Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: Ncat portable for Windows (static edition)
From: Fyodor <fyodor () insecure org>
Date: Thu, 30 Jun 2011 14:27:40 -0700

On Thu, Jun 30, 2011 at 06:35:56PM +0300, Shinnok wrote:

Removed the instructions from INSTALL and left a note with a link to the
afferent Secwiki page in r24505.

Thanks, I built successfully with those instructions and my portable
ncat.exe seems to work.  I added information and a download link for
the 5.59 binaries to the Ncat page (http://nmap.org/ncat/).  I didn't
want to get people excited about the portable Win32 Ncat without
offering them the binary too.

Hopefully, it was fast enough. The page is a first draft, but it look
good enough, I'll improve it further later.

OK, here are some suggestions I had when reading through it:

o The boxes in the gray boxes on secwiki page are because of spaces
  before the text.  It would be good to clean it up a bit so (for
  example) you can use real enumerated lists rather than writing out
  1), 2), etc.

o Maybe you can include a reference link or something to "Open the
  Visual Studio 2010 command prompt".  I thought that was a mistake
  until I realized that there actually was such a thing.

o The wiki doesn't really like the "======================" line.
  Instead, I'd use markup like "=Building Ncat Portable for Windows=" or
  something to make the title stand out.

The only big pain in the ass is WinPcap and it's kernel drivers for
Windows. So everything that uses that is a no-no. I am thinking about
some hacks(binary packing and runtime unpacking and automatic driver

I think CACE actually has a "WinPcap Professional" which helps with
some of that
(http://www.riverbed.com/us/products/cascade/winpcap_pro.php), but it
isn't open source :(.

In any case, Ncat was the application I most wanted to make portable.
I'm not as concerned with the other suite members.

PS: What about Linux static binaries?

The binaries in our RPMs are as portable as we can make them.  Even on
non-RPM-based distributions, hopefully users can figure out how to
extract the binaries from an RPM file if they need to.

Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]