[Plugins-writers] Nmap.nasl

From: Herman Young (herman@private)
Date: Mon May 30 2005 - 04:58:10 PDT


 

Recent changes to nmap affects the time it takes to port scan a firewalled
host. This will in turn affect Nessus scans when nmap.nasl is used.

Reference: http://seclists.org/lists/nmap-dev/2004/Oct-Dec/0143.html (Nmap
Development: nmap-3.7x MUCH slower than nmap-3.55 against firewalled hosts)

The bottom line is that a port scan against a class C network may take days
instead of hours due to the way that nmap now handles ICMP unreachables.

The workaround for this issue is to pass additional parameters to nmap
namely (--max_scan_delay 0).

Neither nmap.nasl or the Nessus client (version 2.2.4) cater for this option
yet.

According to the nmap changelog, this option was first included with version
3.75

The changes to nmap.nasl are the following:

 if (ver =~ "3.7[5-9]" || ver =~ "3.8")
 {
  script_add_preference(name: "Maximum wait between probes (ms)", value: "",
type: "entry");
 }

p = script_get_preference("Maximum wait between probes (ms)");
 if (p =~ '^[0-9]+$')
 {
   argv[i++] = "--max_scan_delay";
   argv[i++] = p;
   custom_policy ++;
 }

Of course the option needs to be included in the client as well to be useful
for most people, but for those who use the command line version with custom
.nessusrc files, changes to nmap.nasl will help in the mean time.

Regards,

=======================================================
Herman Young                      Tel: +27 12 460 0880
SensePost Information Security    Fax: +27 12 460 0885
http://www.sensepost.com | http://hackrack.co.za
=======================================================




_______________________________________________
Plugins-writers mailing list
Plugins-writers@private
http://mail.nessus.org/mailman/listinfo/plugins-writers



This archive was generated by hypermail 2.1.3 : Mon May 30 2005 - 05:30:47 PDT