mark ports as "open|filtered" instead of "open" when they fail to receive any response from the target port. After all, it could just as easily be filtered as open. This is the same change that was made to UDP scan in 3.70. Also as with UDP scan, adding version detection (-sV) will change the state from open|filtered to open if it confirms that they really are open. - Fixed a bug in ACK scan that could cause Nmap to crash with the message "Unexpected port state: 6" in some cases. Thanks to Glyn Geoghegan (glyng(a)corsaire.com) for reporting the problem. - Change IP protocol scan (-sO) so that a response from the target host in any protocol at all will prove that protocol is open. As before, no response means "open|filtered", an ICMP protocol unreachable means "closed", and most other ICMP error messages mean "filtered". - Patched a Winpcap issue that prevented read timeouts from being honored on Solaris (thus slowing down Nmap substantially). The problem report and patch were sent in by Ben Harris (bjh21(a)cam.ac.uk). - Changed IP protocol scan (-sO) so that it sends valid ICMP, TCP, and UDP headers when scanning protocols 1, 6, and 17, respectively. An empty IP header is still sent for all other protocols. This should prevent the error messages such as "sendto in send_ip_packet: sendto(3, packet, 20, 0, 192.31.33.7, 16) => Operation not permitted" that Linux (and perhaps other systems) would give when they try to interpret the raw packet. This also makes it more likely that these protocols will elicit a response, proving that the protocol is "open". - The windows build now uses header and static library files from Winpcap 3.1Beta4. It also now prints out the DLL version you are using when run with -d. I would recommend upgrading to 3.1Beta4 if you have an older Winpcap installed. - Added an NTP probe and matches to the version detection database (nmap-service-probes) thanks to a submission from Martin Macok (martin.macok@underground.cz). - Applied several Nmap service detection database updates sent in by Martin Macok (martin.macok(a)underground.cz).
2005-02-06 22:56:11 +01:00
share/nmap/nmap.dtd
share/nmap/nmap.xsl
${PLIST.lua}share/nmap/nse_main.lua
${PLIST.lua}share/nmap/nselib/afp.lua
${PLIST.lua}share/nmap/nselib/ajp.lua
${PLIST.lua}share/nmap/nselib/amqp.lua
${PLIST.lua}share/nmap/nselib/anyconnect.lua
${PLIST.lua}share/nmap/nselib/asn1.lua
${PLIST.lua}share/nmap/nselib/base32.lua
${PLIST.lua}share/nmap/nselib/base64.lua
${PLIST.lua}share/nmap/nselib/bin.lua
${PLIST.lua}share/nmap/nselib/bitcoin.lua
${PLIST.lua}share/nmap/nselib/bits.lua
${PLIST.lua}share/nmap/nselib/bittorrent.lua
${PLIST.lua}share/nmap/nselib/bjnp.lua
${PLIST.lua}share/nmap/nselib/brute.lua
${PLIST.lua}share/nmap/nselib/cassandra.lua
${PLIST.lua}share/nmap/nselib/citrixxml.lua
${PLIST.lua}share/nmap/nselib/coap.lua
${PLIST.lua}share/nmap/nselib/comm.lua
${PLIST.lua}share/nmap/nselib/creds.lua
${PLIST.lua}share/nmap/nselib/cvs.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/data/dns-srv-names
${PLIST.lua}share/nmap/nselib/data/drupal-modules.lst
${PLIST.lua}share/nmap/nselib/data/drupal-themes.lst
${PLIST.lua}share/nmap/nselib/data/enterprise_numbers.txt
${PLIST.lua}share/nmap/nselib/data/favicon-db
${PLIST.lua}share/nmap/nselib/data/http-default-accounts-fingerprints.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/data/http-devframework-fingerprints.lua
${PLIST.lua}share/nmap/nselib/data/http-fingerprints.lua
${PLIST.lua}share/nmap/nselib/data/http-folders.txt
${PLIST.lua}share/nmap/nselib/data/http-sql-errors.lst
${PLIST.lua}share/nmap/nselib/data/http-web-files-extensions.lst
${PLIST.lua}share/nmap/nselib/data/idnaMappings.lua
${PLIST.lua}share/nmap/nselib/data/ike-fingerprints.lua
${PLIST.lua}share/nmap/nselib/data/jdwp-class/JDWPExecCmd.class
${PLIST.lua}share/nmap/nselib/data/jdwp-class/JDWPExecCmd.java
${PLIST.lua}share/nmap/nselib/data/jdwp-class/JDWPSystemInfo.class
${PLIST.lua}share/nmap/nselib/data/jdwp-class/JDWPSystemInfo.java
${PLIST.lua}share/nmap/nselib/data/jdwp-class/README.txt
${PLIST.lua}share/nmap/nselib/data/mgroupnames.db
${PLIST.lua}share/nmap/nselib/data/mysql-cis.audit
${PLIST.lua}share/nmap/nselib/data/oracle-default-accounts.lst
${PLIST.lua}share/nmap/nselib/data/oracle-sids
${PLIST.lua}share/nmap/nselib/data/packetdecoders.lua
${PLIST.lua}share/nmap/nselib/data/passwords.lst
${PLIST.lua}share/nmap/nselib/data/pixel.gif
${PLIST.lua}share/nmap/nselib/data/psexec/README
${PLIST.lua}share/nmap/nselib/data/psexec/backdoor.lua
${PLIST.lua}share/nmap/nselib/data/psexec/default.lua
${PLIST.lua}share/nmap/nselib/data/psexec/drives.lua
${PLIST.lua}share/nmap/nselib/data/psexec/examples.lua
${PLIST.lua}share/nmap/nselib/data/psexec/experimental.lua
${PLIST.lua}share/nmap/nselib/data/psexec/network.lua
${PLIST.lua}share/nmap/nselib/data/psexec/nmap_service.c
${PLIST.lua}share/nmap/nselib/data/psexec/nmap_service.vcproj
${PLIST.lua}share/nmap/nselib/data/psexec/pwdump.lua
${PLIST.lua}share/nmap/nselib/data/publickeydb
${PLIST.lua}share/nmap/nselib/data/rtsp-urls.txt
${PLIST.lua}share/nmap/nselib/data/snmpcommunities.lst
${PLIST.lua}share/nmap/nselib/data/ssl-fingerprints
${PLIST.lua}share/nmap/nselib/data/targets-ipv6-wordlist
${PLIST.lua}share/nmap/nselib/data/tftplist.txt
${PLIST.lua}share/nmap/nselib/data/usernames.lst
${PLIST.lua}share/nmap/nselib/data/vhosts-default.lst
${PLIST.lua}share/nmap/nselib/data/vhosts-full.lst
${PLIST.lua}share/nmap/nselib/data/wp-plugins.lst
${PLIST.lua}share/nmap/nselib/data/wp-themes.lst
${PLIST.lua}share/nmap/nselib/datafiles.lua
${PLIST.lua}share/nmap/nselib/datetime.lua
${PLIST.lua}share/nmap/nselib/dhcp.lua
${PLIST.lua}share/nmap/nselib/dhcp6.lua
nmap ndiff zenmap: updated to 7.91 Nmap 7.91 [2020-10-09] o [Zenmap] Fix a crash in the profile editor due to a missing import. o [Nsock][Windows] Demote the IOCP Nsock engine because of some known issues that will take longer to resolve. The previous default "poll" engine will be used instead. o [Nsock][Windows] Fix a crash in service scan due to a previously-unknown error being returned from the IOCP Nsock engine. [Daniel Miller] o [NSE] Fix several places where Lua's os.time was being used to represent dates prior to January 1, 1970, which fails on Windows. Notably, NSE refused to run in UTC+X timezones with the error "time result cannot be represented in this installation" [Clément Notin, nnposter, Daniel Miller] o [NSE] MySQL library was not properly parsing server responses, resulting in script crashes. [nnposter] o Silence the irrelevant warning, "Your ports include 'T:' but you haven't specified any TCP scan type" when running nmap -sUV Nmap 7.90 [2020-10-02] o [Windows] Upgraded Npcap, our Windows packet capturing (and sending) library to the milestone 1.00 release! It's the culmination of 7 years of development with 170 public pre-releases. This includes dozens of performance improvements, bug fixes, and feature enhancements described at https://npcap.org/changelog. o Integrated over 800 service/version detection fingerprints submitted since August 2017. The signature count went up 1.8% to 11,878, including 17 new softmatches. We now detect 1237 protocols from airmedia-audio, banner-ivu, and control-m to insteon-plm, pi-hole-stats, and ums-webviewer. A significant number of submissions remain to be integrated in the next release. o Integrated over 330 of the most-frequently-submitted IPv4 OS fingerprints since August 2017. Added 26 fingerprints, bringing the new total to 5,678. Additions include iOS 12 & 13, macOS Catalina & Mojave, Linux 5.4, FreeBSD 13, and more. o Integrated all 67 of your IPv6 OS fingerprint submissions from August 2017 to September 2020. Added new groups for FreeBSD 12, Linux 5.4, and Windows 10, and consolidated several weak groups to improve classification accuracy. o [NSE] Added 3 NSE scripts, from 2 authors, bringing the total up to 601! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + dicom-brute attempts to brute force the called Application Entity Title of DICOM servers. [Paulino Calderon] + dicom-ping discovers DICOM servers and determines if any Application Entity Title is allowed to connect. [Paulino Calderon] + uptime-agent-info collects system information from an Idera Uptime Infrastructure Monitor agent. [Daniel Miller] o Addressed over 250 code quality issues identified by LGTM.com, improving our code quality score from "C" to "A+" o Released Npcap OEM Edition. For more than 20 years, the Nmap Project has been funded by selling licenses for companies to distribute Nmap with their products, along with commercial support. Hundreds of commercial products now use Nmap for network discovery tasks like port scanning, host discovery, OS detection, service/version detection, and of course the Nmap Scripting Engine (NSE). Until now they have just used standard Nmap, but this new OEM Edition is customized for use within other Windows software. Nmap OEM contains the OEM version of our Npcap driver, which allows for silent installation. It also removes the Zenmap GUI, which cuts the installer size by more than half. And it reports itself as Nmap OEM so customers know it's a properly licensed Nmap. See https://nmap.org/oem for more details. We will be reaching out to all existing licensees with Nmap OEM access credentials, but any licensees who wants it quicker should see https://nmap.org/oem. o Upgraded the Nmap license form a sort of hacked-up version of GPLv2 to a cleaner and better organized version (still based on GPLv2) now called the Nmap Public Source License to avoid confusion. See https://nmap.org/npsl/ for more details and annotated license text. This NPSL project was started in 2006 (community discussion here: https://seclists.org/nmap-dev/2006/q4/126) and then it lost momentum for 7 years until it was restarted in 2013 (https://seclists.org/nmap-dev/2013/q1/399) and then we got distracted by development again. We still have some ideas for improving the NPSL, but it's already much better than the current license, so we're applying NPSL Version 0.92 to the code now and can make improvements later if needed. This does not change the license of previous Nmap releases. o Removed nmap-update. This program was intended to provide a way to update data files and NSE scripts, but the infrastructure was never fielded. It depended on Subversion version control and would have required maintaining separate versions of NSE scripts for compatibility. o Removed the silent-install command-line option (/S) from the Windows installer. It causes several problems and there were no objections when we proposed removing it in 2016 (https://seclists.org/nmap-dev/2016/q4/168). It will remain in Nmap OEM since its main use was for customers who redistribute Nmap with other software. If anyone else has a strong need for an Nmap silent installer, please contact sales@nmap.com and we'll see what we can do. o 23 new UDP payloads and dozens more default ports for existing payloads developed for Rapid7's InsightVM scan engine. These speed up and ensure detection of open UDP services. [Paul Miseiko, Rapid7] o Added a UDP payload for STUN (Session Traversal Utilities for NAT). [David Fifield] o [NSE] Fixed an off-by-one bug in the stun.lua library that prevented parsing a server response. [David Fifield] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix an assertion failure when unsolicited ARP response is received: nmap: Target.cc:503: void Target::stopTimeOutClock(const timeval*): Assertion `htn.toclock_running == true' failed. o [NSE] New outlib library consolidates functions related to NSE output, both string formatting conventions and structured output. [Daniel Miller] o [NSE] New dicom library implements the DICOM protocol used for storing and transfering medical images. [Paulino Calderon] o Fix a regression in ARP host discovery left over from the move from massping to ultra_scan in Nmap 4.22SOC8 (2007) that sometimes resulted in missing ARP responses from targets near the end of a scan. Accuracy and speed are both improved. [Daniel Miller] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix the "iocp" Nsock engine for Windows to be able to correctly handle PCAP read events. This engine is now the default for Windows, which should greatly improve performance over the previous default, the "poll" engine. [Daniel Miller] o Reduced CPU usage of OS scan by 50% by avoiding string copy operations and removing undocumented fingerprint syntax unused in nmap-os-db ('&' and '+' in expressions). [Daniel Miller] o Allow multiple UDP payloads to be specified for a port in nmap-payloads. If the first payload does not get a response, the remaining payloads are tried round-robin. [Paul Miseiko, Rapid7] o New option --discovery-ignore-rst tells Nmap to ignore TCP RST responses when determining if a target is up. Useful when firewalls are spoofing RST packets. [Tom Sellers, Rapid7] o [Ncat] It is now possible to override the value of TLS SNI via --ssl-servername [Hank Leininger, nnposter] o Fixed parsing of TCP options which would hang (infinite loop) if an option had an explicit length of 0. Affects Nmap 7.80 only. [Daniel Miller, Imed Mnif] o [NSE] Script ssh2-enum-algos would fail if the server initiated the key exchange before completing the protocol version exchange [Scott Ellis, nnposter] o [NSE] Fetching of SSH2 keys might fail because of key exchange confusion [nnposter] o [NSE] Performance of script afp-ls has been dramatically improved [nnposter] o [NSE] Parsing of AFP FPGetFileDirParms and FPEnumerateExt2FPEnumerateExt2 responses was not working correctly [nnposter] o [NSE] Eliminated false positives in script http-shellshock caused by simple reflection of HTTP request data [Anders Kaseorg] o [NSE] SNMP scripts are now enabled on non-standard ports where SNMP has been detected [usd-markus, nnposter] o [NSE] MQTT library was using incorrect position when parsing received responses [tatulea] o [NSE] IPMI library was using incorrect position when parsing received responses [Star Salzman] o [NSE] Scripts ipmi-brute and deluge-rpc-brute were not capturing successfully brute-forced credentials [Star Salzman] o Allow resuming IPv6 scans with --resume. The address parsing was assuming IPv4 addresses, leading to "Unable to parse ip" error. In a related fix, MAC addresses will not be parsed as IP addresses when resuming from XML. [Daniel Miller] o Fix reverse-DNS handling of PTR records that are not lowercase. Nmap was failing to identify reverse-DNS names when the DNS server delivered them like ".IN-ADDR.ARPA". [Lucas Nussbaum, Richard Schütz, Daniel Miller] o [NSE] IKE library was not properly populating the protocol number in aggressive mode requests. [luc-x41] o Added service fingerprinting for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, and Crate.io CrateDB. Updated PostreSQL coverage and added specific detection of recent versions running in Docker. [Tom Sellers] o New XML output "hosthint" tag emitted during host discovery when a target is found to be up. This gives earlier notification than waiting for the hostgroup to finish all scan phases. [Paul Miseiko] o New UDP payloads for GPRS Tunneling Protocol (GTP) on ports 2123, 2152, and 3386. [Guillaume Teissier] o [NSE] SSH scripts now run on several ports likely to be SSH based on empirical data from Shodan.io, as well as the netconf-ssh service. [Lim Shi Min Jonathan, Daniel Miller] o [Zenmap] Stop creating a debugging output file 'tmp.txt' on the desktop in macOS. [Roland Linder] o [Nping] Address build failure under libc++ due to "using namespace std;" in several headers, resulting in conflicting definitions of bind(). Reported by StormBytePP and Rosen Penev. [Daniel Miller] o [Ncat] Fix a fatal error when connecting to a Linux VM socket with verbose output enabled. [Stefano Garzarella] o [Ncat] Proxy credentials can be alternatively passed onto Ncat by setting environment variable NCAT_PROXY_AUTH, which reduces the risk of the credentials getting captured in process logs. [nnposter] o [NSE] Fixed a crash on Windows when processing a GZIP-encoded HTTP body. [Daniel Miller] o Upgrade libpcap to 1.9.1, which addresses several CVE vulnerabilities. o Upgrade libssh2 to 1.9.0, fixing compilation with OpenSSL 1.1.0 API. o Processing of IP address CIDR blocks was not working correctly on ppc64, ppc64le, and s390x architectures. [rfrohl, nnposter] o [Windows] Add support for the new loopback behavior in Npcap 0.9983 and later. This enables Nmap to scan localhost on Windows without needing the Npcap Loopback Adapter to be installed, which was a source of problems for some users. [Daniel Miller] o [NSE] MS SQL library has improved version resolution, from service pack level to individual cumulative updates [nnposter] o [NSE] With increased verbosity, script http-default-accounts now reports matched target fingerprints even if no default credentials were found [nnposter] o [NSE] IPP request object conversion to string was not working correctly [nnposter] o [NSE] IPP response parser was not correctly processing end-of-attributes-tag [nnposter] o [NSE] Script cups-info was failing due to erroneous double-decoding of the IPP printer status [nnposter] o [NSE] Oracle TNS parser was incorrectly unmarshalling DALC byte arrays [nnposter] o [NSE] The password hashing function for Oracle 10g was not working correctly for non-alphanumeric characters [nnposter] o [NSE] Virtual host probing list, vhosts-full.lst, was missing numerous entries present in vhosts-default.lst [nnposter] o [NSE] Script http-grep was not correctly calculating Luhn checksum [Colleen Li, nnposter] o [NSE] Scripts dhcp-discover and broadcast-dhcp-discover now support new argument "mac" to force a specific client MAC address [nnposter] o [NSE] Code improvements in RPC Dump, benefitting NFS-related scripts [nnposter] o [NSE] RPC code was using incorrect port range, which was causing some calls, such as NFS mountd, to fail intermittently [nnposter] o [NSE] XML output from script ssl-cert now includes RSA key modulus and exponent [nnposter] o [NSE] Nmap no longer crashes when SMB scripts, such as smb-ls, call smb.find_files [nnposter] o [NSE] The MongoDB library was causing errors when assembling protocol payloads. [nnposter] o [NSE] The RTSP library was not correctly generating request strings. [nnposter] o [NSE] VNC handshakes were failing with insert position out of bounds error. [nnposter] o [NSE] Function marshall_dom_sid2 in library msrpctypes was not correctly populating ID Authority. [nnposter] o [NSE] Unmarshalling functions in library msrpctypes were attempting arithmetic on a nil argument. [Ivan Ivanov, nnposter] o [NSE] Functions lsa_lookupnames2 and lsa_lookupsids2 in library msrpc were incorrectly referencing function strjoin when called with debug level 2 or higher. [Ivan Ivanov] o [NSE] Added HTTP default account fingerprints for Tomcat Host Manager and Dell iDRAC9. [Clément Notin] o [NSE] A MS-SMB spec non-compliance in Samba was causing protocol negotiation to fail with data string too short error. [Clément Notin, nnposter] o [NSE] A bug in SMB library was causing scripts to fail with bad format argument error. [Ivan Ivanov] o [NSE] The HTTP library no longer crashes when code requests digest authentication but the server does not provide the necessary authentication header. [nnposter] o [NSE] Fixed a bug in http-wordpress-users.nse that could cause extraneous output to be captured as part of a username. [Duarte Silva]
2021-04-16 08:55:33 +02:00
${PLIST.lua}share/nmap/nselib/dicom.lua
${PLIST.lua}share/nmap/nselib/dns.lua
${PLIST.lua}share/nmap/nselib/dnsbl.lua
${PLIST.lua}share/nmap/nselib/dnssd.lua
${PLIST.lua}share/nmap/nselib/drda.lua
${PLIST.lua}share/nmap/nselib/eap.lua
${PLIST.lua}share/nmap/nselib/eigrp.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/formulas.lua
${PLIST.lua}share/nmap/nselib/ftp.lua
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/nselib/geoip.lua
${PLIST.lua}share/nmap/nselib/giop.lua
${PLIST.lua}share/nmap/nselib/gps.lua
${PLIST.lua}share/nmap/nselib/http.lua
${PLIST.lua}share/nmap/nselib/httpspider.lua
${PLIST.lua}share/nmap/nselib/iax2.lua
${PLIST.lua}share/nmap/nselib/idna.lua
${PLIST.lua}share/nmap/nselib/ike.lua
${PLIST.lua}share/nmap/nselib/imap.lua
${PLIST.lua}share/nmap/nselib/informix.lua
${PLIST.lua}share/nmap/nselib/ipOps.lua
${PLIST.lua}share/nmap/nselib/ipmi.lua
${PLIST.lua}share/nmap/nselib/ipp.lua
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/nselib/irc.lua
${PLIST.lua}share/nmap/nselib/iscsi.lua
${PLIST.lua}share/nmap/nselib/isns.lua
${PLIST.lua}share/nmap/nselib/jdwp.lua
${PLIST.lua}share/nmap/nselib/json.lua
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/nselib/knx.lua
${PLIST.lua}share/nmap/nselib/ldap.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/lfs.luadoc
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/nselib/libssh2-utility.lua
${PLIST.lua}share/nmap/nselib/libssh2.luadoc
${PLIST.lua}share/nmap/nselib/listop.lua
${PLIST.lua}share/nmap/nselib/lpeg-utility.lua
${PLIST.lua}share/nmap/nselib/lpeg.luadoc
${PLIST.lua}share/nmap/nselib/ls.lua
${PLIST.lua}share/nmap/nselib/match.lua
${PLIST.lua}share/nmap/nselib/membase.lua
${PLIST.lua}share/nmap/nselib/mobileme.lua
${PLIST.lua}share/nmap/nselib/mongodb.lua
${PLIST.lua}share/nmap/nselib/mqtt.lua
${PLIST.lua}share/nmap/nselib/msrpc.lua
${PLIST.lua}share/nmap/nselib/msrpcperformance.lua
${PLIST.lua}share/nmap/nselib/msrpctypes.lua
${PLIST.lua}share/nmap/nselib/mssql.lua
${PLIST.lua}share/nmap/nselib/multicast.lua
${PLIST.lua}share/nmap/nselib/mysql.lua
${PLIST.lua}share/nmap/nselib/natpmp.lua
${PLIST.lua}share/nmap/nselib/nbd.lua
${PLIST.lua}share/nmap/nselib/ncp.lua
${PLIST.lua}share/nmap/nselib/ndmp.lua
${PLIST.lua}share/nmap/nselib/netbios.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/nmap.luadoc
${PLIST.lua}share/nmap/nselib/nrpc.lua
${PLIST.lua}share/nmap/nselib/nsedebug.lua
${PLIST.lua}share/nmap/nselib/omp2.lua
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/nselib/oops.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/openssl.luadoc
${PLIST.lua}share/nmap/nselib/ospf.lua
nmap ndiff zenmap: updated to 7.91 Nmap 7.91 [2020-10-09] o [Zenmap] Fix a crash in the profile editor due to a missing import. o [Nsock][Windows] Demote the IOCP Nsock engine because of some known issues that will take longer to resolve. The previous default "poll" engine will be used instead. o [Nsock][Windows] Fix a crash in service scan due to a previously-unknown error being returned from the IOCP Nsock engine. [Daniel Miller] o [NSE] Fix several places where Lua's os.time was being used to represent dates prior to January 1, 1970, which fails on Windows. Notably, NSE refused to run in UTC+X timezones with the error "time result cannot be represented in this installation" [Clément Notin, nnposter, Daniel Miller] o [NSE] MySQL library was not properly parsing server responses, resulting in script crashes. [nnposter] o Silence the irrelevant warning, "Your ports include 'T:' but you haven't specified any TCP scan type" when running nmap -sUV Nmap 7.90 [2020-10-02] o [Windows] Upgraded Npcap, our Windows packet capturing (and sending) library to the milestone 1.00 release! It's the culmination of 7 years of development with 170 public pre-releases. This includes dozens of performance improvements, bug fixes, and feature enhancements described at https://npcap.org/changelog. o Integrated over 800 service/version detection fingerprints submitted since August 2017. The signature count went up 1.8% to 11,878, including 17 new softmatches. We now detect 1237 protocols from airmedia-audio, banner-ivu, and control-m to insteon-plm, pi-hole-stats, and ums-webviewer. A significant number of submissions remain to be integrated in the next release. o Integrated over 330 of the most-frequently-submitted IPv4 OS fingerprints since August 2017. Added 26 fingerprints, bringing the new total to 5,678. Additions include iOS 12 & 13, macOS Catalina & Mojave, Linux 5.4, FreeBSD 13, and more. o Integrated all 67 of your IPv6 OS fingerprint submissions from August 2017 to September 2020. Added new groups for FreeBSD 12, Linux 5.4, and Windows 10, and consolidated several weak groups to improve classification accuracy. o [NSE] Added 3 NSE scripts, from 2 authors, bringing the total up to 601! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + dicom-brute attempts to brute force the called Application Entity Title of DICOM servers. [Paulino Calderon] + dicom-ping discovers DICOM servers and determines if any Application Entity Title is allowed to connect. [Paulino Calderon] + uptime-agent-info collects system information from an Idera Uptime Infrastructure Monitor agent. [Daniel Miller] o Addressed over 250 code quality issues identified by LGTM.com, improving our code quality score from "C" to "A+" o Released Npcap OEM Edition. For more than 20 years, the Nmap Project has been funded by selling licenses for companies to distribute Nmap with their products, along with commercial support. Hundreds of commercial products now use Nmap for network discovery tasks like port scanning, host discovery, OS detection, service/version detection, and of course the Nmap Scripting Engine (NSE). Until now they have just used standard Nmap, but this new OEM Edition is customized for use within other Windows software. Nmap OEM contains the OEM version of our Npcap driver, which allows for silent installation. It also removes the Zenmap GUI, which cuts the installer size by more than half. And it reports itself as Nmap OEM so customers know it's a properly licensed Nmap. See https://nmap.org/oem for more details. We will be reaching out to all existing licensees with Nmap OEM access credentials, but any licensees who wants it quicker should see https://nmap.org/oem. o Upgraded the Nmap license form a sort of hacked-up version of GPLv2 to a cleaner and better organized version (still based on GPLv2) now called the Nmap Public Source License to avoid confusion. See https://nmap.org/npsl/ for more details and annotated license text. This NPSL project was started in 2006 (community discussion here: https://seclists.org/nmap-dev/2006/q4/126) and then it lost momentum for 7 years until it was restarted in 2013 (https://seclists.org/nmap-dev/2013/q1/399) and then we got distracted by development again. We still have some ideas for improving the NPSL, but it's already much better than the current license, so we're applying NPSL Version 0.92 to the code now and can make improvements later if needed. This does not change the license of previous Nmap releases. o Removed nmap-update. This program was intended to provide a way to update data files and NSE scripts, but the infrastructure was never fielded. It depended on Subversion version control and would have required maintaining separate versions of NSE scripts for compatibility. o Removed the silent-install command-line option (/S) from the Windows installer. It causes several problems and there were no objections when we proposed removing it in 2016 (https://seclists.org/nmap-dev/2016/q4/168). It will remain in Nmap OEM since its main use was for customers who redistribute Nmap with other software. If anyone else has a strong need for an Nmap silent installer, please contact sales@nmap.com and we'll see what we can do. o 23 new UDP payloads and dozens more default ports for existing payloads developed for Rapid7's InsightVM scan engine. These speed up and ensure detection of open UDP services. [Paul Miseiko, Rapid7] o Added a UDP payload for STUN (Session Traversal Utilities for NAT). [David Fifield] o [NSE] Fixed an off-by-one bug in the stun.lua library that prevented parsing a server response. [David Fifield] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix an assertion failure when unsolicited ARP response is received: nmap: Target.cc:503: void Target::stopTimeOutClock(const timeval*): Assertion `htn.toclock_running == true' failed. o [NSE] New outlib library consolidates functions related to NSE output, both string formatting conventions and structured output. [Daniel Miller] o [NSE] New dicom library implements the DICOM protocol used for storing and transfering medical images. [Paulino Calderon] o Fix a regression in ARP host discovery left over from the move from massping to ultra_scan in Nmap 4.22SOC8 (2007) that sometimes resulted in missing ARP responses from targets near the end of a scan. Accuracy and speed are both improved. [Daniel Miller] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix the "iocp" Nsock engine for Windows to be able to correctly handle PCAP read events. This engine is now the default for Windows, which should greatly improve performance over the previous default, the "poll" engine. [Daniel Miller] o Reduced CPU usage of OS scan by 50% by avoiding string copy operations and removing undocumented fingerprint syntax unused in nmap-os-db ('&' and '+' in expressions). [Daniel Miller] o Allow multiple UDP payloads to be specified for a port in nmap-payloads. If the first payload does not get a response, the remaining payloads are tried round-robin. [Paul Miseiko, Rapid7] o New option --discovery-ignore-rst tells Nmap to ignore TCP RST responses when determining if a target is up. Useful when firewalls are spoofing RST packets. [Tom Sellers, Rapid7] o [Ncat] It is now possible to override the value of TLS SNI via --ssl-servername [Hank Leininger, nnposter] o Fixed parsing of TCP options which would hang (infinite loop) if an option had an explicit length of 0. Affects Nmap 7.80 only. [Daniel Miller, Imed Mnif] o [NSE] Script ssh2-enum-algos would fail if the server initiated the key exchange before completing the protocol version exchange [Scott Ellis, nnposter] o [NSE] Fetching of SSH2 keys might fail because of key exchange confusion [nnposter] o [NSE] Performance of script afp-ls has been dramatically improved [nnposter] o [NSE] Parsing of AFP FPGetFileDirParms and FPEnumerateExt2FPEnumerateExt2 responses was not working correctly [nnposter] o [NSE] Eliminated false positives in script http-shellshock caused by simple reflection of HTTP request data [Anders Kaseorg] o [NSE] SNMP scripts are now enabled on non-standard ports where SNMP has been detected [usd-markus, nnposter] o [NSE] MQTT library was using incorrect position when parsing received responses [tatulea] o [NSE] IPMI library was using incorrect position when parsing received responses [Star Salzman] o [NSE] Scripts ipmi-brute and deluge-rpc-brute were not capturing successfully brute-forced credentials [Star Salzman] o Allow resuming IPv6 scans with --resume. The address parsing was assuming IPv4 addresses, leading to "Unable to parse ip" error. In a related fix, MAC addresses will not be parsed as IP addresses when resuming from XML. [Daniel Miller] o Fix reverse-DNS handling of PTR records that are not lowercase. Nmap was failing to identify reverse-DNS names when the DNS server delivered them like ".IN-ADDR.ARPA". [Lucas Nussbaum, Richard Schütz, Daniel Miller] o [NSE] IKE library was not properly populating the protocol number in aggressive mode requests. [luc-x41] o Added service fingerprinting for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, and Crate.io CrateDB. Updated PostreSQL coverage and added specific detection of recent versions running in Docker. [Tom Sellers] o New XML output "hosthint" tag emitted during host discovery when a target is found to be up. This gives earlier notification than waiting for the hostgroup to finish all scan phases. [Paul Miseiko] o New UDP payloads for GPRS Tunneling Protocol (GTP) on ports 2123, 2152, and 3386. [Guillaume Teissier] o [NSE] SSH scripts now run on several ports likely to be SSH based on empirical data from Shodan.io, as well as the netconf-ssh service. [Lim Shi Min Jonathan, Daniel Miller] o [Zenmap] Stop creating a debugging output file 'tmp.txt' on the desktop in macOS. [Roland Linder] o [Nping] Address build failure under libc++ due to "using namespace std;" in several headers, resulting in conflicting definitions of bind(). Reported by StormBytePP and Rosen Penev. [Daniel Miller] o [Ncat] Fix a fatal error when connecting to a Linux VM socket with verbose output enabled. [Stefano Garzarella] o [Ncat] Proxy credentials can be alternatively passed onto Ncat by setting environment variable NCAT_PROXY_AUTH, which reduces the risk of the credentials getting captured in process logs. [nnposter] o [NSE] Fixed a crash on Windows when processing a GZIP-encoded HTTP body. [Daniel Miller] o Upgrade libpcap to 1.9.1, which addresses several CVE vulnerabilities. o Upgrade libssh2 to 1.9.0, fixing compilation with OpenSSL 1.1.0 API. o Processing of IP address CIDR blocks was not working correctly on ppc64, ppc64le, and s390x architectures. [rfrohl, nnposter] o [Windows] Add support for the new loopback behavior in Npcap 0.9983 and later. This enables Nmap to scan localhost on Windows without needing the Npcap Loopback Adapter to be installed, which was a source of problems for some users. [Daniel Miller] o [NSE] MS SQL library has improved version resolution, from service pack level to individual cumulative updates [nnposter] o [NSE] With increased verbosity, script http-default-accounts now reports matched target fingerprints even if no default credentials were found [nnposter] o [NSE] IPP request object conversion to string was not working correctly [nnposter] o [NSE] IPP response parser was not correctly processing end-of-attributes-tag [nnposter] o [NSE] Script cups-info was failing due to erroneous double-decoding of the IPP printer status [nnposter] o [NSE] Oracle TNS parser was incorrectly unmarshalling DALC byte arrays [nnposter] o [NSE] The password hashing function for Oracle 10g was not working correctly for non-alphanumeric characters [nnposter] o [NSE] Virtual host probing list, vhosts-full.lst, was missing numerous entries present in vhosts-default.lst [nnposter] o [NSE] Script http-grep was not correctly calculating Luhn checksum [Colleen Li, nnposter] o [NSE] Scripts dhcp-discover and broadcast-dhcp-discover now support new argument "mac" to force a specific client MAC address [nnposter] o [NSE] Code improvements in RPC Dump, benefitting NFS-related scripts [nnposter] o [NSE] RPC code was using incorrect port range, which was causing some calls, such as NFS mountd, to fail intermittently [nnposter] o [NSE] XML output from script ssl-cert now includes RSA key modulus and exponent [nnposter] o [NSE] Nmap no longer crashes when SMB scripts, such as smb-ls, call smb.find_files [nnposter] o [NSE] The MongoDB library was causing errors when assembling protocol payloads. [nnposter] o [NSE] The RTSP library was not correctly generating request strings. [nnposter] o [NSE] VNC handshakes were failing with insert position out of bounds error. [nnposter] o [NSE] Function marshall_dom_sid2 in library msrpctypes was not correctly populating ID Authority. [nnposter] o [NSE] Unmarshalling functions in library msrpctypes were attempting arithmetic on a nil argument. [Ivan Ivanov, nnposter] o [NSE] Functions lsa_lookupnames2 and lsa_lookupsids2 in library msrpc were incorrectly referencing function strjoin when called with debug level 2 or higher. [Ivan Ivanov] o [NSE] Added HTTP default account fingerprints for Tomcat Host Manager and Dell iDRAC9. [Clément Notin] o [NSE] A MS-SMB spec non-compliance in Samba was causing protocol negotiation to fail with data string too short error. [Clément Notin, nnposter] o [NSE] A bug in SMB library was causing scripts to fail with bad format argument error. [Ivan Ivanov] o [NSE] The HTTP library no longer crashes when code requests digest authentication but the server does not provide the necessary authentication header. [nnposter] o [NSE] Fixed a bug in http-wordpress-users.nse that could cause extraneous output to be captured as part of a username. [Duarte Silva]
2021-04-16 08:55:33 +02:00
${PLIST.lua}share/nmap/nselib/outlib.lua
${PLIST.lua}share/nmap/nselib/packet.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/pcre.luadoc
${PLIST.lua}share/nmap/nselib/pgsql.lua
${PLIST.lua}share/nmap/nselib/pop3.lua
${PLIST.lua}share/nmap/nselib/pppoe.lua
${PLIST.lua}share/nmap/nselib/proxy.lua
${PLIST.lua}share/nmap/nselib/punycode.lua
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/nselib/rand.lua
${PLIST.lua}share/nmap/nselib/rdp.lua
${PLIST.lua}share/nmap/nselib/re.lua
${PLIST.lua}share/nmap/nselib/redis.lua
${PLIST.lua}share/nmap/nselib/rmi.lua
${PLIST.lua}share/nmap/nselib/rpc.lua
${PLIST.lua}share/nmap/nselib/rpcap.lua
${PLIST.lua}share/nmap/nselib/rsync.lua
${PLIST.lua}share/nmap/nselib/rtsp.lua
${PLIST.lua}share/nmap/nselib/sasl.lua
${PLIST.lua}share/nmap/nselib/shortport.lua
${PLIST.lua}share/nmap/nselib/sip.lua
${PLIST.lua}share/nmap/nselib/slaxml.lua
${PLIST.lua}share/nmap/nselib/smb.lua
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/nselib/smb2.lua
${PLIST.lua}share/nmap/nselib/smbauth.lua
${PLIST.lua}share/nmap/nselib/smtp.lua
${PLIST.lua}share/nmap/nselib/snmp.lua
${PLIST.lua}share/nmap/nselib/socks.lua
${PLIST.lua}share/nmap/nselib/srvloc.lua
${PLIST.lua}share/nmap/nselib/ssh1.lua
${PLIST.lua}share/nmap/nselib/ssh2.lua
${PLIST.lua}share/nmap/nselib/sslcert.lua
${PLIST.lua}share/nmap/nselib/sslv2.lua
${PLIST.lua}share/nmap/nselib/stdnse.lua
${PLIST.lua}share/nmap/nselib/strbuf.lua
${PLIST.lua}share/nmap/nselib/strict.lua
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/nselib/stringaux.lua
${PLIST.lua}share/nmap/nselib/stun.lua
${PLIST.lua}share/nmap/nselib/tab.lua
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/nselib/tableaux.lua
${PLIST.lua}share/nmap/nselib/target.lua
${PLIST.lua}share/nmap/nselib/tftp.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/tls.lua
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/nselib/tn3270.lua
${PLIST.lua}share/nmap/nselib/tns.lua
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/nselib/unicode.lua
${PLIST.lua}share/nmap/nselib/unittest.lua
${PLIST.lua}share/nmap/nselib/unpwdb.lua
${PLIST.lua}share/nmap/nselib/upnp.lua
${PLIST.lua}share/nmap/nselib/url.lua
${PLIST.lua}share/nmap/nselib/versant.lua
${PLIST.lua}share/nmap/nselib/vnc.lua
${PLIST.lua}share/nmap/nselib/vulns.lua
${PLIST.lua}share/nmap/nselib/vuzedht.lua
${PLIST.lua}share/nmap/nselib/wsdd.lua
${PLIST.lua}share/nmap/nselib/xdmcp.lua
${PLIST.lua}share/nmap/nselib/xmpp.lua
${PLIST.lua}share/nmap/nselib/zlib.luadoc
${PLIST.lua}share/nmap/scripts/acarsd-info.nse
${PLIST.lua}share/nmap/scripts/address-info.nse
${PLIST.lua}share/nmap/scripts/afp-brute.nse
${PLIST.lua}share/nmap/scripts/afp-ls.nse
${PLIST.lua}share/nmap/scripts/afp-path-vuln.nse
${PLIST.lua}share/nmap/scripts/afp-serverinfo.nse
${PLIST.lua}share/nmap/scripts/afp-showmount.nse
${PLIST.lua}share/nmap/scripts/ajp-auth.nse
${PLIST.lua}share/nmap/scripts/ajp-brute.nse
${PLIST.lua}share/nmap/scripts/ajp-headers.nse
${PLIST.lua}share/nmap/scripts/ajp-methods.nse
${PLIST.lua}share/nmap/scripts/ajp-request.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/allseeingeye-info.nse
${PLIST.lua}share/nmap/scripts/amqp-info.nse
${PLIST.lua}share/nmap/scripts/asn-query.nse
${PLIST.lua}share/nmap/scripts/auth-owners.nse
${PLIST.lua}share/nmap/scripts/auth-spoof.nse
${PLIST.lua}share/nmap/scripts/backorifice-brute.nse
${PLIST.lua}share/nmap/scripts/backorifice-info.nse
${PLIST.lua}share/nmap/scripts/bacnet-info.nse
${PLIST.lua}share/nmap/scripts/banner.nse
${PLIST.lua}share/nmap/scripts/bitcoin-getaddr.nse
${PLIST.lua}share/nmap/scripts/bitcoin-info.nse
${PLIST.lua}share/nmap/scripts/bitcoinrpc-info.nse
${PLIST.lua}share/nmap/scripts/bittorrent-discovery.nse
${PLIST.lua}share/nmap/scripts/bjnp-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-ataoe-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-avahi-dos.nse
${PLIST.lua}share/nmap/scripts/broadcast-bjnp-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-db2-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-dhcp-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-dhcp6-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-dns-service-discovery.nse
${PLIST.lua}share/nmap/scripts/broadcast-dropbox-listener.nse
${PLIST.lua}share/nmap/scripts/broadcast-eigrp-discovery.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/broadcast-hid-discoveryd.nse
${PLIST.lua}share/nmap/scripts/broadcast-igmp-discovery.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/broadcast-jenkins-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-listener.nse
${PLIST.lua}share/nmap/scripts/broadcast-ms-sql-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-netbios-master-browser.nse
${PLIST.lua}share/nmap/scripts/broadcast-networker-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-novell-locate.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/broadcast-ospf2-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-pc-anywhere.nse
${PLIST.lua}share/nmap/scripts/broadcast-pc-duo.nse
${PLIST.lua}share/nmap/scripts/broadcast-pim-discovery.nse
${PLIST.lua}share/nmap/scripts/broadcast-ping.nse
${PLIST.lua}share/nmap/scripts/broadcast-pppoe-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-rip-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-ripng-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-sonicwall-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-sybase-asa-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-tellstick-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-upnp-info.nse
${PLIST.lua}share/nmap/scripts/broadcast-versant-locate.nse
${PLIST.lua}share/nmap/scripts/broadcast-wake-on-lan.nse
${PLIST.lua}share/nmap/scripts/broadcast-wpad-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-wsdd-discover.nse
${PLIST.lua}share/nmap/scripts/broadcast-xdmcp-discover.nse
${PLIST.lua}share/nmap/scripts/cassandra-brute.nse
${PLIST.lua}share/nmap/scripts/cassandra-info.nse
${PLIST.lua}share/nmap/scripts/cccam-version.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/cics-enum.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/cics-info.nse
${PLIST.lua}share/nmap/scripts/cics-user-brute.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/cics-user-enum.nse
${PLIST.lua}share/nmap/scripts/citrix-brute-xml.nse
${PLIST.lua}share/nmap/scripts/citrix-enum-apps-xml.nse
${PLIST.lua}share/nmap/scripts/citrix-enum-apps.nse
${PLIST.lua}share/nmap/scripts/citrix-enum-servers-xml.nse
${PLIST.lua}share/nmap/scripts/citrix-enum-servers.nse
${PLIST.lua}share/nmap/scripts/clamav-exec.nse
${PLIST.lua}share/nmap/scripts/clock-skew.nse
${PLIST.lua}share/nmap/scripts/coap-resources.nse
${PLIST.lua}share/nmap/scripts/couchdb-databases.nse
${PLIST.lua}share/nmap/scripts/couchdb-stats.nse
${PLIST.lua}share/nmap/scripts/creds-summary.nse
${PLIST.lua}share/nmap/scripts/cups-info.nse
${PLIST.lua}share/nmap/scripts/cups-queue-info.nse
${PLIST.lua}share/nmap/scripts/cvs-brute-repository.nse
${PLIST.lua}share/nmap/scripts/cvs-brute.nse
${PLIST.lua}share/nmap/scripts/daap-get-library.nse
${PLIST.lua}share/nmap/scripts/daytime.nse
${PLIST.lua}share/nmap/scripts/db2-das-info.nse
${PLIST.lua}share/nmap/scripts/deluge-rpc-brute.nse
${PLIST.lua}share/nmap/scripts/dhcp-discover.nse
nmap ndiff zenmap: updated to 7.91 Nmap 7.91 [2020-10-09] o [Zenmap] Fix a crash in the profile editor due to a missing import. o [Nsock][Windows] Demote the IOCP Nsock engine because of some known issues that will take longer to resolve. The previous default "poll" engine will be used instead. o [Nsock][Windows] Fix a crash in service scan due to a previously-unknown error being returned from the IOCP Nsock engine. [Daniel Miller] o [NSE] Fix several places where Lua's os.time was being used to represent dates prior to January 1, 1970, which fails on Windows. Notably, NSE refused to run in UTC+X timezones with the error "time result cannot be represented in this installation" [Clément Notin, nnposter, Daniel Miller] o [NSE] MySQL library was not properly parsing server responses, resulting in script crashes. [nnposter] o Silence the irrelevant warning, "Your ports include 'T:' but you haven't specified any TCP scan type" when running nmap -sUV Nmap 7.90 [2020-10-02] o [Windows] Upgraded Npcap, our Windows packet capturing (and sending) library to the milestone 1.00 release! It's the culmination of 7 years of development with 170 public pre-releases. This includes dozens of performance improvements, bug fixes, and feature enhancements described at https://npcap.org/changelog. o Integrated over 800 service/version detection fingerprints submitted since August 2017. The signature count went up 1.8% to 11,878, including 17 new softmatches. We now detect 1237 protocols from airmedia-audio, banner-ivu, and control-m to insteon-plm, pi-hole-stats, and ums-webviewer. A significant number of submissions remain to be integrated in the next release. o Integrated over 330 of the most-frequently-submitted IPv4 OS fingerprints since August 2017. Added 26 fingerprints, bringing the new total to 5,678. Additions include iOS 12 & 13, macOS Catalina & Mojave, Linux 5.4, FreeBSD 13, and more. o Integrated all 67 of your IPv6 OS fingerprint submissions from August 2017 to September 2020. Added new groups for FreeBSD 12, Linux 5.4, and Windows 10, and consolidated several weak groups to improve classification accuracy. o [NSE] Added 3 NSE scripts, from 2 authors, bringing the total up to 601! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + dicom-brute attempts to brute force the called Application Entity Title of DICOM servers. [Paulino Calderon] + dicom-ping discovers DICOM servers and determines if any Application Entity Title is allowed to connect. [Paulino Calderon] + uptime-agent-info collects system information from an Idera Uptime Infrastructure Monitor agent. [Daniel Miller] o Addressed over 250 code quality issues identified by LGTM.com, improving our code quality score from "C" to "A+" o Released Npcap OEM Edition. For more than 20 years, the Nmap Project has been funded by selling licenses for companies to distribute Nmap with their products, along with commercial support. Hundreds of commercial products now use Nmap for network discovery tasks like port scanning, host discovery, OS detection, service/version detection, and of course the Nmap Scripting Engine (NSE). Until now they have just used standard Nmap, but this new OEM Edition is customized for use within other Windows software. Nmap OEM contains the OEM version of our Npcap driver, which allows for silent installation. It also removes the Zenmap GUI, which cuts the installer size by more than half. And it reports itself as Nmap OEM so customers know it's a properly licensed Nmap. See https://nmap.org/oem for more details. We will be reaching out to all existing licensees with Nmap OEM access credentials, but any licensees who wants it quicker should see https://nmap.org/oem. o Upgraded the Nmap license form a sort of hacked-up version of GPLv2 to a cleaner and better organized version (still based on GPLv2) now called the Nmap Public Source License to avoid confusion. See https://nmap.org/npsl/ for more details and annotated license text. This NPSL project was started in 2006 (community discussion here: https://seclists.org/nmap-dev/2006/q4/126) and then it lost momentum for 7 years until it was restarted in 2013 (https://seclists.org/nmap-dev/2013/q1/399) and then we got distracted by development again. We still have some ideas for improving the NPSL, but it's already much better than the current license, so we're applying NPSL Version 0.92 to the code now and can make improvements later if needed. This does not change the license of previous Nmap releases. o Removed nmap-update. This program was intended to provide a way to update data files and NSE scripts, but the infrastructure was never fielded. It depended on Subversion version control and would have required maintaining separate versions of NSE scripts for compatibility. o Removed the silent-install command-line option (/S) from the Windows installer. It causes several problems and there were no objections when we proposed removing it in 2016 (https://seclists.org/nmap-dev/2016/q4/168). It will remain in Nmap OEM since its main use was for customers who redistribute Nmap with other software. If anyone else has a strong need for an Nmap silent installer, please contact sales@nmap.com and we'll see what we can do. o 23 new UDP payloads and dozens more default ports for existing payloads developed for Rapid7's InsightVM scan engine. These speed up and ensure detection of open UDP services. [Paul Miseiko, Rapid7] o Added a UDP payload for STUN (Session Traversal Utilities for NAT). [David Fifield] o [NSE] Fixed an off-by-one bug in the stun.lua library that prevented parsing a server response. [David Fifield] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix an assertion failure when unsolicited ARP response is received: nmap: Target.cc:503: void Target::stopTimeOutClock(const timeval*): Assertion `htn.toclock_running == true' failed. o [NSE] New outlib library consolidates functions related to NSE output, both string formatting conventions and structured output. [Daniel Miller] o [NSE] New dicom library implements the DICOM protocol used for storing and transfering medical images. [Paulino Calderon] o Fix a regression in ARP host discovery left over from the move from massping to ultra_scan in Nmap 4.22SOC8 (2007) that sometimes resulted in missing ARP responses from targets near the end of a scan. Accuracy and speed are both improved. [Daniel Miller] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix the "iocp" Nsock engine for Windows to be able to correctly handle PCAP read events. This engine is now the default for Windows, which should greatly improve performance over the previous default, the "poll" engine. [Daniel Miller] o Reduced CPU usage of OS scan by 50% by avoiding string copy operations and removing undocumented fingerprint syntax unused in nmap-os-db ('&' and '+' in expressions). [Daniel Miller] o Allow multiple UDP payloads to be specified for a port in nmap-payloads. If the first payload does not get a response, the remaining payloads are tried round-robin. [Paul Miseiko, Rapid7] o New option --discovery-ignore-rst tells Nmap to ignore TCP RST responses when determining if a target is up. Useful when firewalls are spoofing RST packets. [Tom Sellers, Rapid7] o [Ncat] It is now possible to override the value of TLS SNI via --ssl-servername [Hank Leininger, nnposter] o Fixed parsing of TCP options which would hang (infinite loop) if an option had an explicit length of 0. Affects Nmap 7.80 only. [Daniel Miller, Imed Mnif] o [NSE] Script ssh2-enum-algos would fail if the server initiated the key exchange before completing the protocol version exchange [Scott Ellis, nnposter] o [NSE] Fetching of SSH2 keys might fail because of key exchange confusion [nnposter] o [NSE] Performance of script afp-ls has been dramatically improved [nnposter] o [NSE] Parsing of AFP FPGetFileDirParms and FPEnumerateExt2FPEnumerateExt2 responses was not working correctly [nnposter] o [NSE] Eliminated false positives in script http-shellshock caused by simple reflection of HTTP request data [Anders Kaseorg] o [NSE] SNMP scripts are now enabled on non-standard ports where SNMP has been detected [usd-markus, nnposter] o [NSE] MQTT library was using incorrect position when parsing received responses [tatulea] o [NSE] IPMI library was using incorrect position when parsing received responses [Star Salzman] o [NSE] Scripts ipmi-brute and deluge-rpc-brute were not capturing successfully brute-forced credentials [Star Salzman] o Allow resuming IPv6 scans with --resume. The address parsing was assuming IPv4 addresses, leading to "Unable to parse ip" error. In a related fix, MAC addresses will not be parsed as IP addresses when resuming from XML. [Daniel Miller] o Fix reverse-DNS handling of PTR records that are not lowercase. Nmap was failing to identify reverse-DNS names when the DNS server delivered them like ".IN-ADDR.ARPA". [Lucas Nussbaum, Richard Schütz, Daniel Miller] o [NSE] IKE library was not properly populating the protocol number in aggressive mode requests. [luc-x41] o Added service fingerprinting for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, and Crate.io CrateDB. Updated PostreSQL coverage and added specific detection of recent versions running in Docker. [Tom Sellers] o New XML output "hosthint" tag emitted during host discovery when a target is found to be up. This gives earlier notification than waiting for the hostgroup to finish all scan phases. [Paul Miseiko] o New UDP payloads for GPRS Tunneling Protocol (GTP) on ports 2123, 2152, and 3386. [Guillaume Teissier] o [NSE] SSH scripts now run on several ports likely to be SSH based on empirical data from Shodan.io, as well as the netconf-ssh service. [Lim Shi Min Jonathan, Daniel Miller] o [Zenmap] Stop creating a debugging output file 'tmp.txt' on the desktop in macOS. [Roland Linder] o [Nping] Address build failure under libc++ due to "using namespace std;" in several headers, resulting in conflicting definitions of bind(). Reported by StormBytePP and Rosen Penev. [Daniel Miller] o [Ncat] Fix a fatal error when connecting to a Linux VM socket with verbose output enabled. [Stefano Garzarella] o [Ncat] Proxy credentials can be alternatively passed onto Ncat by setting environment variable NCAT_PROXY_AUTH, which reduces the risk of the credentials getting captured in process logs. [nnposter] o [NSE] Fixed a crash on Windows when processing a GZIP-encoded HTTP body. [Daniel Miller] o Upgrade libpcap to 1.9.1, which addresses several CVE vulnerabilities. o Upgrade libssh2 to 1.9.0, fixing compilation with OpenSSL 1.1.0 API. o Processing of IP address CIDR blocks was not working correctly on ppc64, ppc64le, and s390x architectures. [rfrohl, nnposter] o [Windows] Add support for the new loopback behavior in Npcap 0.9983 and later. This enables Nmap to scan localhost on Windows without needing the Npcap Loopback Adapter to be installed, which was a source of problems for some users. [Daniel Miller] o [NSE] MS SQL library has improved version resolution, from service pack level to individual cumulative updates [nnposter] o [NSE] With increased verbosity, script http-default-accounts now reports matched target fingerprints even if no default credentials were found [nnposter] o [NSE] IPP request object conversion to string was not working correctly [nnposter] o [NSE] IPP response parser was not correctly processing end-of-attributes-tag [nnposter] o [NSE] Script cups-info was failing due to erroneous double-decoding of the IPP printer status [nnposter] o [NSE] Oracle TNS parser was incorrectly unmarshalling DALC byte arrays [nnposter] o [NSE] The password hashing function for Oracle 10g was not working correctly for non-alphanumeric characters [nnposter] o [NSE] Virtual host probing list, vhosts-full.lst, was missing numerous entries present in vhosts-default.lst [nnposter] o [NSE] Script http-grep was not correctly calculating Luhn checksum [Colleen Li, nnposter] o [NSE] Scripts dhcp-discover and broadcast-dhcp-discover now support new argument "mac" to force a specific client MAC address [nnposter] o [NSE] Code improvements in RPC Dump, benefitting NFS-related scripts [nnposter] o [NSE] RPC code was using incorrect port range, which was causing some calls, such as NFS mountd, to fail intermittently [nnposter] o [NSE] XML output from script ssl-cert now includes RSA key modulus and exponent [nnposter] o [NSE] Nmap no longer crashes when SMB scripts, such as smb-ls, call smb.find_files [nnposter] o [NSE] The MongoDB library was causing errors when assembling protocol payloads. [nnposter] o [NSE] The RTSP library was not correctly generating request strings. [nnposter] o [NSE] VNC handshakes were failing with insert position out of bounds error. [nnposter] o [NSE] Function marshall_dom_sid2 in library msrpctypes was not correctly populating ID Authority. [nnposter] o [NSE] Unmarshalling functions in library msrpctypes were attempting arithmetic on a nil argument. [Ivan Ivanov, nnposter] o [NSE] Functions lsa_lookupnames2 and lsa_lookupsids2 in library msrpc were incorrectly referencing function strjoin when called with debug level 2 or higher. [Ivan Ivanov] o [NSE] Added HTTP default account fingerprints for Tomcat Host Manager and Dell iDRAC9. [Clément Notin] o [NSE] A MS-SMB spec non-compliance in Samba was causing protocol negotiation to fail with data string too short error. [Clément Notin, nnposter] o [NSE] A bug in SMB library was causing scripts to fail with bad format argument error. [Ivan Ivanov] o [NSE] The HTTP library no longer crashes when code requests digest authentication but the server does not provide the necessary authentication header. [nnposter] o [NSE] Fixed a bug in http-wordpress-users.nse that could cause extraneous output to be captured as part of a username. [Duarte Silva]
2021-04-16 08:55:33 +02:00
${PLIST.lua}share/nmap/scripts/dicom-brute.nse
${PLIST.lua}share/nmap/scripts/dicom-ping.nse
${PLIST.lua}share/nmap/scripts/dict-info.nse
${PLIST.lua}share/nmap/scripts/distcc-cve2004-2687.nse
${PLIST.lua}share/nmap/scripts/dns-blacklist.nse
${PLIST.lua}share/nmap/scripts/dns-brute.nse
${PLIST.lua}share/nmap/scripts/dns-cache-snoop.nse
${PLIST.lua}share/nmap/scripts/dns-check-zone.nse
${PLIST.lua}share/nmap/scripts/dns-client-subnet-scan.nse
${PLIST.lua}share/nmap/scripts/dns-fuzz.nse
${PLIST.lua}share/nmap/scripts/dns-ip6-arpa-scan.nse
${PLIST.lua}share/nmap/scripts/dns-nsec-enum.nse
${PLIST.lua}share/nmap/scripts/dns-nsec3-enum.nse
${PLIST.lua}share/nmap/scripts/dns-nsid.nse
${PLIST.lua}share/nmap/scripts/dns-random-srcport.nse
${PLIST.lua}share/nmap/scripts/dns-random-txid.nse
${PLIST.lua}share/nmap/scripts/dns-recursion.nse
${PLIST.lua}share/nmap/scripts/dns-service-discovery.nse
${PLIST.lua}share/nmap/scripts/dns-srv-enum.nse
${PLIST.lua}share/nmap/scripts/dns-update.nse
${PLIST.lua}share/nmap/scripts/dns-zeustracker.nse
${PLIST.lua}share/nmap/scripts/dns-zone-transfer.nse
${PLIST.lua}share/nmap/scripts/docker-version.nse
${PLIST.lua}share/nmap/scripts/domcon-brute.nse
${PLIST.lua}share/nmap/scripts/domcon-cmd.nse
${PLIST.lua}share/nmap/scripts/domino-enum-users.nse
${PLIST.lua}share/nmap/scripts/dpap-brute.nse
${PLIST.lua}share/nmap/scripts/drda-brute.nse
${PLIST.lua}share/nmap/scripts/drda-info.nse
${PLIST.lua}share/nmap/scripts/duplicates.nse
${PLIST.lua}share/nmap/scripts/eap-info.nse
${PLIST.lua}share/nmap/scripts/enip-info.nse
${PLIST.lua}share/nmap/scripts/epmd-info.nse
${PLIST.lua}share/nmap/scripts/eppc-enum-processes.nse
${PLIST.lua}share/nmap/scripts/fcrdns.nse
${PLIST.lua}share/nmap/scripts/finger.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/fingerprint-strings.nse
${PLIST.lua}share/nmap/scripts/firewalk.nse
${PLIST.lua}share/nmap/scripts/firewall-bypass.nse
${PLIST.lua}share/nmap/scripts/flume-master-info.nse
${PLIST.lua}share/nmap/scripts/fox-info.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/freelancer-info.nse
${PLIST.lua}share/nmap/scripts/ftp-anon.nse
${PLIST.lua}share/nmap/scripts/ftp-bounce.nse
${PLIST.lua}share/nmap/scripts/ftp-brute.nse
${PLIST.lua}share/nmap/scripts/ftp-libopie.nse
${PLIST.lua}share/nmap/scripts/ftp-proftpd-backdoor.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/ftp-syst.nse
${PLIST.lua}share/nmap/scripts/ftp-vsftpd-backdoor.nse
${PLIST.lua}share/nmap/scripts/ftp-vuln-cve2010-4221.nse
${PLIST.lua}share/nmap/scripts/ganglia-info.nse
${PLIST.lua}share/nmap/scripts/giop-info.nse
${PLIST.lua}share/nmap/scripts/gkrellm-info.nse
${PLIST.lua}share/nmap/scripts/gopher-ls.nse
${PLIST.lua}share/nmap/scripts/gpsd-info.nse
${PLIST.lua}share/nmap/scripts/hadoop-datanode-info.nse
${PLIST.lua}share/nmap/scripts/hadoop-jobtracker-info.nse
${PLIST.lua}share/nmap/scripts/hadoop-namenode-info.nse
${PLIST.lua}share/nmap/scripts/hadoop-secondary-namenode-info.nse
${PLIST.lua}share/nmap/scripts/hadoop-tasktracker-info.nse
${PLIST.lua}share/nmap/scripts/hbase-master-info.nse
${PLIST.lua}share/nmap/scripts/hbase-region-info.nse
${PLIST.lua}share/nmap/scripts/hddtemp-info.nse
${PLIST.lua}share/nmap/scripts/hnap-info.nse
${PLIST.lua}share/nmap/scripts/hostmap-bfk.nse
${PLIST.lua}share/nmap/scripts/hostmap-crtsh.nse
${PLIST.lua}share/nmap/scripts/hostmap-robtex.nse
${PLIST.lua}share/nmap/scripts/http-adobe-coldfusion-apsa1301.nse
${PLIST.lua}share/nmap/scripts/http-affiliate-id.nse
${PLIST.lua}share/nmap/scripts/http-apache-negotiation.nse
${PLIST.lua}share/nmap/scripts/http-apache-server-status.nse
${PLIST.lua}share/nmap/scripts/http-aspnet-debug.nse
${PLIST.lua}share/nmap/scripts/http-auth-finder.nse
${PLIST.lua}share/nmap/scripts/http-auth.nse
${PLIST.lua}share/nmap/scripts/http-avaya-ipoffice-users.nse
${PLIST.lua}share/nmap/scripts/http-awstatstotals-exec.nse
${PLIST.lua}share/nmap/scripts/http-axis2-dir-traversal.nse
${PLIST.lua}share/nmap/scripts/http-backup-finder.nse
${PLIST.lua}share/nmap/scripts/http-barracuda-dir-traversal.nse
${PLIST.lua}share/nmap/scripts/http-bigip-cookie.nse
${PLIST.lua}share/nmap/scripts/http-brute.nse
${PLIST.lua}share/nmap/scripts/http-cakephp-version.nse
${PLIST.lua}share/nmap/scripts/http-chrono.nse
${PLIST.lua}share/nmap/scripts/http-cisco-anyconnect.nse
${PLIST.lua}share/nmap/scripts/http-coldfusion-subzero.nse
${PLIST.lua}share/nmap/scripts/http-comments-displayer.nse
${PLIST.lua}share/nmap/scripts/http-config-backup.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/http-cookie-flags.nse
${PLIST.lua}share/nmap/scripts/http-cors.nse
${PLIST.lua}share/nmap/scripts/http-cross-domain-policy.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-csrf.nse
${PLIST.lua}share/nmap/scripts/http-date.nse
${PLIST.lua}share/nmap/scripts/http-default-accounts.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-devframework.nse
${PLIST.lua}share/nmap/scripts/http-dlink-backdoor.nse
${PLIST.lua}share/nmap/scripts/http-dombased-xss.nse
${PLIST.lua}share/nmap/scripts/http-domino-enum-passwords.nse
${PLIST.lua}share/nmap/scripts/http-drupal-enum-users.nse
${PLIST.lua}share/nmap/scripts/http-drupal-enum.nse
${PLIST.lua}share/nmap/scripts/http-enum.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-errors.nse
${PLIST.lua}share/nmap/scripts/http-exif-spider.nse
${PLIST.lua}share/nmap/scripts/http-favicon.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-feed.nse
${PLIST.lua}share/nmap/scripts/http-fetch.nse
${PLIST.lua}share/nmap/scripts/http-fileupload-exploiter.nse
${PLIST.lua}share/nmap/scripts/http-form-brute.nse
${PLIST.lua}share/nmap/scripts/http-form-fuzzer.nse
${PLIST.lua}share/nmap/scripts/http-frontpage-login.nse
${PLIST.lua}share/nmap/scripts/http-generator.nse
${PLIST.lua}share/nmap/scripts/http-git.nse
${PLIST.lua}share/nmap/scripts/http-gitweb-projects-enum.nse
${PLIST.lua}share/nmap/scripts/http-google-malware.nse
${PLIST.lua}share/nmap/scripts/http-grep.nse
${PLIST.lua}share/nmap/scripts/http-headers.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/http-hp-ilo-info.nse
${PLIST.lua}share/nmap/scripts/http-huawei-hg5xx-vuln.nse
${PLIST.lua}share/nmap/scripts/http-icloud-findmyiphone.nse
${PLIST.lua}share/nmap/scripts/http-icloud-sendmsg.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-iis-short-name-brute.nse
${PLIST.lua}share/nmap/scripts/http-iis-webdav-vuln.nse
${PLIST.lua}share/nmap/scripts/http-internal-ip-disclosure.nse
${PLIST.lua}share/nmap/scripts/http-joomla-brute.nse
${PLIST.lua}share/nmap/scripts/http-jsonp-detection.nse
${PLIST.lua}share/nmap/scripts/http-litespeed-sourcecode-download.nse
${PLIST.lua}share/nmap/scripts/http-ls.nse
${PLIST.lua}share/nmap/scripts/http-majordomo2-dir-traversal.nse
${PLIST.lua}share/nmap/scripts/http-malware-host.nse
${PLIST.lua}share/nmap/scripts/http-mcmp.nse
${PLIST.lua}share/nmap/scripts/http-method-tamper.nse
${PLIST.lua}share/nmap/scripts/http-methods.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-mobileversion-checker.nse
${PLIST.lua}share/nmap/scripts/http-ntlm-info.nse
${PLIST.lua}share/nmap/scripts/http-open-proxy.nse
${PLIST.lua}share/nmap/scripts/http-open-redirect.nse
${PLIST.lua}share/nmap/scripts/http-passwd.nse
${PLIST.lua}share/nmap/scripts/http-php-version.nse
${PLIST.lua}share/nmap/scripts/http-phpmyadmin-dir-traversal.nse
${PLIST.lua}share/nmap/scripts/http-phpself-xss.nse
${PLIST.lua}share/nmap/scripts/http-proxy-brute.nse
${PLIST.lua}share/nmap/scripts/http-put.nse
${PLIST.lua}share/nmap/scripts/http-qnap-nas-info.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-referer-checker.nse
${PLIST.lua}share/nmap/scripts/http-rfi-spider.nse
${PLIST.lua}share/nmap/scripts/http-robots.txt.nse
${PLIST.lua}share/nmap/scripts/http-robtex-reverse-ip.nse
${PLIST.lua}share/nmap/scripts/http-robtex-shared-ns.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/http-sap-netweaver-leak.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/http-security-headers.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-server-header.nse
${PLIST.lua}share/nmap/scripts/http-shellshock.nse
${PLIST.lua}share/nmap/scripts/http-sitemap-generator.nse
${PLIST.lua}share/nmap/scripts/http-slowloris-check.nse
${PLIST.lua}share/nmap/scripts/http-slowloris.nse
${PLIST.lua}share/nmap/scripts/http-sql-injection.nse
${PLIST.lua}share/nmap/scripts/http-stored-xss.nse
${PLIST.lua}share/nmap/scripts/http-svn-enum.nse
${PLIST.lua}share/nmap/scripts/http-svn-info.nse
${PLIST.lua}share/nmap/scripts/http-title.nse
${PLIST.lua}share/nmap/scripts/http-tplink-dir-traversal.nse
${PLIST.lua}share/nmap/scripts/http-trace.nse
${PLIST.lua}share/nmap/scripts/http-traceroute.nse
${PLIST.lua}share/nmap/scripts/http-trane-info.nse
${PLIST.lua}share/nmap/scripts/http-unsafe-output-escaping.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-useragent-tester.nse
${PLIST.lua}share/nmap/scripts/http-userdir-enum.nse
${PLIST.lua}share/nmap/scripts/http-vhosts.nse
${PLIST.lua}share/nmap/scripts/http-virustotal.nse
${PLIST.lua}share/nmap/scripts/http-vlcstreamer-ls.nse
${PLIST.lua}share/nmap/scripts/http-vmware-path-vuln.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2006-3392.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2009-3960.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2010-0738.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2010-2861.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2011-3192.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2011-3368.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2012-1823.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2013-0156.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2013-6786.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2013-7091.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2014-2126.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2014-2127.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2014-2128.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2014-2129.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2014-3704.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2014-8877.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2015-1427.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2015-1635.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/http-vuln-cve2017-1001000.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2017-5638.nse
${PLIST.lua}share/nmap/scripts/http-vuln-cve2017-5689.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/http-vuln-cve2017-8917.nse
${PLIST.lua}share/nmap/scripts/http-vuln-misfortune-cookie.nse
${PLIST.lua}share/nmap/scripts/http-vuln-wnr1000-creds.nse
${PLIST.lua}share/nmap/scripts/http-waf-detect.nse
${PLIST.lua}share/nmap/scripts/http-waf-fingerprint.nse
${PLIST.lua}share/nmap/scripts/http-webdav-scan.nse
${PLIST.lua}share/nmap/scripts/http-wordpress-brute.nse
${PLIST.lua}share/nmap/scripts/http-wordpress-enum.nse
${PLIST.lua}share/nmap/scripts/http-wordpress-users.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/http-xssed.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/https-redirect.nse
${PLIST.lua}share/nmap/scripts/iax2-brute.nse
${PLIST.lua}share/nmap/scripts/iax2-version.nse
${PLIST.lua}share/nmap/scripts/icap-info.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/iec-identify.nse
${PLIST.lua}share/nmap/scripts/ike-version.nse
${PLIST.lua}share/nmap/scripts/imap-brute.nse
${PLIST.lua}share/nmap/scripts/imap-capabilities.nse
${PLIST.lua}share/nmap/scripts/imap-ntlm-info.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/impress-remote-discover.nse
${PLIST.lua}share/nmap/scripts/informix-brute.nse
${PLIST.lua}share/nmap/scripts/informix-query.nse
${PLIST.lua}share/nmap/scripts/informix-tables.nse
${PLIST.lua}share/nmap/scripts/ip-forwarding.nse
${PLIST.lua}share/nmap/scripts/ip-geolocation-geoplugin.nse
${PLIST.lua}share/nmap/scripts/ip-geolocation-ipinfodb.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/ip-geolocation-map-bing.nse
${PLIST.lua}share/nmap/scripts/ip-geolocation-map-google.nse
${PLIST.lua}share/nmap/scripts/ip-geolocation-map-kml.nse
${PLIST.lua}share/nmap/scripts/ip-geolocation-maxmind.nse
${PLIST.lua}share/nmap/scripts/ip-https-discover.nse
${PLIST.lua}share/nmap/scripts/ipidseq.nse
${PLIST.lua}share/nmap/scripts/ipmi-brute.nse
${PLIST.lua}share/nmap/scripts/ipmi-cipher-zero.nse
${PLIST.lua}share/nmap/scripts/ipmi-version.nse
${PLIST.lua}share/nmap/scripts/ipv6-multicast-mld-list.nse
${PLIST.lua}share/nmap/scripts/ipv6-node-info.nse
${PLIST.lua}share/nmap/scripts/ipv6-ra-flood.nse
${PLIST.lua}share/nmap/scripts/irc-botnet-channels.nse
${PLIST.lua}share/nmap/scripts/irc-brute.nse
${PLIST.lua}share/nmap/scripts/irc-info.nse
${PLIST.lua}share/nmap/scripts/irc-sasl-brute.nse
${PLIST.lua}share/nmap/scripts/irc-unrealircd-backdoor.nse
${PLIST.lua}share/nmap/scripts/iscsi-brute.nse
${PLIST.lua}share/nmap/scripts/iscsi-info.nse
${PLIST.lua}share/nmap/scripts/isns-info.nse
${PLIST.lua}share/nmap/scripts/jdwp-exec.nse
${PLIST.lua}share/nmap/scripts/jdwp-info.nse
${PLIST.lua}share/nmap/scripts/jdwp-inject.nse
${PLIST.lua}share/nmap/scripts/jdwp-version.nse
${PLIST.lua}share/nmap/scripts/knx-gateway-discover.nse
${PLIST.lua}share/nmap/scripts/knx-gateway-info.nse
${PLIST.lua}share/nmap/scripts/krb5-enum-users.nse
${PLIST.lua}share/nmap/scripts/ldap-brute.nse
${PLIST.lua}share/nmap/scripts/ldap-novell-getpass.nse
${PLIST.lua}share/nmap/scripts/ldap-rootdse.nse
${PLIST.lua}share/nmap/scripts/ldap-search.nse
${PLIST.lua}share/nmap/scripts/lexmark-config.nse
${PLIST.lua}share/nmap/scripts/llmnr-resolve.nse
${PLIST.lua}share/nmap/scripts/lltd-discovery.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/lu-enum.nse
${PLIST.lua}share/nmap/scripts/maxdb-info.nse
${PLIST.lua}share/nmap/scripts/mcafee-epo-agent.nse
${PLIST.lua}share/nmap/scripts/membase-brute.nse
${PLIST.lua}share/nmap/scripts/membase-http-info.nse
${PLIST.lua}share/nmap/scripts/memcached-info.nse
${PLIST.lua}share/nmap/scripts/metasploit-info.nse
${PLIST.lua}share/nmap/scripts/metasploit-msgrpc-brute.nse
${PLIST.lua}share/nmap/scripts/metasploit-xmlrpc-brute.nse
${PLIST.lua}share/nmap/scripts/mikrotik-routeros-brute.nse
${PLIST.lua}share/nmap/scripts/mmouse-brute.nse
${PLIST.lua}share/nmap/scripts/mmouse-exec.nse
${PLIST.lua}share/nmap/scripts/modbus-discover.nse
${PLIST.lua}share/nmap/scripts/mongodb-brute.nse
${PLIST.lua}share/nmap/scripts/mongodb-databases.nse
${PLIST.lua}share/nmap/scripts/mongodb-info.nse
${PLIST.lua}share/nmap/scripts/mqtt-subscribe.nse
${PLIST.lua}share/nmap/scripts/mrinfo.nse
${PLIST.lua}share/nmap/scripts/ms-sql-brute.nse
${PLIST.lua}share/nmap/scripts/ms-sql-config.nse
${PLIST.lua}share/nmap/scripts/ms-sql-dac.nse
${PLIST.lua}share/nmap/scripts/ms-sql-dump-hashes.nse
${PLIST.lua}share/nmap/scripts/ms-sql-empty-password.nse
${PLIST.lua}share/nmap/scripts/ms-sql-hasdbaccess.nse
${PLIST.lua}share/nmap/scripts/ms-sql-info.nse
${PLIST.lua}share/nmap/scripts/ms-sql-ntlm-info.nse
${PLIST.lua}share/nmap/scripts/ms-sql-query.nse
${PLIST.lua}share/nmap/scripts/ms-sql-tables.nse
${PLIST.lua}share/nmap/scripts/ms-sql-xp-cmdshell.nse
${PLIST.lua}share/nmap/scripts/msrpc-enum.nse
${PLIST.lua}share/nmap/scripts/mtrace.nse
${PLIST.lua}share/nmap/scripts/murmur-version.nse
${PLIST.lua}share/nmap/scripts/mysql-audit.nse
${PLIST.lua}share/nmap/scripts/mysql-brute.nse
${PLIST.lua}share/nmap/scripts/mysql-databases.nse
${PLIST.lua}share/nmap/scripts/mysql-dump-hashes.nse
${PLIST.lua}share/nmap/scripts/mysql-empty-password.nse
${PLIST.lua}share/nmap/scripts/mysql-enum.nse
${PLIST.lua}share/nmap/scripts/mysql-info.nse
${PLIST.lua}share/nmap/scripts/mysql-query.nse
${PLIST.lua}share/nmap/scripts/mysql-users.nse
${PLIST.lua}share/nmap/scripts/mysql-variables.nse
${PLIST.lua}share/nmap/scripts/mysql-vuln-cve2012-2122.nse
${PLIST.lua}share/nmap/scripts/nat-pmp-info.nse
${PLIST.lua}share/nmap/scripts/nat-pmp-mapport.nse
${PLIST.lua}share/nmap/scripts/nbd-info.nse
nmap: updated to 7.92 Nmap 7.92 [2021-08-08] o [Windows] Upgraded Npcap to version 1.50, the fastest and most stable release yet. Among the many exciting changes listed at https://npcap.org/changelog is support for Windows on ARM, which means Nmap can now run on lightweight Windows tablets like the Surface Pro X. o Updated Nmap's NPSL license to rewrite a poorly-worded clause which many folks interpreted as a "field of endeavor restriction" related to "proprietary software companies". We are retroactively offering Nmap versions 7.90 and 7.91 under this new Version 0.93 of the NPSL so that users and distributors may choose either version of the license. o [Windows] Updated our Windows builds to Visual Studio 2019, Windows 10 SDK, and the UCRT, removing support for Windows Vista and earlier. Npcap is required for packet injection and capture, not WinPcap. o New Nmap option --unique will prevent Nmap from scanning the same IP address twice, which can happen when different names resolve to the same address. [Daniel Miller] o [NSE] Added 3 NSE scripts, from 4 authors, bringing the total up to 604! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + nbns-interfaces queries NetBIOS name service (NBNS) to gather IP addresses of the target's network interfaces [Andrey Zhukov] + openflow-info gathers preferred and supported protocol versions from OpenFlow devices [Jay Smith, Mak Kolybabi] + port-states prints a list of ports that were found in each state, including states that were summarized as "Not shown: X closed ports" [Daniel Miller] o Several changes to UDP payloads to improve accuracy: + Fix an issue with -sU where payload data went out-of-scope before it was used, causing corrupted payloads to be sent. [Mariusz Ziulek] + Nmap's retransmission limits were preventing some UDP payloads from being tried with -sU and -PU. Now, Nmap sends each payload for a particular port at the same time without delay. [Daniel Miller] + New UDP payloads: - TS3INIT1 for UDP 3389 [colcrunch] - DTLS for UDP 3391 (RD Gateway) [Arnim Rupp] o [NSE] TLS 1.3 now supported by most scripts for which it is relevant, such as ssl-enum-ciphers. Some functions like ssl tunnel connections and certificate parsing will require OpenSSL 1.1.1 or later to fully support TLS 1.3. [Daniel Miller] o Changes to Nmap's XML output: + If a host times out, the XML <host> element will have the attribute timedout="true" and the host's timing info (srtt etc.) will still be printed. + The "extrareasons" element now includes a list of port numbers for each "ignored" state. The "All X ports" and "Not shown:" lines in normal output have been changed slightly to provide more detail. [Daniel Miller] o Fix an issue in addrset matching that was causing all targets to be excluded if the --excludefile listed a CIDR range that contains an earlier, smaller CIDR range. [Daniel Miller] o Setting --host-timeout=0 will disable the host timeout, which is set by -T5 to 15 minutes. Earlier versions of Nmap require the user to specify a very long timeout instead. o [NSE] Prevent the ssl-* NSE scripts from probing ports that were excluded from version scan, usually 9100-9107, since JetDirect will print anything sent to these ports. [Daniel Miller] o Nmap no longer produces cryptic message "Failed to convert source address to presentation format" when unable to find useable route to the target. [nnposter] o [Ncat] Use safety-checked versions of FD_* macros to abort early if number of connections exceeds FD_SETSIZE. [Pavel Zhukov] o [Ncat] Connections proxied via SOCKS4/SOCKS5 were intermittently dropping server data sent right after the connection got established, such as port banners. [Sami Pönkänen] o [Ncat] Fixed a bug in proxy connect mode which would close the connection as soon as it was opened in Nmap 7.90 and 7.91. o [NSE] Fixed NSE so it will not consolidate all port script output for targets which share an IP (e.g. HTTP vhosts) under one target. [Daniel Miller] o [Zenmap] Fixed an issue where a failure to execute Nmap would result in a Zenmap crash with "TypeError: coercing to Unicode" exception. o Nmap no longer considers an ICMP Host Unreachable as confirmation that a target is down, in accordance with RFC 1122 which says these errors may be transient. Instead, the probe will be destroyed and other probes used to determine aliveness. [Daniel Miller] o [Ncat] Ncat no longer crashes when used with Unix domain sockets. o [Ncat] Ncat is now again generating certificates with the duration of one year. Due to a bug, recent versions of Ncat were using only one minute. [Tobias Girstmair] o [NSE] URL/percent-encoding is now using uppercase hex digits to align with RFC 3986, section 2.1, and to improve compatibility with some real-world web servers. [nnposter] o [NSE] Script hostmap-crtsh got improved in several ways. The most visible are that certificate SANs are properly split apart and that identities that are syntactically incorrect to be hostnames are now ignored. [Michel Le Bihan, nnposter] o [NSE] Loading of a Nikto database failed if the file was referenced relative to the Nmap directory [nnposter] o [NSE] SMB2 dialect handling has been redesigned. Visible changes include: * Notable improvement in speed of script smb-protocols and others * Some SMB scripts are no longer using a hardcoded dialect, improving target interoperability * Dialect names are aligned with Microsoft, such as 3.0.2, instead of 3.02 [nnposter] o [NSE] Script smb2-vuln-uptime no longer reports false positives when the target does not provide its boot time. [nnposter] o [NSE] Client packets composed by the DHCP library will now contain option 51 (IP address lease time) only when requested. [nnposter] o [NSE] XML decoding in library citrixxml no longer crashes when encountering a character reference with codepoint greater than 255. (These references are now left unmodified.) [nnposter] o [NSE] Script mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base. [nnposter] o [NSE] It is now possible to control whether the SNMP library uses v1 (default) or v2c by setting script argument snmp.version. [nnposter]
2021-08-26 10:24:48 +02:00
${PLIST.lua}share/nmap/scripts/nbns-interfaces.nse
${PLIST.lua}share/nmap/scripts/nbstat.nse
${PLIST.lua}share/nmap/scripts/ncp-enum-users.nse
${PLIST.lua}share/nmap/scripts/ncp-serverinfo.nse
${PLIST.lua}share/nmap/scripts/ndmp-fs-info.nse
${PLIST.lua}share/nmap/scripts/ndmp-version.nse
${PLIST.lua}share/nmap/scripts/nessus-brute.nse
${PLIST.lua}share/nmap/scripts/nessus-xmlrpc-brute.nse
${PLIST.lua}share/nmap/scripts/netbus-auth-bypass.nse
${PLIST.lua}share/nmap/scripts/netbus-brute.nse
${PLIST.lua}share/nmap/scripts/netbus-info.nse
${PLIST.lua}share/nmap/scripts/netbus-version.nse
${PLIST.lua}share/nmap/scripts/nexpose-brute.nse
${PLIST.lua}share/nmap/scripts/nfs-ls.nse
${PLIST.lua}share/nmap/scripts/nfs-showmount.nse
${PLIST.lua}share/nmap/scripts/nfs-statfs.nse
${PLIST.lua}share/nmap/scripts/nje-node-brute.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/nje-pass-brute.nse
${PLIST.lua}share/nmap/scripts/nntp-ntlm-info.nse
${PLIST.lua}share/nmap/scripts/nping-brute.nse
${PLIST.lua}share/nmap/scripts/nrpe-enum.nse
${PLIST.lua}share/nmap/scripts/ntp-info.nse
${PLIST.lua}share/nmap/scripts/ntp-monlist.nse
${PLIST.lua}share/nmap/scripts/omp2-brute.nse
${PLIST.lua}share/nmap/scripts/omp2-enum-targets.nse
${PLIST.lua}share/nmap/scripts/omron-info.nse
nmap: updated to 7.92 Nmap 7.92 [2021-08-08] o [Windows] Upgraded Npcap to version 1.50, the fastest and most stable release yet. Among the many exciting changes listed at https://npcap.org/changelog is support for Windows on ARM, which means Nmap can now run on lightweight Windows tablets like the Surface Pro X. o Updated Nmap's NPSL license to rewrite a poorly-worded clause which many folks interpreted as a "field of endeavor restriction" related to "proprietary software companies". We are retroactively offering Nmap versions 7.90 and 7.91 under this new Version 0.93 of the NPSL so that users and distributors may choose either version of the license. o [Windows] Updated our Windows builds to Visual Studio 2019, Windows 10 SDK, and the UCRT, removing support for Windows Vista and earlier. Npcap is required for packet injection and capture, not WinPcap. o New Nmap option --unique will prevent Nmap from scanning the same IP address twice, which can happen when different names resolve to the same address. [Daniel Miller] o [NSE] Added 3 NSE scripts, from 4 authors, bringing the total up to 604! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + nbns-interfaces queries NetBIOS name service (NBNS) to gather IP addresses of the target's network interfaces [Andrey Zhukov] + openflow-info gathers preferred and supported protocol versions from OpenFlow devices [Jay Smith, Mak Kolybabi] + port-states prints a list of ports that were found in each state, including states that were summarized as "Not shown: X closed ports" [Daniel Miller] o Several changes to UDP payloads to improve accuracy: + Fix an issue with -sU where payload data went out-of-scope before it was used, causing corrupted payloads to be sent. [Mariusz Ziulek] + Nmap's retransmission limits were preventing some UDP payloads from being tried with -sU and -PU. Now, Nmap sends each payload for a particular port at the same time without delay. [Daniel Miller] + New UDP payloads: - TS3INIT1 for UDP 3389 [colcrunch] - DTLS for UDP 3391 (RD Gateway) [Arnim Rupp] o [NSE] TLS 1.3 now supported by most scripts for which it is relevant, such as ssl-enum-ciphers. Some functions like ssl tunnel connections and certificate parsing will require OpenSSL 1.1.1 or later to fully support TLS 1.3. [Daniel Miller] o Changes to Nmap's XML output: + If a host times out, the XML <host> element will have the attribute timedout="true" and the host's timing info (srtt etc.) will still be printed. + The "extrareasons" element now includes a list of port numbers for each "ignored" state. The "All X ports" and "Not shown:" lines in normal output have been changed slightly to provide more detail. [Daniel Miller] o Fix an issue in addrset matching that was causing all targets to be excluded if the --excludefile listed a CIDR range that contains an earlier, smaller CIDR range. [Daniel Miller] o Setting --host-timeout=0 will disable the host timeout, which is set by -T5 to 15 minutes. Earlier versions of Nmap require the user to specify a very long timeout instead. o [NSE] Prevent the ssl-* NSE scripts from probing ports that were excluded from version scan, usually 9100-9107, since JetDirect will print anything sent to these ports. [Daniel Miller] o Nmap no longer produces cryptic message "Failed to convert source address to presentation format" when unable to find useable route to the target. [nnposter] o [Ncat] Use safety-checked versions of FD_* macros to abort early if number of connections exceeds FD_SETSIZE. [Pavel Zhukov] o [Ncat] Connections proxied via SOCKS4/SOCKS5 were intermittently dropping server data sent right after the connection got established, such as port banners. [Sami Pönkänen] o [Ncat] Fixed a bug in proxy connect mode which would close the connection as soon as it was opened in Nmap 7.90 and 7.91. o [NSE] Fixed NSE so it will not consolidate all port script output for targets which share an IP (e.g. HTTP vhosts) under one target. [Daniel Miller] o [Zenmap] Fixed an issue where a failure to execute Nmap would result in a Zenmap crash with "TypeError: coercing to Unicode" exception. o Nmap no longer considers an ICMP Host Unreachable as confirmation that a target is down, in accordance with RFC 1122 which says these errors may be transient. Instead, the probe will be destroyed and other probes used to determine aliveness. [Daniel Miller] o [Ncat] Ncat no longer crashes when used with Unix domain sockets. o [Ncat] Ncat is now again generating certificates with the duration of one year. Due to a bug, recent versions of Ncat were using only one minute. [Tobias Girstmair] o [NSE] URL/percent-encoding is now using uppercase hex digits to align with RFC 3986, section 2.1, and to improve compatibility with some real-world web servers. [nnposter] o [NSE] Script hostmap-crtsh got improved in several ways. The most visible are that certificate SANs are properly split apart and that identities that are syntactically incorrect to be hostnames are now ignored. [Michel Le Bihan, nnposter] o [NSE] Loading of a Nikto database failed if the file was referenced relative to the Nmap directory [nnposter] o [NSE] SMB2 dialect handling has been redesigned. Visible changes include: * Notable improvement in speed of script smb-protocols and others * Some SMB scripts are no longer using a hardcoded dialect, improving target interoperability * Dialect names are aligned with Microsoft, such as 3.0.2, instead of 3.02 [nnposter] o [NSE] Script smb2-vuln-uptime no longer reports false positives when the target does not provide its boot time. [nnposter] o [NSE] Client packets composed by the DHCP library will now contain option 51 (IP address lease time) only when requested. [nnposter] o [NSE] XML decoding in library citrixxml no longer crashes when encountering a character reference with codepoint greater than 255. (These references are now left unmodified.) [nnposter] o [NSE] Script mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base. [nnposter] o [NSE] It is now possible to control whether the SNMP library uses v1 (default) or v2c by setting script argument snmp.version. [nnposter]
2021-08-26 10:24:48 +02:00
${PLIST.lua}share/nmap/scripts/openflow-info.nse
${PLIST.lua}share/nmap/scripts/openlookup-info.nse
${PLIST.lua}share/nmap/scripts/openvas-otp-brute.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/openwebnet-discovery.nse
${PLIST.lua}share/nmap/scripts/oracle-brute-stealth.nse
${PLIST.lua}share/nmap/scripts/oracle-brute.nse
${PLIST.lua}share/nmap/scripts/oracle-enum-users.nse
${PLIST.lua}share/nmap/scripts/oracle-sid-brute.nse
${PLIST.lua}share/nmap/scripts/oracle-tns-version.nse
${PLIST.lua}share/nmap/scripts/ovs-agent-version.nse
${PLIST.lua}share/nmap/scripts/p2p-conficker.nse
${PLIST.lua}share/nmap/scripts/path-mtu.nse
${PLIST.lua}share/nmap/scripts/pcanywhere-brute.nse
${PLIST.lua}share/nmap/scripts/pcworx-info.nse
${PLIST.lua}share/nmap/scripts/pgsql-brute.nse
${PLIST.lua}share/nmap/scripts/pjl-ready-message.nse
${PLIST.lua}share/nmap/scripts/pop3-brute.nse
${PLIST.lua}share/nmap/scripts/pop3-capabilities.nse
${PLIST.lua}share/nmap/scripts/pop3-ntlm-info.nse
nmap: updated to 7.92 Nmap 7.92 [2021-08-08] o [Windows] Upgraded Npcap to version 1.50, the fastest and most stable release yet. Among the many exciting changes listed at https://npcap.org/changelog is support for Windows on ARM, which means Nmap can now run on lightweight Windows tablets like the Surface Pro X. o Updated Nmap's NPSL license to rewrite a poorly-worded clause which many folks interpreted as a "field of endeavor restriction" related to "proprietary software companies". We are retroactively offering Nmap versions 7.90 and 7.91 under this new Version 0.93 of the NPSL so that users and distributors may choose either version of the license. o [Windows] Updated our Windows builds to Visual Studio 2019, Windows 10 SDK, and the UCRT, removing support for Windows Vista and earlier. Npcap is required for packet injection and capture, not WinPcap. o New Nmap option --unique will prevent Nmap from scanning the same IP address twice, which can happen when different names resolve to the same address. [Daniel Miller] o [NSE] Added 3 NSE scripts, from 4 authors, bringing the total up to 604! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + nbns-interfaces queries NetBIOS name service (NBNS) to gather IP addresses of the target's network interfaces [Andrey Zhukov] + openflow-info gathers preferred and supported protocol versions from OpenFlow devices [Jay Smith, Mak Kolybabi] + port-states prints a list of ports that were found in each state, including states that were summarized as "Not shown: X closed ports" [Daniel Miller] o Several changes to UDP payloads to improve accuracy: + Fix an issue with -sU where payload data went out-of-scope before it was used, causing corrupted payloads to be sent. [Mariusz Ziulek] + Nmap's retransmission limits were preventing some UDP payloads from being tried with -sU and -PU. Now, Nmap sends each payload for a particular port at the same time without delay. [Daniel Miller] + New UDP payloads: - TS3INIT1 for UDP 3389 [colcrunch] - DTLS for UDP 3391 (RD Gateway) [Arnim Rupp] o [NSE] TLS 1.3 now supported by most scripts for which it is relevant, such as ssl-enum-ciphers. Some functions like ssl tunnel connections and certificate parsing will require OpenSSL 1.1.1 or later to fully support TLS 1.3. [Daniel Miller] o Changes to Nmap's XML output: + If a host times out, the XML <host> element will have the attribute timedout="true" and the host's timing info (srtt etc.) will still be printed. + The "extrareasons" element now includes a list of port numbers for each "ignored" state. The "All X ports" and "Not shown:" lines in normal output have been changed slightly to provide more detail. [Daniel Miller] o Fix an issue in addrset matching that was causing all targets to be excluded if the --excludefile listed a CIDR range that contains an earlier, smaller CIDR range. [Daniel Miller] o Setting --host-timeout=0 will disable the host timeout, which is set by -T5 to 15 minutes. Earlier versions of Nmap require the user to specify a very long timeout instead. o [NSE] Prevent the ssl-* NSE scripts from probing ports that were excluded from version scan, usually 9100-9107, since JetDirect will print anything sent to these ports. [Daniel Miller] o Nmap no longer produces cryptic message "Failed to convert source address to presentation format" when unable to find useable route to the target. [nnposter] o [Ncat] Use safety-checked versions of FD_* macros to abort early if number of connections exceeds FD_SETSIZE. [Pavel Zhukov] o [Ncat] Connections proxied via SOCKS4/SOCKS5 were intermittently dropping server data sent right after the connection got established, such as port banners. [Sami Pönkänen] o [Ncat] Fixed a bug in proxy connect mode which would close the connection as soon as it was opened in Nmap 7.90 and 7.91. o [NSE] Fixed NSE so it will not consolidate all port script output for targets which share an IP (e.g. HTTP vhosts) under one target. [Daniel Miller] o [Zenmap] Fixed an issue where a failure to execute Nmap would result in a Zenmap crash with "TypeError: coercing to Unicode" exception. o Nmap no longer considers an ICMP Host Unreachable as confirmation that a target is down, in accordance with RFC 1122 which says these errors may be transient. Instead, the probe will be destroyed and other probes used to determine aliveness. [Daniel Miller] o [Ncat] Ncat no longer crashes when used with Unix domain sockets. o [Ncat] Ncat is now again generating certificates with the duration of one year. Due to a bug, recent versions of Ncat were using only one minute. [Tobias Girstmair] o [NSE] URL/percent-encoding is now using uppercase hex digits to align with RFC 3986, section 2.1, and to improve compatibility with some real-world web servers. [nnposter] o [NSE] Script hostmap-crtsh got improved in several ways. The most visible are that certificate SANs are properly split apart and that identities that are syntactically incorrect to be hostnames are now ignored. [Michel Le Bihan, nnposter] o [NSE] Loading of a Nikto database failed if the file was referenced relative to the Nmap directory [nnposter] o [NSE] SMB2 dialect handling has been redesigned. Visible changes include: * Notable improvement in speed of script smb-protocols and others * Some SMB scripts are no longer using a hardcoded dialect, improving target interoperability * Dialect names are aligned with Microsoft, such as 3.0.2, instead of 3.02 [nnposter] o [NSE] Script smb2-vuln-uptime no longer reports false positives when the target does not provide its boot time. [nnposter] o [NSE] Client packets composed by the DHCP library will now contain option 51 (IP address lease time) only when requested. [nnposter] o [NSE] XML decoding in library citrixxml no longer crashes when encountering a character reference with codepoint greater than 255. (These references are now left unmodified.) [nnposter] o [NSE] Script mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base. [nnposter] o [NSE] It is now possible to control whether the SNMP library uses v1 (default) or v2c by setting script argument snmp.version. [nnposter]
2021-08-26 10:24:48 +02:00
${PLIST.lua}share/nmap/scripts/port-states.nse
${PLIST.lua}share/nmap/scripts/pptp-version.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/puppet-naivesigning.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/qconn-exec.nse
${PLIST.lua}share/nmap/scripts/qscan.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/quake1-info.nse
${PLIST.lua}share/nmap/scripts/quake3-info.nse
${PLIST.lua}share/nmap/scripts/quake3-master-getservers.nse
${PLIST.lua}share/nmap/scripts/rdp-enum-encryption.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/rdp-ntlm-info.nse
${PLIST.lua}share/nmap/scripts/rdp-vuln-ms12-020.nse
${PLIST.lua}share/nmap/scripts/realvnc-auth-bypass.nse
${PLIST.lua}share/nmap/scripts/redis-brute.nse
${PLIST.lua}share/nmap/scripts/redis-info.nse
${PLIST.lua}share/nmap/scripts/resolveall.nse
${PLIST.lua}share/nmap/scripts/reverse-index.nse
${PLIST.lua}share/nmap/scripts/rexec-brute.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/rfc868-time.nse
${PLIST.lua}share/nmap/scripts/riak-http-info.nse
${PLIST.lua}share/nmap/scripts/rlogin-brute.nse
${PLIST.lua}share/nmap/scripts/rmi-dumpregistry.nse
${PLIST.lua}share/nmap/scripts/rmi-vuln-classloader.nse
${PLIST.lua}share/nmap/scripts/rpc-grind.nse
${PLIST.lua}share/nmap/scripts/rpcap-brute.nse
${PLIST.lua}share/nmap/scripts/rpcap-info.nse
${PLIST.lua}share/nmap/scripts/rpcinfo.nse
${PLIST.lua}share/nmap/scripts/rsa-vuln-roca.nse
${PLIST.lua}share/nmap/scripts/rsync-brute.nse
${PLIST.lua}share/nmap/scripts/rsync-list-modules.nse
${PLIST.lua}share/nmap/scripts/rtsp-methods.nse
${PLIST.lua}share/nmap/scripts/rtsp-url-brute.nse
${PLIST.lua}share/nmap/scripts/rusers.nse
${PLIST.lua}share/nmap/scripts/s7-info.nse
${PLIST.lua}share/nmap/scripts/samba-vuln-cve-2012-1182.nse
${PLIST.lua}share/nmap/scripts/script.db
${PLIST.lua}share/nmap/scripts/servicetags.nse
${PLIST.lua}share/nmap/scripts/shodan-api.nse
${PLIST.lua}share/nmap/scripts/sip-brute.nse
${PLIST.lua}share/nmap/scripts/sip-call-spoof.nse
${PLIST.lua}share/nmap/scripts/sip-enum-users.nse
${PLIST.lua}share/nmap/scripts/sip-methods.nse
${PLIST.lua}share/nmap/scripts/skypev2-version.nse
${PLIST.lua}share/nmap/scripts/smb-brute.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/smb-double-pulsar-backdoor.nse
${PLIST.lua}share/nmap/scripts/smb-enum-domains.nse
${PLIST.lua}share/nmap/scripts/smb-enum-groups.nse
${PLIST.lua}share/nmap/scripts/smb-enum-processes.nse
${PLIST.lua}share/nmap/scripts/smb-enum-services.nse
${PLIST.lua}share/nmap/scripts/smb-enum-sessions.nse
${PLIST.lua}share/nmap/scripts/smb-enum-shares.nse
${PLIST.lua}share/nmap/scripts/smb-enum-users.nse
${PLIST.lua}share/nmap/scripts/smb-flood.nse
${PLIST.lua}share/nmap/scripts/smb-ls.nse
${PLIST.lua}share/nmap/scripts/smb-mbenum.nse
${PLIST.lua}share/nmap/scripts/smb-os-discovery.nse
${PLIST.lua}share/nmap/scripts/smb-print-text.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/smb-protocols.nse
${PLIST.lua}share/nmap/scripts/smb-psexec.nse
${PLIST.lua}share/nmap/scripts/smb-security-mode.nse
${PLIST.lua}share/nmap/scripts/smb-server-stats.nse
${PLIST.lua}share/nmap/scripts/smb-system-info.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-conficker.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/smb-vuln-cve-2017-7494.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-cve2009-3103.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-ms06-025.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-ms07-029.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-ms08-067.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-ms10-054.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-ms10-061.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/smb-vuln-ms17-010.nse
${PLIST.lua}share/nmap/scripts/smb-vuln-regsvc-dos.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/smb-vuln-webexec.nse
${PLIST.lua}share/nmap/scripts/smb-webexec-exploit.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/smb2-capabilities.nse
${PLIST.lua}share/nmap/scripts/smb2-security-mode.nse
${PLIST.lua}share/nmap/scripts/smb2-time.nse
${PLIST.lua}share/nmap/scripts/smb2-vuln-uptime.nse
${PLIST.lua}share/nmap/scripts/smtp-brute.nse
${PLIST.lua}share/nmap/scripts/smtp-commands.nse
${PLIST.lua}share/nmap/scripts/smtp-enum-users.nse
${PLIST.lua}share/nmap/scripts/smtp-ntlm-info.nse
${PLIST.lua}share/nmap/scripts/smtp-open-relay.nse
${PLIST.lua}share/nmap/scripts/smtp-strangeport.nse
${PLIST.lua}share/nmap/scripts/smtp-vuln-cve2010-4344.nse
${PLIST.lua}share/nmap/scripts/smtp-vuln-cve2011-1720.nse
${PLIST.lua}share/nmap/scripts/smtp-vuln-cve2011-1764.nse
${PLIST.lua}share/nmap/scripts/sniffer-detect.nse
${PLIST.lua}share/nmap/scripts/snmp-brute.nse
${PLIST.lua}share/nmap/scripts/snmp-hh3c-logins.nse
${PLIST.lua}share/nmap/scripts/snmp-info.nse
${PLIST.lua}share/nmap/scripts/snmp-interfaces.nse
${PLIST.lua}share/nmap/scripts/snmp-ios-config.nse
${PLIST.lua}share/nmap/scripts/snmp-netstat.nse
${PLIST.lua}share/nmap/scripts/snmp-processes.nse
${PLIST.lua}share/nmap/scripts/snmp-sysdescr.nse
${PLIST.lua}share/nmap/scripts/snmp-win32-services.nse
${PLIST.lua}share/nmap/scripts/snmp-win32-shares.nse
${PLIST.lua}share/nmap/scripts/snmp-win32-software.nse
${PLIST.lua}share/nmap/scripts/snmp-win32-users.nse
${PLIST.lua}share/nmap/scripts/socks-auth-info.nse
${PLIST.lua}share/nmap/scripts/socks-brute.nse
${PLIST.lua}share/nmap/scripts/socks-open-proxy.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/ssh-auth-methods.nse
${PLIST.lua}share/nmap/scripts/ssh-brute.nse
${PLIST.lua}share/nmap/scripts/ssh-hostkey.nse
Nmap 7.60 o Updated the bundled Npcap from 0.91 to 0.93, fixing several issues with installation and compatibility with the Windows 10 Creators Update. o NSE scripts now have complete SSH support via libssh2, including password brute-forcing and running remote commands, thanks to the combined efforts of three Summer of Code students. o Added 14 NSE scripts from 6 authors, bringing the total up to 579! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + ftp-syst sends SYST and STAT commands to FTP servers to get system version and connection information. + http-vuln-cve2017-8917 checks for an SQL injection vulnerability affecting Joomla! 3.7.x before 3.7.1. + iec-identify probes for the IEC 60870-5-104 SCADA protocol. + openwebnet-discovery retrieves device identifying information and number of connected devices running on openwebnet protocol. + puppet-naivesigning checks for a misconfiguration in the Puppet CA where naive signing is enabled, allowing for any CSR to be automatically signed. + smb-protocols discovers if a server supports dialects NT LM 0.12 (SMBv1), 2.02, 2.10, 3.00, 3.02 and 3.11. This replaces the old smbv2-enabled script. + smb2-capabilities lists the supported capabilities of SMB2/SMB3 servers. + smb2-time determines the current date and boot date of SMB2 servers. + smb2-security-mode determines the message signing configuration of SMB2/SMB3 servers. + smb2-vuln-uptime attempts to discover missing critical patches in Microsoft Windows systems based on the SMB2 server uptime. + ssh-auth-methods lists the authentication methods offered by an SSH server. + ssh-brute performs brute-forcing of SSH password credentials. + ssh-publickey-acceptance checks public or private keys to see if they could be used to log in to a target. A list of known-compromised key pairs is included and checked by default. + ssh-run uses user-provided credentials to run commands on targets via SSH. o Removed smbv2-enabled, which was incompatible with the new SMBv2/3 improvements. It was fully replaced by the smb-protocols script. o Added Datagram TLS (DTLS) support to Ncat in connect (client) mode with --udp --ssl. Also added Application Layer Protocol Negotiation (ALPN) support with the --ssl-alpn option. o Updated the default ciphers list for Ncat and the secure ciphers list for Nsock to use "!aNULL:!eNULL" instead of "!ADH". With the addition of ECDH ciphersuites, anonymous ECDH suites were being allowed. o Fix ndmp-version and ndmp-fs-info when scanning Veritas Backup Exec Agent 15 or 16. o Added wildcard detection to dns-brute. Only hostnames that resolve to unique addresses will be listed. o FTP scripts like ftp-anon and ftp-brute now correctly handle TLS-protected FTP services and use STARTTLS when necessary. o Function url.escape no longer encodes so-called "unreserved" characters, including hyphen, period, underscore, and tilde, as per RFC 3986. o Function http.pipeline_go no longer assumes that persistent connections are supported on HTTP 1.0 target (unless the target explicitly declares otherwise), as per RFC 7230. o The HTTP response object has a new member, version, which contains the HTTP protocol version string returned by the server, e.g. "1.0". o Fix handling of the objectSID Active Directory attribute by ldap.lua. o Fix line endings in the list of Oracle SIDs used by oracle-sid-brute. Carriage Return characters were being sent in the connection packets, likely resulting in failure of the script. o http-useragent-checker now checks for changes in HTTP status (usually 403 Forbidden) in addition to redirects to indicate forbidden User Agents.
2017-08-03 15:52:00 +02:00
${PLIST.lua}share/nmap/scripts/ssh-publickey-acceptance.nse
${PLIST.lua}share/nmap/scripts/ssh-run.nse
${PLIST.lua}share/nmap/scripts/ssh2-enum-algos.nse
${PLIST.lua}share/nmap/scripts/sshv1.nse
${PLIST.lua}share/nmap/scripts/ssl-ccs-injection.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/ssl-cert-intaddr.nse
${PLIST.lua}share/nmap/scripts/ssl-cert.nse
${PLIST.lua}share/nmap/scripts/ssl-date.nse
${PLIST.lua}share/nmap/scripts/ssl-dh-params.nse
${PLIST.lua}share/nmap/scripts/ssl-enum-ciphers.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/ssl-heartbleed.nse
${PLIST.lua}share/nmap/scripts/ssl-known-key.nse
${PLIST.lua}share/nmap/scripts/ssl-poodle.nse
${PLIST.lua}share/nmap/scripts/sslv2-drown.nse
${PLIST.lua}share/nmap/scripts/sslv2.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/sstp-discover.nse
${PLIST.lua}share/nmap/scripts/stun-info.nse
${PLIST.lua}share/nmap/scripts/stun-version.nse
${PLIST.lua}share/nmap/scripts/stuxnet-detect.nse
${PLIST.lua}share/nmap/scripts/supermicro-ipmi-conf.nse
${PLIST.lua}share/nmap/scripts/svn-brute.nse
${PLIST.lua}share/nmap/scripts/targets-asn.nse
${PLIST.lua}share/nmap/scripts/targets-ipv6-map4to6.nse
${PLIST.lua}share/nmap/scripts/targets-ipv6-multicast-echo.nse
${PLIST.lua}share/nmap/scripts/targets-ipv6-multicast-invalid-dst.nse
${PLIST.lua}share/nmap/scripts/targets-ipv6-multicast-mld.nse
${PLIST.lua}share/nmap/scripts/targets-ipv6-multicast-slaac.nse
${PLIST.lua}share/nmap/scripts/targets-ipv6-wordlist.nse
${PLIST.lua}share/nmap/scripts/targets-sniffer.nse
${PLIST.lua}share/nmap/scripts/targets-traceroute.nse
${PLIST.lua}share/nmap/scripts/targets-xml.nse
${PLIST.lua}share/nmap/scripts/teamspeak2-version.nse
${PLIST.lua}share/nmap/scripts/telnet-brute.nse
${PLIST.lua}share/nmap/scripts/telnet-encryption.nse
${PLIST.lua}share/nmap/scripts/telnet-ntlm-info.nse
${PLIST.lua}share/nmap/scripts/tftp-enum.nse
${PLIST.lua}share/nmap/scripts/tls-alpn.nse
${PLIST.lua}share/nmap/scripts/tls-nextprotoneg.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/tls-ticketbleed.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/tn3270-screen.nse
${PLIST.lua}share/nmap/scripts/tor-consensus-checker.nse
${PLIST.lua}share/nmap/scripts/traceroute-geolocation.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/tso-brute.nse
${PLIST.lua}share/nmap/scripts/tso-enum.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/ubiquiti-discovery.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/unittest.nse
${PLIST.lua}share/nmap/scripts/unusual-port.nse
${PLIST.lua}share/nmap/scripts/upnp-info.nse
nmap ndiff zenmap: updated to 7.91 Nmap 7.91 [2020-10-09] o [Zenmap] Fix a crash in the profile editor due to a missing import. o [Nsock][Windows] Demote the IOCP Nsock engine because of some known issues that will take longer to resolve. The previous default "poll" engine will be used instead. o [Nsock][Windows] Fix a crash in service scan due to a previously-unknown error being returned from the IOCP Nsock engine. [Daniel Miller] o [NSE] Fix several places where Lua's os.time was being used to represent dates prior to January 1, 1970, which fails on Windows. Notably, NSE refused to run in UTC+X timezones with the error "time result cannot be represented in this installation" [Clément Notin, nnposter, Daniel Miller] o [NSE] MySQL library was not properly parsing server responses, resulting in script crashes. [nnposter] o Silence the irrelevant warning, "Your ports include 'T:' but you haven't specified any TCP scan type" when running nmap -sUV Nmap 7.90 [2020-10-02] o [Windows] Upgraded Npcap, our Windows packet capturing (and sending) library to the milestone 1.00 release! It's the culmination of 7 years of development with 170 public pre-releases. This includes dozens of performance improvements, bug fixes, and feature enhancements described at https://npcap.org/changelog. o Integrated over 800 service/version detection fingerprints submitted since August 2017. The signature count went up 1.8% to 11,878, including 17 new softmatches. We now detect 1237 protocols from airmedia-audio, banner-ivu, and control-m to insteon-plm, pi-hole-stats, and ums-webviewer. A significant number of submissions remain to be integrated in the next release. o Integrated over 330 of the most-frequently-submitted IPv4 OS fingerprints since August 2017. Added 26 fingerprints, bringing the new total to 5,678. Additions include iOS 12 & 13, macOS Catalina & Mojave, Linux 5.4, FreeBSD 13, and more. o Integrated all 67 of your IPv6 OS fingerprint submissions from August 2017 to September 2020. Added new groups for FreeBSD 12, Linux 5.4, and Windows 10, and consolidated several weak groups to improve classification accuracy. o [NSE] Added 3 NSE scripts, from 2 authors, bringing the total up to 601! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + dicom-brute attempts to brute force the called Application Entity Title of DICOM servers. [Paulino Calderon] + dicom-ping discovers DICOM servers and determines if any Application Entity Title is allowed to connect. [Paulino Calderon] + uptime-agent-info collects system information from an Idera Uptime Infrastructure Monitor agent. [Daniel Miller] o Addressed over 250 code quality issues identified by LGTM.com, improving our code quality score from "C" to "A+" o Released Npcap OEM Edition. For more than 20 years, the Nmap Project has been funded by selling licenses for companies to distribute Nmap with their products, along with commercial support. Hundreds of commercial products now use Nmap for network discovery tasks like port scanning, host discovery, OS detection, service/version detection, and of course the Nmap Scripting Engine (NSE). Until now they have just used standard Nmap, but this new OEM Edition is customized for use within other Windows software. Nmap OEM contains the OEM version of our Npcap driver, which allows for silent installation. It also removes the Zenmap GUI, which cuts the installer size by more than half. And it reports itself as Nmap OEM so customers know it's a properly licensed Nmap. See https://nmap.org/oem for more details. We will be reaching out to all existing licensees with Nmap OEM access credentials, but any licensees who wants it quicker should see https://nmap.org/oem. o Upgraded the Nmap license form a sort of hacked-up version of GPLv2 to a cleaner and better organized version (still based on GPLv2) now called the Nmap Public Source License to avoid confusion. See https://nmap.org/npsl/ for more details and annotated license text. This NPSL project was started in 2006 (community discussion here: https://seclists.org/nmap-dev/2006/q4/126) and then it lost momentum for 7 years until it was restarted in 2013 (https://seclists.org/nmap-dev/2013/q1/399) and then we got distracted by development again. We still have some ideas for improving the NPSL, but it's already much better than the current license, so we're applying NPSL Version 0.92 to the code now and can make improvements later if needed. This does not change the license of previous Nmap releases. o Removed nmap-update. This program was intended to provide a way to update data files and NSE scripts, but the infrastructure was never fielded. It depended on Subversion version control and would have required maintaining separate versions of NSE scripts for compatibility. o Removed the silent-install command-line option (/S) from the Windows installer. It causes several problems and there were no objections when we proposed removing it in 2016 (https://seclists.org/nmap-dev/2016/q4/168). It will remain in Nmap OEM since its main use was for customers who redistribute Nmap with other software. If anyone else has a strong need for an Nmap silent installer, please contact sales@nmap.com and we'll see what we can do. o 23 new UDP payloads and dozens more default ports for existing payloads developed for Rapid7's InsightVM scan engine. These speed up and ensure detection of open UDP services. [Paul Miseiko, Rapid7] o Added a UDP payload for STUN (Session Traversal Utilities for NAT). [David Fifield] o [NSE] Fixed an off-by-one bug in the stun.lua library that prevented parsing a server response. [David Fifield] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix an assertion failure when unsolicited ARP response is received: nmap: Target.cc:503: void Target::stopTimeOutClock(const timeval*): Assertion `htn.toclock_running == true' failed. o [NSE] New outlib library consolidates functions related to NSE output, both string formatting conventions and structured output. [Daniel Miller] o [NSE] New dicom library implements the DICOM protocol used for storing and transfering medical images. [Paulino Calderon] o Fix a regression in ARP host discovery left over from the move from massping to ultra_scan in Nmap 4.22SOC8 (2007) that sometimes resulted in missing ARP responses from targets near the end of a scan. Accuracy and speed are both improved. [Daniel Miller] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix the "iocp" Nsock engine for Windows to be able to correctly handle PCAP read events. This engine is now the default for Windows, which should greatly improve performance over the previous default, the "poll" engine. [Daniel Miller] o Reduced CPU usage of OS scan by 50% by avoiding string copy operations and removing undocumented fingerprint syntax unused in nmap-os-db ('&' and '+' in expressions). [Daniel Miller] o Allow multiple UDP payloads to be specified for a port in nmap-payloads. If the first payload does not get a response, the remaining payloads are tried round-robin. [Paul Miseiko, Rapid7] o New option --discovery-ignore-rst tells Nmap to ignore TCP RST responses when determining if a target is up. Useful when firewalls are spoofing RST packets. [Tom Sellers, Rapid7] o [Ncat] It is now possible to override the value of TLS SNI via --ssl-servername [Hank Leininger, nnposter] o Fixed parsing of TCP options which would hang (infinite loop) if an option had an explicit length of 0. Affects Nmap 7.80 only. [Daniel Miller, Imed Mnif] o [NSE] Script ssh2-enum-algos would fail if the server initiated the key exchange before completing the protocol version exchange [Scott Ellis, nnposter] o [NSE] Fetching of SSH2 keys might fail because of key exchange confusion [nnposter] o [NSE] Performance of script afp-ls has been dramatically improved [nnposter] o [NSE] Parsing of AFP FPGetFileDirParms and FPEnumerateExt2FPEnumerateExt2 responses was not working correctly [nnposter] o [NSE] Eliminated false positives in script http-shellshock caused by simple reflection of HTTP request data [Anders Kaseorg] o [NSE] SNMP scripts are now enabled on non-standard ports where SNMP has been detected [usd-markus, nnposter] o [NSE] MQTT library was using incorrect position when parsing received responses [tatulea] o [NSE] IPMI library was using incorrect position when parsing received responses [Star Salzman] o [NSE] Scripts ipmi-brute and deluge-rpc-brute were not capturing successfully brute-forced credentials [Star Salzman] o Allow resuming IPv6 scans with --resume. The address parsing was assuming IPv4 addresses, leading to "Unable to parse ip" error. In a related fix, MAC addresses will not be parsed as IP addresses when resuming from XML. [Daniel Miller] o Fix reverse-DNS handling of PTR records that are not lowercase. Nmap was failing to identify reverse-DNS names when the DNS server delivered them like ".IN-ADDR.ARPA". [Lucas Nussbaum, Richard Schütz, Daniel Miller] o [NSE] IKE library was not properly populating the protocol number in aggressive mode requests. [luc-x41] o Added service fingerprinting for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, and Crate.io CrateDB. Updated PostreSQL coverage and added specific detection of recent versions running in Docker. [Tom Sellers] o New XML output "hosthint" tag emitted during host discovery when a target is found to be up. This gives earlier notification than waiting for the hostgroup to finish all scan phases. [Paul Miseiko] o New UDP payloads for GPRS Tunneling Protocol (GTP) on ports 2123, 2152, and 3386. [Guillaume Teissier] o [NSE] SSH scripts now run on several ports likely to be SSH based on empirical data from Shodan.io, as well as the netconf-ssh service. [Lim Shi Min Jonathan, Daniel Miller] o [Zenmap] Stop creating a debugging output file 'tmp.txt' on the desktop in macOS. [Roland Linder] o [Nping] Address build failure under libc++ due to "using namespace std;" in several headers, resulting in conflicting definitions of bind(). Reported by StormBytePP and Rosen Penev. [Daniel Miller] o [Ncat] Fix a fatal error when connecting to a Linux VM socket with verbose output enabled. [Stefano Garzarella] o [Ncat] Proxy credentials can be alternatively passed onto Ncat by setting environment variable NCAT_PROXY_AUTH, which reduces the risk of the credentials getting captured in process logs. [nnposter] o [NSE] Fixed a crash on Windows when processing a GZIP-encoded HTTP body. [Daniel Miller] o Upgrade libpcap to 1.9.1, which addresses several CVE vulnerabilities. o Upgrade libssh2 to 1.9.0, fixing compilation with OpenSSL 1.1.0 API. o Processing of IP address CIDR blocks was not working correctly on ppc64, ppc64le, and s390x architectures. [rfrohl, nnposter] o [Windows] Add support for the new loopback behavior in Npcap 0.9983 and later. This enables Nmap to scan localhost on Windows without needing the Npcap Loopback Adapter to be installed, which was a source of problems for some users. [Daniel Miller] o [NSE] MS SQL library has improved version resolution, from service pack level to individual cumulative updates [nnposter] o [NSE] With increased verbosity, script http-default-accounts now reports matched target fingerprints even if no default credentials were found [nnposter] o [NSE] IPP request object conversion to string was not working correctly [nnposter] o [NSE] IPP response parser was not correctly processing end-of-attributes-tag [nnposter] o [NSE] Script cups-info was failing due to erroneous double-decoding of the IPP printer status [nnposter] o [NSE] Oracle TNS parser was incorrectly unmarshalling DALC byte arrays [nnposter] o [NSE] The password hashing function for Oracle 10g was not working correctly for non-alphanumeric characters [nnposter] o [NSE] Virtual host probing list, vhosts-full.lst, was missing numerous entries present in vhosts-default.lst [nnposter] o [NSE] Script http-grep was not correctly calculating Luhn checksum [Colleen Li, nnposter] o [NSE] Scripts dhcp-discover and broadcast-dhcp-discover now support new argument "mac" to force a specific client MAC address [nnposter] o [NSE] Code improvements in RPC Dump, benefitting NFS-related scripts [nnposter] o [NSE] RPC code was using incorrect port range, which was causing some calls, such as NFS mountd, to fail intermittently [nnposter] o [NSE] XML output from script ssl-cert now includes RSA key modulus and exponent [nnposter] o [NSE] Nmap no longer crashes when SMB scripts, such as smb-ls, call smb.find_files [nnposter] o [NSE] The MongoDB library was causing errors when assembling protocol payloads. [nnposter] o [NSE] The RTSP library was not correctly generating request strings. [nnposter] o [NSE] VNC handshakes were failing with insert position out of bounds error. [nnposter] o [NSE] Function marshall_dom_sid2 in library msrpctypes was not correctly populating ID Authority. [nnposter] o [NSE] Unmarshalling functions in library msrpctypes were attempting arithmetic on a nil argument. [Ivan Ivanov, nnposter] o [NSE] Functions lsa_lookupnames2 and lsa_lookupsids2 in library msrpc were incorrectly referencing function strjoin when called with debug level 2 or higher. [Ivan Ivanov] o [NSE] Added HTTP default account fingerprints for Tomcat Host Manager and Dell iDRAC9. [Clément Notin] o [NSE] A MS-SMB spec non-compliance in Samba was causing protocol negotiation to fail with data string too short error. [Clément Notin, nnposter] o [NSE] A bug in SMB library was causing scripts to fail with bad format argument error. [Ivan Ivanov] o [NSE] The HTTP library no longer crashes when code requests digest authentication but the server does not provide the necessary authentication header. [nnposter] o [NSE] Fixed a bug in http-wordpress-users.nse that could cause extraneous output to be captured as part of a username. [Duarte Silva]
2021-04-16 08:55:33 +02:00
${PLIST.lua}share/nmap/scripts/uptime-agent-info.nse
${PLIST.lua}share/nmap/scripts/url-snarf.nse
${PLIST.lua}share/nmap/scripts/ventrilo-info.nse
${PLIST.lua}share/nmap/scripts/versant-info.nse
${PLIST.lua}share/nmap/scripts/vmauthd-brute.nse
Nmap 7.50 o [Windows] Updated the bundled Npcap from 0.78 to 0.91, with several bugfixes for WiFi connectivity problems and stability issues. [Daniel Miller, Yang Luo] o Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 o [NSE] Added 14 NSE scripts from 12 authors, bringing the total up to 566! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: o [Ncat] A series of changes and fixes based on feedback from the Red Hat community: o [NSE][GH-266][GH-704][GH-238][GH-883] NSE libraries smb and msrpc now use fully qualified paths. SMB scripts now work against all modern versions of Microsoft Windows. [Paulino Calderon] o [NSE] smb library's share_get_list now properly uses anonymous connections first before falling back authenticating as a known user. o New service probes and matches for Apache HBase and Hadoop MapReduce. [Paulino Calderon] o Extended Memcached service probe and added match for Apache ZooKeeper. [Paulino Calderon] o [NSE] New script argument "vulns.short" will reduce vulns library script output to a single line containing the target name or IP, the vulnerability state, and the CVE ID or title of the vulnerability. [Daniel Miller] o [NSE][GH-862] SNMP scripts will now take a community string provided like `--script-args creds.snmp=private`, which previously did not work because it was interpreted as a username. [Daniel Miller] o [NSE] Resolved several issues in the default HTTP redirect rules: - [GH-826] A redirect is now cancelled if the original URL contains embedded credentials - [GH-829] A redirect test is now more careful in determining whether a redirect destination is related to the original host - [GH-830] A redirect is now more strict in avoiding possible redirect loops [nnposter] o [NSE][GH-766] The HTTP Host header will now include the port unless it is the default one for a given scheme. [nnposter] o [NSE] The HTTP response object has a new member, fragment, which contains a partially received body (if any) when the overall request fails to complete. [nnposter] o [NSE][GH-866] NSE now allows cookies to have arbitrary attributes, which are silently ignored (in accordance with RFC 6265). Unrecognized attributes were previously causing HTTP requests with such cookies to fail. [nnposter] o [NSE][GH-844] NSE now correctly parses a Set-Cookie header that has unquoted whitespace in the cookie value (which is allowed per RFC 6265). [nnposter] o [NSE][GH-731] NSE is now able to process HTTP responses with a Set-Cookie header that has an extraneous trailing semicolon. [nnposter] o [NSE][GH-708] TLS SNI now works correctly for NSE HTTP requests initiated with option any_af. As an added benefit, option any_af is now available for all connections via comm.lua, not just HTTP requests. [nnposter] o [NSE][GH-781] There is a new common function, url.get_default_port(), to obtain the default port number for a given scheme. [nnposter] o [NSE][GH-833] Function url.parse() now returns the port part as a number, not a string. [nnposter] o No longer allow ICMP Time Exceeded messages to mark a host as down during host discovery. Running traceroute at the same time as Nmap was causing interference. [David Fifield] o [NSE][GH-807] Fixed a JSON library issue that was causing long integers to be expressed in the scientific/exponent notation. [nnposter] o [NSE] Fixed several potential hangs in NSE scripts that used receive_buf(pattern), which will not return if the service continues to send data that does not match pattern. A new function in match.lua, pattern_limit, is introduced to limit the number of bytes consumed while searching for the pattern. [Daniel Miller, Jacek Wielemborek] o [Nsock] Handle any and all socket connect errors the same: raise as an Nsock error instead of fatal. This prevents Nmap and Ncat from quitting with "Strange error from connect:" [Daniel Miller] o [NSE] Added several commands to redis-info to extract listening addresses, connected clients, active channels, and cluster nodes. [Vasiliy Kulikov] o [NSE][GH-679][GH-681] Refreshed script http-robtex-reverse-ip, reflecting changes at the source site (www.robtex.com). [aDoN] o [NSE][GH-620][GH-715] Added 8 new http-enum fingerprints for Hadoop infrastructure components. [Thomas Debize, Varunram Ganesh] o [NSE][GH-629] Added two new fingerprints to http-default-accounts (APC Management Card, older NetScreen ScreenOS) [Steve Benson, nnposter] o [NSE][GH-716] Fix for oracle-tns-version which was sending an invalid TNS probe due to a string escaping mixup. [Alexandr Savca] o [NSE][GH-694] ike-version now outputs information about supported attributes and unknown vendor ids. Also, a new fingerprint for FortiGate VPNs was submitted by Alexis La Goutte. [Daniel Miller] o [GH-700] Enabled support for TLS SNI on the Windows platform. [nnposter] o [GH-649] New service probe and match lines for the JMON and RSE services of IBM Explorer for z/OS. [Soldier of Fortran] o Removed a duplicate service probe for Memcached added in 2011 (the original probe was added in 2008) and reported as duplicate in 2013 by Pavel Kankovsky. o New service probe and match line for NoMachine NX Server remote desktop. [Justin Cacak] o [Zenmap] Fixed a recurring installation problem on OS X/macOS where Zenmap was installed to /Applications/Applications/Zenmap.app instead of /Applications/Zenmap.app. o [Zenmap][GH-639] Zenmap will no longer crash when no suitable temporary directory is found. Patches contributed by [Varunram Ganesh] and [Sai Sundhar] o [Zenmap][GH-626] Zenmap now properly handles the -v0 (no output) option, which was added in Nmap 7.10. Previously, this was treated the same as not specifying -v at all. [lymanZerga11] o [GH-630] Updated or removed some OpenSSL library calls that were deprecated in OpenSSL 1.1. [eroen] o [NSE] Script ssh-hostkey now recognizes and reports Ed25519 keys [nnposter] o [NSE][GH-627] Fixed script hang in several brute scripts due to the "threads" script-arg not being converted to a number. Error message was "nselib/brute.lua:1188: attempt to compare number with string" [Arne Beer]
2017-06-14 11:26:29 +02:00
${PLIST.lua}share/nmap/scripts/vmware-version.nse
${PLIST.lua}share/nmap/scripts/vnc-brute.nse
${PLIST.lua}share/nmap/scripts/vnc-info.nse
${PLIST.lua}share/nmap/scripts/vnc-title.nse
${PLIST.lua}share/nmap/scripts/voldemort-info.nse
Fix installation for "lua" option (new scripts added and ssl-google-cert-catalog removed). According the Changelog (only relevant entries for "lua" added/removed scripts): o [NSE] Added 12 NSE scripts from 4 authors, bringing the total up to 552! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + cics-enum enumerates CICS transaction IDs, mapping to screens in TN3270 services. [Soldier of Fortran] + cics-user-enum brute-forces usernames for CICS users on TN3270 services. [Soldier of Fortran] + fingerprint-strings will print the ASCII strings it finds in the service fingerprints that Nmap shows for unidentified services. [Daniel Miller] + [GH#606] ip-geolocation-map-bing renders IP geolocation data as an image via Bing Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-google renders IP geolocation data as an image via Google Maps API. [Mak Kolybabi] + [GH#606] ip-geolocation-map-kml records IP geolocation data in a KML file for import into other mapping software [Mak Kolybabi] + nje-pass-brute brute-forces the password to a NJE node, given a valid RHOST and OHOST. Helpfully, nje-node-brute can now brute force both of those values. [Soldier of Fortran] + [GH#557] ssl-cert-intaddr will search for private IP addresses in TLS certificate fields and extensions. [Steve Benson] + tn3270-screen shows the login screen from mainframe TN3270 Telnet services, including any hidden fields. The script is accompanied by the new tn3270 library. [Soldier of Fortran] + tso-enum enumerates usernames for TN3270 Telnet services. [Soldier of Fortran] + tso-brute brute-forces passwords for TN3270 Telnet services. [Soldier of Fortran] + vtam-enum brute-forces VTAM application IDs for TN3270 services. [Soldier of Fortran] o [NSE][GH#533] Removed ssl-google-cert-catalog, since Google shut off that service at some point. Reported by Brian Morin. o [NSE][GH#606] New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. [Mak Kolybabi]
2017-03-05 10:06:46 +01:00
${PLIST.lua}share/nmap/scripts/vtam-enum.nse
nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices.
2019-08-28 15:55:44 +02:00
${PLIST.lua}share/nmap/scripts/vulners.nse
${PLIST.lua}share/nmap/scripts/vuze-dht-info.nse
${PLIST.lua}share/nmap/scripts/wdb-version.nse
2015-04-09 19:01:31 +02:00
${PLIST.lua}share/nmap/scripts/weblogic-t3-info.nse
${PLIST.lua}share/nmap/scripts/whois-domain.nse
${PLIST.lua}share/nmap/scripts/whois-ip.nse
${PLIST.lua}share/nmap/scripts/wsdd-discover.nse
${PLIST.lua}share/nmap/scripts/x11-access.nse
${PLIST.lua}share/nmap/scripts/xdmcp-discover.nse
${PLIST.lua}share/nmap/scripts/xmlrpc-methods.nse
${PLIST.lua}share/nmap/scripts/xmpp-brute.nse
${PLIST.lua}share/nmap/scripts/xmpp-info.nse