aboutsummaryrefslogtreecommitdiffstats
path: root/security/nmap
Commit message (Collapse)AuthorAgeFilesLines
* Update to 3.00pat2002-08-062-3/+3
| | | | | PR: ports/41330 Submitted by: maintainer
* Portlint this, and remove the 1/2backed nmapfe GUI support as there is aobrien2002-05-281-16/+1
| | | | | proper nmapfe port. I do as one that created and maintained this port for 4 years.
* Update to the latestdwcjr2002-05-222-6/+19
| | | | | PR: 38305 Submitted by: maintainer
* To ports@freebsd.org.obrien2002-05-091-1/+1
|
* Update to version 2.54 Beta 33.obrien2002-04-292-2/+2
|
* Update to version 2.54 Beta 32.obrien2002-04-032-2/+2
|
* Update to version 2.54 Beta 31.obrien2002-03-212-2/+2
|
* Spelling error and whitespace changes.obrien2002-03-151-4/+4
| | | | | PR: 35888 Submitted by: Peter J. Avalos <pavalos@theshell.com>
* Do not try to install any parts of nmapfe from the nmap port. There iscjc2002-02-231-2/+1
| | | | | | | | | a separate port for nmapfe. Even though the attempt in the nmap port mostly fails since no nmapfe executable would have been built, files not appearing in the pkg-plist were being added to the system. PR: ports/35207 Approved by: obrien
* Only the nmap port should try to strip nmap. The nmapfe port alsocjc2002-02-231-1/+1
| | | | | | | | uses this make file. It should not try to strip the ${PREFIX}/bin/nmap executable. The install of nmapfe would fail if nmap did not exist. PR: ports/35207 Approved by: obrien
* Update to version 2.54 Beta 30.obrien2001-11-072-2/+2
|
* Update to version 2.54 Beta 29.obrien2001-08-102-2/+2
| | | | | + updated fingerprint database + multi-portlist -- specify different ranges for TCP & UDP
* Update to version 2.54 Beta 28.obrien2001-07-292-2/+2
|
* Update to version 2.54 Beta 27.obrien2001-07-212-2/+2
|
* Update to version 2.54 Beta 26.obrien2001-07-092-2/+2
| | | | | | | | | The coolest feature is a new scan type -- Idlescan! The quick synopsis is that this is a completely blind scan (meaning no packets are sent to the target from your real IP address). Instead, a unique side-channel attack exploits predictable "IP fragmentation ID" sequence generation on the zombie host to glean information about the open ports on the target.
* Update to version 2.54 Beta 25.obrien2001-06-042-2/+2
| | | | | | | | | -- Added a whole bunch of new OS fingerprints (and adjustments) ranging from big important ones (Linux 2.4.X, OpenBSD 2.9, FreeBSD 4.3, Cisco 12.2.1, MacOS X, etc) to some that are more obscure ( such as Apple Color LaserWriter 12/660 PS and VirtualAccess LinxpeedPro 120 ) -- Tweaked TCP Timestamp and IP.ID sequence classification algorithms
* Upgrade to 2.54BETA24.obrien2001-06-032-2/+2
| | | | | | + fixes a problem that kept UDP RPC scanning from working unless you were also doing a TCP scan. + updated to latest version of rpc program number list
* More changes needed to allow a slave port.obrien2001-05-282-7/+21
|
* Allow a slave port to work with this Makefile. To be used by nmapfe port.obrien2001-05-281-4/+3
|
* I forgot to commit this with the last upgrade.obrien2001-04-151-0/+1
| | | | Submitted by: steve
* While the previous patch worked, this is a fresh one generated fromobrien2001-04-081-9/+10
| | | | this version's sources.
* Update to version 2.54 Beta 22.obrien2001-03-212-2/+3
|
* Remove patch NOT approved by me (maintainer), that is in my way whileobrien2001-03-172-32/+7
| | | | | doing an upgrade. This patch does not fix a bug, takes away the original author's right to free speach, and we have no technical reason to patch.
* Remove redundant/inappropriate CATEGORIES. People need to start readingwill2000-06-021-1/+1
| | | | the Porter's Handbook. :-)
* update to 2.53.obrien2000-05-102-2/+2
| | | | (fix commenting bug that caused major problems for some non-gcc users)
* Update to version 2.52.obrien2000-05-053-25/+7
| | | | [fixes minor typos in 2.51]
* Update to 2.51.obrien2000-04-304-22/+13
| | | | | 2.51 fixes a target parsing bug which could in some cases cause Nmap to crash with the error "Assertion `t->nleft > 1' failed".
* Correct whitespace introduced during PORTNAME conversion and portlintmharo2000-04-211-1/+1
|
* Update to version 2.30 beta 20.obrien2000-04-192-3/+3
|
* Update with the new PORTNAME/PORTVERSION variablescpiazza2000-04-101-3/+3
|
* Update to 2.30 Beta #18.obrien2000-04-073-8/+8
| | | | | * Fixed a very important bug that occurred when SYN scanning localhost. * Fixed "-vv" to mean "-v -v" as it did in previous versions.
* Update to version 2.3 beta 17.obrien2000-03-273-10/+13
| | | | | | | | | | | | | | | | * Added ACK scanning. This scan technique is great for testing firewall rulesets. It can NOT find open ports, but it can distinguish between filtered/unfilterd by sending an ACK packet to each port and waiting for a RST to come back. Filtered ports will not send back a RST (or will send ICMP unreachables). This scan type is activated with -sA . * Documented the Window scan (-sW) * "Protocol" field in output eliminated. It is now printed right next to the number (/etc/services style). Like "22/tcp". * Added --resume option to continue a large network scan where you left off. It also allows you to start and stop for policy reasons
* Restore useless version required comments.obrien2000-03-221-0/+1
|
* Remove the "version required" line.obrien2000-03-201-1/+0
|
* PLIST related fixes.reg2000-02-272-0/+10
|
* New patch to eliminate editorial in reference file.dbaker2000-02-181-0/+11
| | | | Submitted by: David McNett <nugget@slacker.com>
* Style nits in the ports I maintain.obrien2000-02-131-2/+2
|
* UpDat3 t0 v3r$i0n 2.3 B3ta 14obrien2000-01-281-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | Among bug fixes, we have the new skript kiddie output mode! Try it out by adding "-oS - " to your nmap command line: amy# nmap -sS -oS - -O -v vectra $TartInG nmap V. 2.3B3tA14 bY fy0D0r@!n$ecure.org ( www.ins3cuR3.0Rg/nmap/) !nt3r3$t|nG pOrtz On v3cTrA.yuma.nEt (192.168.0.5): P0rt $tate PrOtOc0L $3rv!c3 13 Op3n tCp Dayt|m3 22 0pEn Tcp $SH 23 open tcp tEln3t 79 op3N tcp f!ng3r 513 0peN Tcp lOgIn 514 OpEn tcp $h3ll TcP S3QuEncE PReDiCtion: ClA$s=random p0$|TivE incr3m3nts DIffIculty=24696 (WorthY Challeng3) s3quEnce numb3rz: 61B825b7 61b83793 61B88114 61b8B073 61B90DB2 61BA306B R3m0t3 operAtInG sy$t3m gue$z: OpeNBSD 2.2 - 2.3 NMAP run c0mpleteD -- 1 IP adDR3ss (1 h0sT up) $CAnNed in 1 SEC0nd
* Update to version 2.3 Beta 14obrien2000-01-282-14/+13
|
* Upgrade to version 2.3 BETA 13.obrien2000-01-172-3/+3
|
* Upgrade to version 2.3BETA12.obrien2000-01-044-7/+9
| | | | Submitted by: taguchi@tohoku.iij.ad.jp
* Update to 2.3 beta #9.obrien1999-12-082-3/+3
| | | | This speeds up OS scans.
* Update to 2.3 Beta8.obrien1999-11-222-3/+3
| | | | | | | | | | | * Added "firewall mode" timing optimizations which can decrease the amount of time neccessary to SYN or connect scan some heavily filtered hosts. * Changed "TCP Ping" to use a random ACK value rather than 0 (an IDS called Snort was using this to detect Nmap TCP pings). * better FDDI support * changes which should lead to tremendous speedups against some firewalled hosts.
* Upgrade to 2.3BETA6.obrien1999-09-202-3/+3
| | | | | | | | | | | | | | * Added sophisticated timing controls to give the user much more control over Nmap's speed. This allows you to make Nmap much more aggressive to scan hosts faster, or you can make Nmap more "polite" -- slower but less likely to wreak havoc on your Network. You can even enforce large delays between sending packets to sneak under IDS thresholds and prevent detection. See the new "Timing Options" section of the Nmap man page for more information on using this. * New "Window scan" that does fun things with ACK packets. -sW activates this scan type. It is mostly effective against BSD, AIX, Digital UNIX, and various older HP/UX, SunOS, and VAX.
* Remove the X dependent componate. It has become its own port.obrien1999-09-182-6/+0
|
* Upgrade to 2.3BETA5.obrien1999-09-072-3/+3
| | | | | This includes new RPC scanning ability & 100's of new OS fingerprints. The machine parseable output has been cleaned up and made more regular.
* $Id$ -> $FreeBSD$peter1999-08-313-3/+3
|
* Hard code the path to nmap w/in nmapfe. Thus it will work in the face of aobrien1999-07-242-0/+46
| | | | | | limited path. Bug reported by: Andre Albsmeier <andre.albsmeier@mchp.siemens.de>
* Upgrade to nmap-2.2-BETA4. The beta includes a very nice GUI (xnmap) thatobrien1999-07-234-9/+16
| | | | simplifies the running of nmap for the point and shoot crowd.
* #4/4 enforcing Caps, no periodhoek1999-06-271-1/+1
| | | | | | | | | | | | [Has anyone figured-out what makes the number 393 so interesting to PW, now?] I wonder what was going through Jordan's head during his infamous $Id$-smashing commit. Before I forget.... Thanks to naddy@mips.rhein-neckar.de (Christian Weisgerber) for prompting this commit. See msg-id: 7geokh$tje$1@mips.rhein-neckar.de
* Add WWW: to DESCR filesmharo1999-05-031-3/+4
|
* Don't set OSVERSION; bsd.port.pre.mk already did.fenner1999-04-081-2/+1
| | | | Found by: building ports with sysctl not in my path
* Upgrade to 2.12.obrien1999-04-052-3/+3
|
* Upgrade to 2.11.obrien1999-04-032-3/+3
|
* upgrade to 2.08obrien1999-02-172-3/+4
|
* Correct Version required: lineflathill1999-02-111-3/+2
|
* Update to 2.07flathill1999-02-112-4/+4
|
* upgrade to 2.06obrien1999-02-092-3/+3
|
* upgrade to 2.05obrien1999-02-084-9/+19
|
* upgrade to 2.03obrien1999-01-282-3/+3
|
* upgrade to 2.02obrien1998-12-302-3/+3
|
* Need to include bsd.port.pre.mk before using ${OSVERSION}.asami1998-12-271-2/+4
|
* upgrade to 2.01obrien1998-12-172-3/+3
| | | | [many new OS fingerprints included :-) ]
* Somehow this delete didn't propagate.obrien1998-12-171-20/+0
|
* Upgrade to 2.00.obrien1998-12-155-13/+28
|
* Fix the bug when the user specs the source address as the tun0/ppp0asami1998-11-301-0/+20
| | | | | | link. Submitted by: jmb
* * Nuke included libpcap so I don't make the mistake ache fixed again.obrien1998-08-212-20/+15
| | | | * Prefer -u diffs over -c
* Old version use bpf.h from internal libpcap and link withache1998-08-183-2/+21
| | | | | | system libpcap in the same time. Fix to use <net/bpf.h> instead New manpages scheme
* Added "net" to categoriesobrien1998-08-051-2/+2
|
* nmap is a utility for port scanning large networksobrien1998-08-056-0/+126
Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap incorporats virtually every scanning technique known of. See the nmap homepage at http://www.insecure.org/nmap/index.html