what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Nmap 3.10 ALPHA 4 Statistics Patch

Nmap 3.10 ALPHA 4 Statistics Patch
Posted Dec 3, 2002
Authored by Ian Vitek | Site ixsecurity.com

The Nmap 3.10ALFA Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.

tags | tool, nmap
systems | unix
SHA-256 | 94c4fefef066b8ce76d1da4b519182a6de4456eff0e64cf22418271eeeecf0cc

Nmap 3.10 ALPHA 4 Statistics Patch

Change Mirror Download
diff -r -u nmap-3.10ALPHA3/NmapOps.h nmap-3.10ALPHA3IX/NmapOps.h
--- nmap-3.10ALPHA3/NmapOps.h 2002-09-16 04:54:43.000000000 +0200
+++ nmap-3.10ALPHA3IX/NmapOps.h 2002-11-10 11:24:26.000000000 +0100
@@ -80,6 +80,7 @@
// setPacketTrace(false) has been called
void setPacketTrace(bool pt) { pTrace = pt; }
int verbose;
+ int count;
int randomize_hosts;
int spoofsource; /* -S used */
char device[64];
diff -r -u nmap-3.10ALPHA3/nmap.cc nmap-3.10ALPHA3IX/nmap.cc
--- nmap-3.10ALPHA3/nmap.cc 2002-09-16 05:00:21.000000000 +0200
+++ nmap-3.10ALPHA3IX/nmap.cc 2002-11-10 10:07:53.000000000 +0100
@@ -172,6 +172,7 @@
{
{"version", no_argument, 0, 'V'},
{"verbose", no_argument, 0, 'v'},
+ {"count", no_argument, 0, 'c'},
{"debug", optional_argument, 0, 'd'},
{"help", no_argument, 0, 'h'},
{"max_parallelism", required_argument, 0, 'M'},
@@ -571,6 +572,7 @@
exit(0);
break;
case 'v': o.verbose++; break;
+ case 'c': o.count=1; break;
}
}

@@ -1208,6 +1210,7 @@
" -p <range> ports to scan. Example range: '1-1024,1080,6666,31337'\n"
" -F Only scans ports listed in nmap-services\n"
" -v Verbose. Its use is recommended. Use twice for greater effect.\n"
+ " -c Counting stats\n"
" -P0 Don't ping hosts (needed to scan www.microsoft.com and others)\n"
"* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys\n"
" -6 scans via IPv6 rather than IPv4\n"
diff -r -u nmap-3.10ALPHA3/scan_engine.cc nmap-3.10ALPHA3IX/scan_engine.cc
--- nmap-3.10ALPHA3/scan_engine.cc 2002-09-16 06:39:58.000000000 +0200
+++ nmap-3.10ALPHA3IX/scan_engine.cc 2002-11-10 15:31:11.000000000 +0100
@@ -536,6 +536,8 @@
struct scanstats ss;
int rawsd = -1;
int scanflags = 0;
+ int itimes = 0;
+ int iresends = 0;
int victim;
int senddelay = 0;
pcap_t *pd = NULL;
@@ -545,6 +547,7 @@
int res;
int connecterror = 0;
int starttime;
+ int lastcheckedtime;
struct sockaddr_storage sock;
struct sockaddr_in *sin = (struct sockaddr_in *) &sock;
#if HAVE_IPV6
@@ -700,6 +703,7 @@
}

starttime = time(NULL);
+ lastcheckedtime = 0;

if (scantype != SYN_SCAN)
ack_number = get_random_uint();
@@ -912,6 +916,15 @@
current->state = PORT_TESTING;
current->trynum = 0;
/* if (!testinglist) testinglist = current; */
+ if (o.count) {
+ itimes++;
+ if ( time(NULL) != lastcheckedtime ) {
+ lastcheckedtime = time(NULL);
+ log_write(LOG_STDOUT, "Tried: %5d (%d resends) \nP/S: %8.2f ETS: %7.0f \e[28D\e[A", itimes , iresends , (double) ( itimes ) / ( 1 + lastcheckedtime - starttime ) , (double) ( numports - itimes + iresends ) / ( (double) itimes / ( 1 + lastcheckedtime - starttime ) ) );
+ log_flush(LOG_STDOUT);
+ }
+ }
+
ss.numqueries_outstanding++;
gettimeofday(&current->sent[0], NULL);
if ((scantype == SYN_SCAN) || (scantype == WINDOW_SCAN) ||
@@ -1049,6 +1062,7 @@
current->state = PORT_FRESH;
current->trynum = 0;
current->sd[0] = current->sd[1] = current->sd[2] = -1;
+ iresends++;
if (o.debugging) {
log_write(LOG_STDOUT, "Preparing for retry, nonresponsive port %lu noted\n", current->portno);
}
@@ -1245,6 +1259,9 @@
int tries = 0;
int tmp = 0;
int starttime;
+ int lastcheckedtime;
+ int itimes = 0;
+ int iresends = 0;
u16 newport;
int newstate = 999; /* This ought to break something if used illegally */
struct portinfo *scan, *openlist, *current, *testinglist, *next;
@@ -1334,6 +1351,7 @@
fatal("Unknown scan type for super_scan"); }

starttime = time(NULL);
+ lastcheckedtime = 0;

if (o.debugging || o.verbose)
log_write(LOG_STDOUT, "Initiating %s against %s\n", scantype2str(scantype), target->NameIP(hostname, sizeof(hostname)));
@@ -1416,6 +1434,14 @@
/* lets send a packet! */
current->state = PORT_TESTING;
/* if (!testinglist) testinglist = current; */
+ if (o.count) {
+ itimes++;
+ if ( time(NULL) != lastcheckedtime ) {
+ lastcheckedtime = time(NULL);
+ log_write(LOG_STDOUT, "Tried: %5d (%d resends) \nP/S: %8.2f ETS: %7.0f \e[28D\e[A", itimes , iresends , (double) itimes / ( 1 + lastcheckedtime - starttime ) , (double) ( numports - itimes + iresends ) / ( (double) ( itimes + iresends ) / ( 1 + lastcheckedtime - starttime ) ) );
+ log_flush(LOG_STDOUT);
+ }
+ }
numqueries_outstanding++;
gettimeofday(&current->sent[0], NULL);
if (o.fragscan)
@@ -1637,6 +1663,7 @@
for(current = openlist; current; current = (current->next >= 0)? &scan[current->next] : NULL) {
current->state = PORT_FRESH;
current->trynum = 0;
+ iresends++;
if (o.debugging) {
log_write(LOG_STDOUT, "Preparing for retry, open port %lu noted\n", current->portno);
}
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close