Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: Running NMAP as a non root user - patch (capabilities)
From: Martin Mačok <martin.macok () underground cz>
Date: Tue, 17 May 2005 12:19:01 +0200

On Mon, May 16, 2005 at 11:54:22AM -0700, Fyodor wrote:

  Added new --privileged command-line option and NMAP_PRIVILEGED
  environmental variable.  Either of these tell Nmap to assume that
  the user has full privileges to execute raw packet scans, OS
  detection and the like.

Anyway, we could check if we have required capabilities if we are not
root. This is the way we do it (while using custom kernel module that
gives those capabilities to specified uids/gids):

http://Xtrmntr.org/ORBman/tmp/nmap-3.51-noroot_autocap.patch
(applies to 3.81 too)

Martin Mačok
ICT Security Consultant


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]