Skip to content

Commit

Permalink
imported nmap 6.46
Browse files Browse the repository at this point in the history
  • Loading branch information
tux-mind committed May 27, 2014
0 parents commit 3f796b3
Show file tree
Hide file tree
Showing 1,845 changed files with 957,505 additions and 0 deletions.
9 changes: 9 additions & 0 deletions BSDmakefile
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# $Id: BSDmakefile 13976 2009-06-29 23:48:19Z fyodor $
# Redirect BSD make to GNU gmake for convenience

USE_GNU:
@gmake $(.TARGETS)

$(.TARGETS): USE_GNU

.PHONY: USE_GNU
13,844 changes: 13,844 additions & 0 deletions CHANGELOG

Large diffs are not rendered by default.

470 changes: 470 additions & 0 deletions COPYING

Large diffs are not rendered by default.

2,693 changes: 2,693 additions & 0 deletions FPEngine.cc

Large diffs are not rendered by default.

473 changes: 473 additions & 0 deletions FPEngine.h

Large diffs are not rendered by default.

3,339 changes: 3,339 additions & 0 deletions FPModel.cc

Large diffs are not rendered by default.

333 changes: 333 additions & 0 deletions FingerPrintResults.cc

Large diffs are not rendered by default.

225 changes: 225 additions & 0 deletions FingerPrintResults.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,225 @@

/***************************************************************************
* FingerPrintResults.h -- The FingerPrintResults class the results of OS *
* fingerprint matching against a certain host. *
* *
***********************IMPORTANT NMAP LICENSE TERMS************************
* *
* The Nmap Security Scanner is (C) 1996-2013 Insecure.Com LLC. Nmap is *
* also a registered trademark of Insecure.Com LLC. This program is free *
* software; you may redistribute and/or modify it under the terms of the *
* GNU General Public License as published by the Free Software *
* Foundation; Version 2 ("GPL"), BUT ONLY WITH ALL OF THE CLARIFICATIONS *
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
* modify, and redistribute this software under certain conditions. If *
* you wish to embed Nmap technology into proprietary software, we sell *
* alternative licenses (contact [email protected]). Dozens of software *
* vendors already license Nmap technology such as host discovery, port *
* scanning, OS detection, version detection, and the Nmap Scripting *
* Engine. *
* *
* Note that the GPL places important restrictions on "derivative works", *
* yet it does not provide a detailed definition of that term. To avoid *
* misunderstandings, we interpret that term as broadly as copyright law *
* allows. For example, we consider an application to constitute a *
* derivative work for the purpose of this license if it does any of the *
* following with any software or content covered by this license *
* ("Covered Software"): *
* *
* o Integrates source code from Covered Software. *
* *
* o Reads or includes copyrighted data files, such as Nmap's nmap-os-db *
* or nmap-service-probes. *
* *
* o Is designed specifically to execute Covered Software and parse the *
* results (as opposed to typical shell or execution-menu apps, which will *
* execute anything you tell them to). *
* *
* o Includes Covered Software in a proprietary executable installer. The *
* installers produced by InstallShield are an example of this. Including *
* Nmap with other software in compressed or archival form does not *
* trigger this provision, provided appropriate open source decompression *
* or de-archiving software is widely available for no charge. For the *
* purposes of this license, an installer is considered to include Covered *
* Software even if it actually retrieves a copy of Covered Software from *
* another source during runtime (such as by downloading it from the *
* Internet). *
* *
* o Links (statically or dynamically) to a library which does any of the *
* above. *
* *
* o Executes a helper program, module, or script to do any of the above. *
* *
* This list is not exclusive, but is meant to clarify our interpretation *
* of derived works with some common examples. Other people may interpret *
* the plain GPL differently, so we consider this a special exception to *
* the GPL that we apply to Covered Software. Works which meet any of *
* these conditions must conform to all of the terms of this license, *
* particularly including the GPL Section 3 requirements of providing *
* source code and allowing free redistribution of the work as a whole. *
* *
* As another special exception to the GPL terms, Insecure.Com LLC grants *
* permission to link the code of this program with any version of the *
* OpenSSL library which is distributed under a license identical to that *
* listed in the included docs/licenses/OpenSSL.txt file, and distribute *
* linked combinations including the two. *
* *
* Any redistribution of Covered Software, including any derived works, *
* must obey and carry forward all of the terms of this license, including *
* obeying all GPL rules and restrictions. For example, source code of *
* the whole work must be provided and free redistribution must be *
* allowed. All GPL references to "this License", are to be treated as *
* including the terms and conditions of this license text as well. *
* *
* Because this license imposes special exceptions to the GPL, Covered *
* Work may not be combined (even as part of a larger work) with plain GPL *
* software. The terms, conditions, and exceptions of this license must *
* be included as well. This license is incompatible with some other open *
* source licenses as well. In some cases we can relicense portions of *
* Nmap or grant special permissions to use it in other open source *
* software. Please contact [email protected] with any such requests. *
* Similarly, we don't incorporate incompatible open source software into *
* Covered Software without special permission from the copyright holders. *
* *
* If you have any questions about the licensing restrictions on using *
* Nmap in other works, are happy to help. As mentioned above, we also *
* offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens *
* of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates. They also fund the *
* continued development of Nmap. Please email [email protected] for further *
* information. *
* *
* If you have received a written license agreement or contract for *
* Covered Software stating terms other than these, you may choose to use *
* and redistribute Covered Software under those terms instead of these. *
* *
* Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes (none *
* have been found so far). *
* *
* Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to send your changes *
* to the [email protected] mailing list for possible incorporation into the *
* main distribution. By sending these changes to Fyodor or one of the *
* Insecure.Org development mailing lists, or checking them into the Nmap *
* source code repository, it is understood (unless you specify otherwise) *
* that you are offering the Nmap Project (Insecure.Com LLC) the *
* unlimited, non-exclusive right to reuse, modify, and relicense the *
* code. Nmap will always be available Open Source, but this is important *
* because the inability to relicense code has caused devastating problems *
* for other Free Software projects (such as KDE and NASM). We also *
* occasionally relicense the code to third parties as discussed above. *
* If you wish to specify special license conditions of your *
* contributions, just say so when you send them. *
* *
* This program is distributed in the hope that it will be useful, but *
* WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Nmap *
* license file for more details (it's in a COPYING file included with *
* Nmap, and also available from https://svn.nmap.org/nmap/COPYING *
* *
***************************************************************************/

/* $Id: FingerPrintResults.h 32741 2014-02-20 18:44:12Z dmiller $ */

#ifndef FINGERPRINTRESULTS_H
#define FINGERPRINTRESULTS_H

class FingerPrintResults;

#include "nmap.h"
#include "global_structures.h"
#include "FPEngine.h"

/* Maximum number of results allowed in one of these things ... */
#define MAX_FP_RESULTS 36

struct OS_Classification_Results {
struct OS_Classification *OSC[MAX_FP_RESULTS];
double OSC_Accuracy[MAX_FP_RESULTS];
int OSC_num_perfect_matches; // Number of perfect matches in OSC[\]
int OSC_num_matches; // Number of matches total in OSC[] (and, of course, _accuracy[])
int overall_results; /* OSSCAN_TOOMANYMATCHES, OSSCAN_NOMATCHES, OSSCAN_SUCCESS, etc */
};

class FingerPrintResults {
public: /* For now ... a lot of the data members should be made private */
FingerPrintResults();
virtual ~FingerPrintResults();

double accuracy[MAX_FP_RESULTS]; /* Percentage of match (1.0 == perfect
match) in same order as matches[] below */
FingerMatch *matches[MAX_FP_RESULTS]; /* ptrs to matching references --
highest accuracy matches first */
int num_perfect_matches; /* Number of 1.0 accuracy matches in matches[] */
int num_matches; /* Total number of matches in matches[] */
int overall_results; /* OSSCAN_TOOMANYMATCHES, OSSCAN_NOMATCHES,
OSSCAN_SUCCESS, etc */

/* Ensures that the results are available and then returns them.
You should only call this AFTER all matching has been completed
(because results are cached and won't change if new matches[] are
added.) All OS Classes in the results will be unique, and if there
are any perfect (accuracy 1.0) matches, only those will be
returned */
const struct OS_Classification_Results *getOSClassification();

int osscan_opentcpport; /* Open TCP port used for scanning (if one found --
otherwise -1) */
int osscan_closedtcpport; /* Closed TCP port used for scanning (if one found --
otherwise -1) */
int osscan_closedudpport; /* Closed UDP port used for scanning (if one found --
otherwise -1) */
int distance; /* How "far" is this FP gotten from? */
int distance_guess; /* How "far" is this FP gotten from? by guessing based on ttl. */

/* The largest ratio we have seen of time taken vs. target time
between sending 1st tseq probe and sending first ICMP echo probe.
Zero means we didn't see any ratios (the tseq probes weren't
sent), 1 is ideal, and larger values are undesirable from a
consistency standpoint. */
double maxTimingRatio;

/* If the fingerprint is of potentially poor quality, we don't want to
print it and ask the user to submit it. In that case, the reason
for skipping the FP is returned as a static string. If the FP is
great and should be printed, NULL is returned. */
virtual const char *OmitSubmissionFP();

virtual const char *merge_fpr(const Target *currenths, bool isGoodFP, bool wrapit) const = 0;

private:
bool isClassified; // Whether populateClassification() has been called
/* Goes through fingerprinting results to populate OSR */

void populateClassification();
bool classAlreadyExistsInResults(struct OS_Classification *OSC);
struct OS_Classification_Results OSR;
};

class FingerPrintResultsIPv4 : public FingerPrintResults {
public:
FingerPrint **FPs; /* Fingerprint data obtained from host */
int numFPs;

FingerPrintResultsIPv4();
virtual ~FingerPrintResultsIPv4();
const char *merge_fpr(const Target *currenths, bool isGoodFP, bool wrapit) const;
};

class FingerPrintResultsIPv6 : public FingerPrintResults {
public:
FPResponse *fp_responses[NUM_FP_PROBES_IPv6];
struct timeval begin_time;
/* The flow label we set in our sent packets, for calculating offsets later. */
unsigned int flow_label;

FingerPrintResultsIPv6();
virtual ~FingerPrintResultsIPv6();
const char *OmitSubmissionFP();
const char *merge_fpr(const Target *currenths, bool isGoodFP, bool wrapit) const;
};

#endif /* FINGERPRINTRESULTS_H */
106 changes: 106 additions & 0 deletions HACKING
Original file line number Diff line number Diff line change
@@ -0,0 +1,106 @@
$Id: HACKING 30349 2012-12-06 02:34:28Z david $

Nmap HACKING
------------

Information for potential Nmap hackers!

Source is provided to Nmap because we believe users have a
right to know exactly what a program is going to do before they run
it. This also allows you to audit the software for security holes
(none have been found so far).

Source code also allows you to port Nmap to new platforms, fix bugs,
and add new features. You are highly encouraged to send your changes
to [email protected] for possible incorporation into the main
distribution. By sending these changes to Fyodor or one of the
Insecure.Org development mailing lists, it is assumed that you are
offering the Nmap Project (Insecure.Com LLC) unlimited, non-exclusive
right to reuse, modify, and relicense the code. This is important
because the inability to relicense code has caused devastating
problems for other Free Software projects (such as KDE and NASM).
Nmap will always be available Open Source. If you wish to specify
special license conditions of your contributions, just say so when you
send them.

Nmap is a community project and has already benefited greatly from
outside contributors (for examples, see the CHANGELOG at
http://nmap.org/changelog.html). Bugfixes, and portability changes
will almost always be accepted. Even if you do not have time to track
down and patch a problem, bug reports are always welcome.

Hackers interested in something more major, such as a new feature, are
encouraged to send a mail describing their plans to
[email protected] . This is a good way to solicit feedback on
your proposals. List members are often very willing to help. You
might want to subscribe to that mailing list as well -- send a blank
email to [email protected] . While you are at it, you
might also want to subscribe to [email protected] via the same mechanism.
Web archives of those lists are at http://seclists.org .

Some ideas of useful contributions/projects
-------------------------------------------

Of course, you are welcome to work on whatever suits your fancy. But
some ideas of contributions that might be particularly useful are listed in
the todo file, available in todo/nmap.txt or online at
https://svn.nmap.org/nmap/todo/nmap.txt

o Script ideas page. Writing NSE scripts is an excellent way to contribute to
the project. You can add your script ideas to our wiki page, or pick one and
implement it. See: https://secwiki.org/w/Nmap_Script_Ideas

o Nmap GUI improvements -- Zenmap is the Nmap GUI. If you have
enhancement ideas, give it a shot! Alternatively, consider
contributing to the NmapSI and Umit projects available at
http://www.nmapsi4.org and http://umit.sourceforge.net respectively.
There are also other satellite projects, with different level of activity,
such as NmapGUI (http://sourceforge.net/projects/nmapgui) or Nmap::parser
(http://rubynmap.sourceforge.net).

One of the best ways to help is to join the nmap-dev list
( http://nmap.org/mailman/listinfo/dev ). Requests for
assistance and new Nmap-related projects are often posted there.

How to make code contributions
------------------------------

The preferred mechanism for submitted changes is unified diffs against
the latest SVN trunk. Please send them to [email protected] .

Get a local copy of the SVN trunk:

svn co https://svn.nmap.org/nmap

Make your changes.

Then make a unified diff, by issuing the following command:

svn diff > nmap.patch

If you've added several features, it's best to send them as several independent
patches if you can.

Style
-----

When contributing new code, we suggest using two-space indents with no
tabs. This is generally the default in emacs, and Vim users can
achieve it by adding rules such as the following to .vimrc:

if getcwd() =~ '/nmap'
set nocindent
set expandtab
set softtabstop=2
set shiftwidth=2
set copyindent
endif


Credits
-------

I got the idea for this HACKING file from GNet
(http://www.gnetlibrary.org/) and followed the
general structure of their HACKING file.

10 changes: 10 additions & 0 deletions INSTALL
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
Ideally, you should be able to just type:

./configure
make
make install

For far more in-depth compilation, installation, and removal notes,
read the Nmap Install Guide at http://nmap.org/install/ .


Loading

0 comments on commit 3f796b3

Please sign in to comment.