亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? osscan2.cc

?? Ubuntu packages of security software。 相當不錯的源碼
?? CC
?? 第 1 頁 / 共 5 頁
字號:
/*************************************************************************** * osscan2.cc -- Routines used for 2nd Generation OS detection via         * * TCP/IP fingerprinting.  * For more information on how this works in     * * Nmap, see http://insecure.org/nmap/osdetect/                            * *                                                                         * ***********************IMPORTANT NMAP LICENSE TERMS************************ *                                                                         * * The Nmap Security Scanner is (C) 1996-2008 Insecure.Com LLC. Nmap is    * * also a registered trademark of Insecure.Com LLC.  This program is free  * * software; you may redistribute and/or modify it under the terms of the  * * GNU General Public License as published by the Free Software            * * Foundation; Version 2 with the clarifications and exceptions described  * * below.  This guarantees your right to use, modify, and redistribute     * * this software under certain conditions.  If you wish to embed Nmap      * * technology into proprietary software, we sell alternative licenses      * * (contact sales@insecure.com).  Dozens of software vendors already       * * license Nmap technology such as host discovery, port scanning, OS       * * detection, and version detection.                                       * *                                                                         * * Note that the GPL places important restrictions on "derived works", yet * * it does not provide a detailed definition of that term.  To avoid       * * misunderstandings, we consider an application to constitute a           * * "derivative work" for the purpose of this license if it does any of the * * following:                                                              * * o Integrates source code from Nmap                                      * * o Reads or includes Nmap copyrighted data files, such as                * *   nmap-os-fingerprints or nmap-service-probes.                          * * o Executes Nmap and parses the results (as opposed to typical shell or  * *   execution-menu apps, which simply display raw Nmap output and so are  * *   not derivative works.)                                                *  * o Integrates/includes/aggregates Nmap into a proprietary executable     * *   installer, such as those produced by InstallShield.                   * * o Links to a library or executes a program that does any of the above   * *                                                                         * * The term "Nmap" should be taken to also include any portions or derived * * works of Nmap.  This list is not exclusive, but is just meant to        * * clarify our interpretation of derived works with some common examples.  * * These restrictions only apply when you actually redistribute Nmap.  For * * example, nothing stops you from writing and selling a proprietary       * * front-end to Nmap.  Just distribute it by itself, and point people to   * * http://insecure.org/nmap/ to download Nmap.                             * *                                                                         * * We don't consider these to be added restrictions on top of the GPL, but * * just a clarification of how we interpret "derived works" as it applies  * * to our GPL-licensed Nmap product.  This is similar to the way Linus     * * Torvalds has announced his interpretation of how "derived works"        * * applies to Linux kernel modules.  Our interpretation refers only to     * * Nmap - we don't speak for any other GPL products.                       * *                                                                         * * If you have any questions about the GPL licensing restrictions on using * * Nmap in non-GPL works, we would be happy to help.  As mentioned above,  * * we also offer alternative license to integrate Nmap into proprietary    * * applications and appliances.  These contracts have been sold to dozens  * * of software vendors, and generally include a perpetual license as well  * * as providing for priority support and updates as well as helping to     * * fund the continued development of Nmap technology.  Please email        * * sales@insecure.com for further information.                             * *                                                                         * * As a special exception to the GPL terms, Insecure.Com LLC grants        * * permission to link the code of this program with any version of the     * * OpenSSL library which is distributed under a license identical to that  * * listed in the included Copying.OpenSSL file, and distribute linked      * * combinations including the two. You must obey the GNU GPL in all        * * respects for all of the code used other than OpenSSL.  If you modify    * * this file, you may extend this exception to your version of the file,   * * but you are not obligated to do so.                                     * *                                                                         * * If you received these files with a written license agreement or         * * contract stating terms other than the terms above, then that            * * alternative license agreement takes precedence over these comments.     * *                                                                         * * Source is provided to this software because we believe users have a     * * right to know exactly what a program is going to do before they run it. * * This also allows you to audit the software for security holes (none     * * have been found so far).                                                * *                                                                         * * Source code also allows you to port Nmap to new platforms, fix bugs,    * * and add new features.  You are highly encouraged to send your changes   * * to fyodor@insecure.org for possible incorporation into the main         * * distribution.  By sending these changes to Fyodor or one the            * * Insecure.Org development mailing lists, it is assumed that you are      * * offering Fyodor and Insecure.Com LLC the unlimited, non-exclusive right * * to reuse, modify, and relicense the code.  Nmap will always be          * * available Open Source, but this is important because the inability to   * * relicense code has caused devastating problems for other Free Software  * * projects (such as KDE and NASM).  We also occasionally relicense the    * * code to third parties as discussed above.  If you wish to specify       * * special license conditions of your contributions, just say so when you  * * send them.                                                              * *                                                                         * * This program is distributed in the hope that it will be useful, but     * * WITHOUT ANY WARRANTY; without even the implied warranty of              * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU       * * General Public License for more details at                              * * http://www.gnu.org/copyleft/gpl.html , or in the COPYING file included  * * with Nmap.                                                              * *                                                                         * ***************************************************************************//* $Id: osscan.cc 3636 2006-07-04 23:04:56Z fyodor $ */#include "osscan.h"#include "osscan2.h"#include "timing.h"#include "NmapOps.h"#include "Target.h"#include "utils.h"#include <dnet.h>#include <list>#define NUM_FPTESTS    13/* The number of tries we normally do.  This may be increased if   the target looks like a good candidate for fingerprint submission, or fewer   if the user gave the --max-os-tries option */#define STANDARD_OS2_TRIES 2// The minimum (and target) amount of time to wait between probes// sent to a single host, in milliseconds.#define OS_PROBE_DELAY 25// The target amount of time to wait between sequencing probes sent to// a single host, in milliseconds.  The ideal is 500ms because of the// common 2Hz timestamp frequencies.  Less than 500ms and we might not// see any change in the TS counter (and it gets less accurate even if// we do).  More than 500MS and we risk having two changes (and it// gets less accurate even if we have just one).  So we delay 100MS// between probes, leaving 500MS between 1st and 6th.#define OS_SEQ_PROBE_DELAY 100using namespace std;extern NmapOps o;/* 8 options: *  0~5: six options for SEQ/OPS/WIN/T1 probes. *  6:   ECN probe. *  7-12:   T2~T7 probes. * * option 0: WScale (10), Nop, MSS (1460), Timestamp, SackP * option 1: MSS (1400), WScale (0), Nop, SackP, T * option 2: T, Nop, Nop, WScale (5), Nop, MSS (640) * option 3: SackP, T, WScale (10), Nop * option 4: MSS (536), SackP, T, WScale (10), Nop * option 5: MSS (265), SackP, Nop, Nop, T, Nop, End * option 6: WScale (10), Nop, MSS (1460), SackP, Nop, Nop * option 7-11: WScale (10), Nop, MSS (265), T, SackP * option 12: WScale (15), Nop, MSS (265), T, SackP */static struct {  u8* val;  int len;} prbOpts[] = {  {(u8*) "\003\003\012\001\002\004\005\264\010\012\377\377\377\377\000\000\000\000\004\002", 20},  {(u8*) "\002\004\005\170\003\003\000\004\002\010\012\377\377\377\377\000\000\000\000\0", 20},  {(u8*) "\010\012\377\377\377\377\000\000\000\000\001\001\003\003\005\001\002\004\002\200", 20},  {(u8*) "\004\002\010\012\377\377\377\377\000\000\000\000\003\003\012\0", 16},  {(u8*) "\002\004\002\030\004\002\010\012\377\377\377\377\000\000\000\000\003\003\012\0", 20},  {(u8*) "\002\004\001\011\004\002\010\012\377\377\377\377\000\000\000\000", 16},  {(u8*) "\003\003\012\001\002\004\005\264\004\002\001\001", 12},  {(u8*) "\003\003\012\001\002\004\001\011\010\012\377\377\377\377\000\000\000\000\004\002", 20},  {(u8*) "\003\003\012\001\002\004\001\011\010\012\377\377\377\377\000\000\000\000\004\002", 20},  {(u8*) "\003\003\012\001\002\004\001\011\010\012\377\377\377\377\000\000\000\000\004\002", 20},  {(u8*) "\003\003\012\001\002\004\001\011\010\012\377\377\377\377\000\000\000\000\004\002", 20},  {(u8*) "\003\003\012\001\002\004\001\011\010\012\377\377\377\377\000\000\000\000\004\002", 20},  {(u8*) "\003\003\017\001\002\004\001\011\010\012\377\377\377\377\000\000\000\000\004\002", 20}};/* Numbering is the same as for prbOpts[] */u16 prbWindowSz[] = { 1, 63, 4, 4, 16, 512, 3, 128, 256, 1024, 31337, 32768, 65535 };/* A global now. Updated after potentially meaningful delays. This can * be used to save a call to gettimeofday() */static struct timeval now;class OFProbe;class HostOsScanStats;class HostOsScan;class HostOsScanInfo;class OsScanInfo;/* Performance tuning variable. */struct os_scan_performance_vars {  int low_cwnd;  /* The lowest cwnd (congestion window) allowed */  int host_initial_cwnd; /* Initial congestion window for ind. hosts */  int group_initial_cwnd; /* Initial congestion window for all hosts as a group */  int max_cwnd; /* I should never have more than this many probes                   outstanding */  int quick_incr; /* How many probes are incremented for each response                     in quick start mode */  int cc_incr; /* How many probes are incremented per (roughly) rtt in                   congestion control mode */  int initial_ccthresh;  /* When a successful ping response comes back, it counts as this many     "normal" responses, because the fact that pings are neccessary means     we aren't getting much input. */  int ping_magnifier;  /* Try to send a scanping if no response has been received from a target host     in this many usecs */  int pingtime;  double group_drop_cwnd_divisor; /* all-host group cwnd divided by this                                     value if any packet drop occurs */  double group_drop_ccthresh_divisor; /* used to drop the group ccthresh when                                         any drop occurs */  double host_drop_ccthresh_divisor; /* used to drop the host ccthresh when                                        any drop occurs */  int tryno_cap; /* The maximum trynumber (starts at zero) allowed */} perf;/* Some of the algorithms used here are TCP congestion control   techniques from RFC2581. */struct osscan_timing_vals {  double cwnd; /* Congestion window - in probes */    /* The threshold after which mode is changed from QUICK_START to     CONGESTION_CONTROL */  int ccthresh;    /* Number of updates to this utv (generally packet receipts ) */  int num_updates;    /* Last time values were adjusted for a drop (you usually only want     to adjust again based on probes sent after that adjustment so a     sudden batch of drops doesn't destroy timing.  Init to now */  struct timeval last_drop;};typedef enum OFProbeType {  OFP_UNSET,  OFP_TSEQ,  OFP_TOPS,  OFP_TECN,  OFP_T1_7,  OFP_TICMP,  OFP_TUDP} OFProbeType;class OFProbe{public:  OFProbe();    /* The literal string for the current probe type. */  const char *typestr();  /* Type of the probe: for what os fingerprinting test? */  OFProbeType type;  /* Subid of this probe to separate different tcp/udp/icmp. */  int subid;  int tryno; /* Try (retransmission) number of this probe */    /* A packet may be timedout for a while before being retransmitted     due to packet sending rate limitations */  bool retransmitted;    struct timeval sent;    /* Time the previous probe was sent, if this is a retransmit (tryno > 0) */  struct timeval prevSent;};/* * HostOsScanStats stores the status for a host being scanned  * in a scan round. */class HostOsScanStats{  friend class HostOsScan;public:  HostOsScanStats(Target *t);  ~HostOsScanStats();  void initScanStats();    void addNewProbe(OFProbeType type, int subid);  void removeActiveProbe(list<OFProbe *>::iterator probeI);/* Get an active probe from active probe list identified by probe type   and subid.  returns probesActive.end() if there isn't one. */  list<OFProbe *>::iterator getActiveProbe(OFProbeType type, int subid);  void moveProbeToActiveList(list<OFProbe *>::iterator probeI);  void moveProbeToUnSendList(list<OFProbe *>::iterator probeI);  unsigned int numProbesToSend() {return probesToSend.size();}  unsigned int numProbesActive() {return probesActive.size();}  FingerPrint *getFP() {fpPassed = true; return FP;}    Target *target; /* the Target */  struct seq_info si;  struct ipid_info ipid;  /*   * distance, distance_guess: hop count between us and the target.   *   * Possible values of distance:   *   0: when scan self;   *   1: when scan a target on the same network segment;   * >=1: not self, not same network and nmap has got the icmp reply to the U1 probe.   *  -1: none of the above situations.   *   * Possible values of distance_guess:   *  -1: nmap fails to get a valid ttl by all kinds of probes.   * >=1: a guessing value based on ttl.   */  int distance;  int distance_guess;    /* Returns the amount of time taken between sending 1st tseq probe     and the last one.  Zero is     returned if we didn't send the tseq probes because there was no     open tcp port */  double timingRatio();private:  /* Ports of the targets used in os fingerprinting. */    int openTCPPort, closedTCPPort, closedUDPPort;  /* Probe list used in tests. At first, probes are linked in   * probesToSend; when a probe is sent, it will be removed from   * probesToSend and appended to probesActive. If any probes in   * probesActive are timedout, they will be moved to probesToSend and   * sent again till expired.   */    list<OFProbe *> probesToSend;  list<OFProbe *> probesActive;  /* A record of total number of probes that have been sent to this   * host, including restranmited ones. */  unsigned int num_probes_sent;  /* Delay between two probes. */  unsigned int sendDelayMs;  /* When the last probe is sent. */  struct timeval lastProbeSent;  struct osscan_timing_vals timing;  /*   * Fingerprint of this target. When a scan is completed, it'll   * finally be passed to hs->target->FPR->FPs[x].   */  FingerPrint *FP;  FingerPrint *FPtests[NUM_FPTESTS];#define FP_TSeq  FPtests[0]#define FP_TOps  FPtests[1]#define FP_TWin  FPtests[2]#define FP_TEcn  FPtests[3]#define FP_T1_7_OFF 4#define FP_T1    FPtests[4]#define FP_T2    FPtests[5]#define FP_T3    FPtests[6]#define FP_T4    FPtests[7]#define FP_T5    FPtests[8]#define FP_T6    FPtests[9]#define FP_T7    FPtests[10]#define FP_TUdp  FPtests[11]#define FP_TIcmp FPtests[12]  struct AVal *TOps_AVs[6]; /* 6 AVs of TOps */  struct AVal *TWin_AVs[6]; /* 6 AVs of TWin */  /* Whether the above FPs is passed. If not and the hss stats is to be	 deleted, delete the FPs. This happens when the host is timedout	 during the scan. */  bool fpPassed;  /* The following are variables to store temporary results   * during the os fingerprinting process of this host.   */  u16 lastipid;  struct timeval seq_send_times[NUM_SEQ_SAMPLES];  int TWinReplyNum; /* how many TWin replies are received. */  int TOpsReplyNum; /* how many TOps replies are received. Actually it is the same with TOpsReplyNum. */  struct ip *icmpEchoReply; /* To store one of the two icmp replies */  int storedIcmpReply; /* Which one of the two icmp replies is stored? */    struct udpprobeinfo upi; /* info of the udp probe we sent */};

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一区二区偷拍精品| 99免费精品视频| 成人午夜激情片| 欧美日韩亚洲国产综合| 久久在线观看免费| 亚洲一区二区三区爽爽爽爽爽 | 亚洲国产日韩a在线播放| 蜜桃视频第一区免费观看| av欧美精品.com| 久久美女艺术照精彩视频福利播放 | 91看片淫黄大片一级在线观看| 欧美高清dvd| 国产精品不卡在线观看| 久色婷婷小香蕉久久| 在线视频一区二区免费| 中文字幕在线观看一区二区| 久久精工是国产品牌吗| 欧美日韩国产123区| 亚洲欧美激情插| 国产成人精品亚洲日本在线桃色| 色综合天天做天天爱| 欧美国产欧美亚州国产日韩mv天天看完整| 午夜免费久久看| 在线观看日韩电影| 亚洲人成亚洲人成在线观看图片 | 国产欧美一区二区三区网站| 免费成人性网站| 欧美精品第1页| 亚洲福利一区二区| 91成人免费网站| 综合av第一页| 94色蜜桃网一区二区三区| 国产精品免费视频网站| 国产suv精品一区二区883| 亚洲精品在线观| 国产成人在线视频免费播放| 精品国产免费一区二区三区香蕉| 蜜臀av性久久久久蜜臀aⅴ | 高清不卡一区二区| 久久蜜桃一区二区| 国产成人av电影在线| 中文字幕欧美国产| 99在线精品免费| 亚洲精品成人a在线观看| 色综合久久久网| 亚洲一区二区精品久久av| 欧美私模裸体表演在线观看| 亚洲一二三四在线| 日韩欧美电影一区| 激情深爱一区二区| 中文字幕欧美国产| 97se狠狠狠综合亚洲狠狠| 亚洲在线视频网站| 91精品在线免费观看| 久久99久久久久| 欧美激情中文不卡| 在线观看日韩一区| 日本亚洲三级在线| 国产清纯在线一区二区www| 成av人片一区二区| 亚洲成av人影院| 日韩免费成人网| 高清视频一区二区| 综合久久给合久久狠狠狠97色| 欧美无人高清视频在线观看| 美女尤物国产一区| 亚洲欧洲美洲综合色网| 欧美日韩午夜精品| 国产精品一级片在线观看| 亚洲精品国产精品乱码不99| 欧美精品xxxxbbbb| 成人午夜激情片| 香蕉av福利精品导航| 国产午夜精品在线观看| 欧美性做爰猛烈叫床潮| 国产一区二区三区黄视频 | 男男视频亚洲欧美| 欧美国产精品专区| 欧美日韩久久不卡| 成人动漫中文字幕| 男男视频亚洲欧美| 亚洲欧洲日产国码二区| 精品久久久久久综合日本欧美| 99久久精品一区二区| 另类小说综合欧美亚洲| 亚洲欧美另类综合偷拍| 26uuu精品一区二区| 色视频欧美一区二区三区| 极品少妇xxxx精品少妇偷拍| 一区二区三区四区中文字幕| 日韩欧美色电影| 欧美午夜精品久久久久久超碰 | 91精品在线观看入口| 99国产精品久久久久久久久久久 | 美国欧美日韩国产在线播放| 亚洲欧美aⅴ...| 久久伊人蜜桃av一区二区| 欧美高清一级片在线| 在线免费观看成人短视频| 国产69精品久久久久毛片| 蜜臀久久久久久久| 亚洲第一激情av| 亚洲女人小视频在线观看| 欧美经典三级视频一区二区三区| 制服丝袜中文字幕亚洲| 91成人网在线| 日本黄色一区二区| 97se亚洲国产综合在线| 99久久er热在这里只有精品66| 国产精品中文字幕日韩精品| 日本欧美韩国一区三区| 亚洲h在线观看| 亚洲一区二区三区视频在线播放 | 色诱视频网站一区| 成人99免费视频| 99国产精品国产精品久久| 岛国一区二区在线观看| 国产精品羞羞答答xxdd| 国产精品中文字幕日韩精品 | 国产亚洲va综合人人澡精品| 26uuu欧美| 国产视频亚洲色图| 欧美国产一区视频在线观看| 国产丝袜美腿一区二区三区| 久久精品一二三| 国产精品乱人伦| 亚洲丝袜美腿综合| 一区二区免费看| 亚洲成人av中文| 久久精品国产亚洲一区二区三区| 男人的天堂久久精品| 国产一区二区导航在线播放| 狠狠色综合日日| 成人动漫在线一区| 91精品福利视频| 91精品国产综合久久蜜臀| 日韩欧美国产综合一区| 久久久99免费| 亚洲日本va午夜在线电影| 亚洲自拍偷拍麻豆| 美女在线观看视频一区二区| 国产美女精品一区二区三区| 成人看片黄a免费看在线| 色狠狠色狠狠综合| 欧美一区二区在线不卡| 2022国产精品视频| 亚洲免费观看在线视频| 亚洲不卡一区二区三区| 久久99国产乱子伦精品免费| 高清在线不卡av| 欧美日韩精品一区二区三区四区 | 欧美日韩国产片| 26uuu亚洲| 一区二区三区在线免费视频| 热久久一区二区| 国产精品一区不卡| 在线日韩国产精品| 久久久天堂av| 亚洲最新视频在线播放| 国产原创一区二区三区| 在线免费视频一区二区| 亚洲精品一区在线观看| 一区二区三区在线免费观看| 韩国一区二区在线观看| 色婷婷综合激情| 久久久九九九九| 五月开心婷婷久久| 成人深夜视频在线观看| 91精品国产综合久久福利| 成人免费一区二区三区视频 | 久久久91精品国产一区二区精品 | 亚洲午夜久久久久中文字幕久| 黑人精品欧美一区二区蜜桃| 在线免费观看视频一区| 日本一区二区高清| 日韩av电影免费观看高清完整版 | 黄色资源网久久资源365| 欧美亚洲另类激情小说| 国产丝袜在线精品| 久久精品国产色蜜蜜麻豆| 91久久精品一区二区三| 国产精品视频免费看| 精品一区二区三区免费播放| 欧美日韩国产bt| 亚洲福利视频一区二区| 播五月开心婷婷综合| 久久久久99精品一区| 麻豆国产欧美一区二区三区| 欧美日韩国产综合一区二区三区 | 久久久国产午夜精品| 日本伊人色综合网| 欧美日韩亚洲另类| 亚洲一二三四久久| 色94色欧美sute亚洲线路一久 | 亚洲欧美日韩综合aⅴ视频| 国产高清亚洲一区| 久久精品一二三| 国产精品123| 久久久久9999亚洲精品| 国产精品1024|