Commit Graph

69 Commits

Author SHA1 Message Date
David E. O'Brien
12a21ddb5b Portlint this, and remove the 1/2backed nmapfe GUI support as there is a
proper nmapfe port.  I do as one that created and maintained this port
for 4 years.
2002-05-27 17:36:35 +00:00
David W. Chapman Jr.
433d822a6a Update to the latest
PR:		38305
Submitted by:	maintainer
2002-05-21 16:26:04 +00:00
David E. O'Brien
12f429fe3f To ports@freebsd.org. 2002-05-08 21:32:37 +00:00
David E. O'Brien
c5c456d9d2 Update to version 2.54 Beta 33. 2002-04-29 06:33:34 +00:00
David E. O'Brien
740ec3103f Update to version 2.54 Beta 32. 2002-04-02 19:49:58 +00:00
David E. O'Brien
6461124331 Update to version 2.54 Beta 31. 2002-03-21 01:39:49 +00:00
David E. O'Brien
9d235696c5 Spelling error and whitespace changes.
PR:		35888
Submitted by:	Peter J. Avalos <pavalos@theshell.com>
2002-03-14 18:18:08 +00:00
Crist J. Clark
4f3bf60ae3 Do not try to install any parts of nmapfe from the nmap port. There is
a separate port for nmapfe. Even though the attempt in the nmap port
mostly fails since no nmapfe executable would have been built, files
not appearing in the pkg-plist were being added to the system.

PR:		ports/35207
Approved by:	obrien
2002-02-23 06:04:44 +00:00
Crist J. Clark
b142db9c37 Only the nmap port should try to strip nmap. The nmapfe port also
uses this make file. It should not try to strip the ${PREFIX}/bin/nmap
executable. The install of nmapfe would fail if nmap did not exist.

PR:		ports/35207
Approved by:	obrien
2002-02-23 06:03:24 +00:00
David E. O'Brien
bf9fd8c3e2 Update to version 2.54 Beta 30. 2001-11-07 15:41:14 +00:00
David E. O'Brien
2fe6c3d8d0 Update to version 2.54 Beta 29.
+ updated fingerprint database
+ multi-portlist -- specify different ranges for TCP & UDP
2001-08-10 15:15:04 +00:00
David E. O'Brien
163ef66d2d Update to version 2.54 Beta 28. 2001-07-29 04:37:24 +00:00
David E. O'Brien
ffed647183 Update to version 2.54 Beta 27. 2001-07-20 18:27:06 +00:00
David E. O'Brien
54824dba9f Update to version 2.54 Beta 26.
The coolest feature is a new scan type -- Idlescan!
The quick synopsis is that this is a completely blind scan (meaning no
packets are sent to the target from your real IP address).  Instead, a
unique side-channel attack exploits predictable "IP fragmentation ID"
sequence generation on the zombie host to glean information about the
open ports on the target.
2001-07-09 12:22:03 +00:00
David E. O'Brien
4872a025a4 Update to version 2.54 Beta 25.
-- Added a whole bunch of new OS fingerprints (and adjustments)
   ranging from big important ones (Linux 2.4.X, OpenBSD 2.9, FreeBSD
   4.3, Cisco 12.2.1, MacOS X, etc) to some that are more obscure (
   such as Apple Color LaserWriter 12/660 PS and VirtualAccess
   LinxpeedPro 120 )
-- Tweaked TCP Timestamp and IP.ID sequence classification algorithms
2001-06-04 15:27:38 +00:00
David E. O'Brien
b0e955dd0c Upgrade to 2.54BETA24.
+ fixes a problem that kept UDP RPC scanning from working unless you were
  also doing a TCP scan.
+ updated to latest version of rpc program number list
2001-06-02 19:06:37 +00:00
David E. O'Brien
14c5bb3b12 More changes needed to allow a slave port. 2001-05-28 01:01:19 +00:00
David E. O'Brien
214b483026 Allow a slave port to work with this Makefile. To be used by nmapfe port. 2001-05-28 00:18:04 +00:00
David E. O'Brien
f8bca4b381 I forgot to commit this with the last upgrade.
Submitted by:	steve
2001-04-15 01:04:33 +00:00
David E. O'Brien
2bf7be3276 While the previous patch worked, this is a fresh one generated from
this version's sources.
2001-04-07 18:38:08 +00:00
David E. O'Brien
53d94c598d Update to version 2.54 Beta 22. 2001-03-20 16:39:14 +00:00
David E. O'Brien
758c19ecc0 Remove patch NOT approved by me (maintainer), that is in my way while
doing an upgrade.  This patch does not fix a bug, takes away the original
author's right to free speach, and we have no technical reason to patch.
2001-03-17 01:06:24 +00:00
Will Andrews
1dbf0287c0 Remove redundant/inappropriate CATEGORIES. People need to start reading
the Porter's Handbook.  :-)
2000-06-02 03:18:54 +00:00
David E. O'Brien
c28d4f8c71 update to 2.53.
(fix commenting bug that caused major problems for some non-gcc users)
2000-05-09 16:04:13 +00:00
David E. O'Brien
fa78580a86 Update to version 2.52.
[fixes minor typos in 2.51]
2000-05-05 01:51:06 +00:00
David E. O'Brien
c6da23405e Update to 2.51.
2.51 fixes a target parsing bug which could in some cases cause Nmap to
crash with the error "Assertion `t->nleft > 1' failed".
2000-04-30 09:46:47 +00:00
Michael Haro
4cf4ab0a2f Correct whitespace introduced during PORTNAME conversion and portlint 2000-04-21 08:19:33 +00:00
David E. O'Brien
cf811276e5 Update to version 2.30 beta 20. 2000-04-18 18:58:20 +00:00
Chris Piazza
3df86a88a9 Update with the new PORTNAME/PORTVERSION variables 2000-04-09 18:34:06 +00:00
David E. O'Brien
3d169fb97f Update to 2.30 Beta #18.
* Fixed a very important bug that occurred when SYN scanning localhost.
* Fixed "-vv" to mean "-v -v" as it did in previous versions.
2000-04-06 22:16:15 +00:00
David E. O'Brien
ebaa0d86ff Update to version 2.3 beta 17.
* Added ACK scanning.  This scan technique is great for testing firewall
  rulesets.  It can NOT find open ports, but it can distinguish between
  filtered/unfilterd by sending an ACK packet to each port and waiting for
  a RST to come back.  Filtered ports will not send back a RST (or will
  send ICMP unreachables).  This scan type is activated with -sA .

* Documented the Window scan (-sW)

* "Protocol" field in output eliminated.  It is now printed right
   next to the number (/etc/services style).  Like "22/tcp".

* Added --resume option to continue a large network scan where you left off.
  It also allows you to start and stop for policy reasons
2000-03-27 01:23:45 +00:00
David E. O'Brien
e05c25a8bf Restore useless version required comments. 2000-03-22 00:28:26 +00:00
David E. O'Brien
da36feaffe Remove the "version required" line. 2000-03-20 02:37:50 +00:00
Jeremy Lea
e531baf8c1 PLIST related fixes. 2000-02-27 08:56:20 +00:00
Daniel Baker
1c0ddbd0e6 New patch to eliminate editorial in reference file.
Submitted by:	David McNett <nugget@slacker.com>
2000-02-17 23:28:32 +00:00
David E. O'Brien
b5d1cecde4 Style nits in the ports I maintain. 2000-02-13 03:25:05 +00:00
David E. O'Brien
e3e5569e35 UpDat3 t0 v3r$i0n 2.3 B3ta 14
Among bug fixes, we have the new skript kiddie output mode!  Try it out by
adding "-oS - " to your nmap command line:

amy# nmap -sS -oS - -O -v vectra

$TartInG nmap V. 2.3B3tA14 bY fy0D0r@!n$ecure.org ( www.ins3cuR3.0Rg/nmap/)
!nt3r3$t|nG pOrtz On v3cTrA.yuma.nEt (192.168.0.5):
P0rt    $tate       PrOtOc0L  $3rv!c3
13      Op3n        tCp       Dayt|m3
22      0pEn        Tcp       $SH
23      open        tcp       tEln3t
79      op3N        tcp       f!ng3r
513     0peN        Tcp       lOgIn
514     OpEn        tcp       $h3ll

TcP S3QuEncE PReDiCtion: ClA$s=random p0$|TivE incr3m3nts
                         DIffIculty=24696 (WorthY Challeng3)

s3quEnce numb3rz: 61B825b7 61b83793 61B88114 61b8B073 61B90DB2 61BA306B
R3m0t3 operAtInG sy$t3m gue$z: OpeNBSD 2.2 - 2.3

NMAP run c0mpleteD -- 1 IP adDR3ss (1 h0sT up) $CAnNed in 1 SEC0nd
2000-01-28 10:04:59 +00:00
David E. O'Brien
afad78b9d4 Update to version 2.3 Beta 14 2000-01-28 10:02:12 +00:00
David E. O'Brien
f0e5c58672 Upgrade to version 2.3 BETA 13. 2000-01-17 09:22:13 +00:00
David E. O'Brien
fb6cec5d1a Upgrade to version 2.3BETA12.
Submitted by:	taguchi@tohoku.iij.ad.jp
2000-01-04 08:00:20 +00:00
David E. O'Brien
7c36a52e4c Update to 2.3 beta #9.
This speeds up OS scans.
1999-12-07 22:06:56 +00:00
David E. O'Brien
f3c0ba55b9 Update to 2.3 Beta8.
* Added "firewall mode" timing optimizations which can decrease the
  amount of time neccessary to SYN or connect scan some heavily filtered
  hosts.
* Changed "TCP Ping" to use a random ACK value rather than 0 (an IDS
  called Snort was using this to detect Nmap TCP pings).
* better FDDI support
* changes which should lead to tremendous speedups against some firewalled
  hosts.
1999-11-21 23:09:22 +00:00
David E. O'Brien
160bcee3fd Upgrade to 2.3BETA6.
*  Added sophisticated timing controls to give the user much more control
over Nmap's speed.  This allows you to make Nmap much more aggressive to
scan hosts faster, or you can make Nmap more "polite" -- slower but less
likely to wreak havoc on your Network.  You can even enforce large delays
between sending packets to sneak under IDS thresholds and prevent
detection.  See the new "Timing Options" section of the Nmap man page for
more information on using this.

*  New "Window scan" that does fun things with ACK packets.  -sW activates
this scan type.  It is mostly effective against BSD, AIX, Digital UNIX, and
various older HP/UX, SunOS, and VAX.
1999-09-20 04:51:19 +00:00
David E. O'Brien
55e2ef1919 Remove the X dependent componate. It has become its own port. 1999-09-18 04:50:31 +00:00
David E. O'Brien
d7af4f1da5 Upgrade to 2.3BETA5.
This includes new RPC scanning ability & 100's of new OS fingerprints.
The machine parseable output has been cleaned up and made more regular.
1999-09-07 10:48:48 +00:00
Peter Wemm
a53421230c $Id$ -> $FreeBSD$ 1999-08-31 01:53:22 +00:00
David E. O'Brien
1cb3956451 Hard code the path to nmap w/in nmapfe. Thus it will work in the face of a
limited path.

Bug reported by:	Andre Albsmeier <andre.albsmeier@mchp.siemens.de>
1999-07-23 18:21:54 +00:00
David E. O'Brien
7efe79f49b Upgrade to nmap-2.2-BETA4. The beta includes a very nice GUI (xnmap) that
simplifies the running of nmap for the point and shoot crowd.
1999-07-22 18:33:45 +00:00
Tim Vanderhoek
a84b5b5f94 #4/4 enforcing Caps, no period
[Has anyone figured-out what makes the number 393 so interesting to PW, now?]

I wonder what was going through Jordan's head during his infamous
$Id$-smashing commit.

Before I forget....

Thanks to naddy@mips.rhein-neckar.de (Christian Weisgerber) for prompting
this commit.  See msg-id: 7geokh$tje$1@mips.rhein-neckar.de
1999-06-26 19:22:14 +00:00
Michael Haro
46162f4b9d Add WWW: to DESCR files 1999-05-03 04:04:46 +00:00