Nmap Development mailing list archives
Re: tls-ticketbleed script fails scanning all ports
From: Daniel Miller <bonsaiviking () gmail com>
Date: Wed, 28 Jun 2017 18:54:13 -0500
Frank, tls-ticketbleed requires root privileges in order to run. The portrule of the script checks for this and safely quits if you don't have sufficient privileges, but using "+" bypasses the portrule. In this case, it falls to pcap_open to fail, because without root privileges, host.interface is empty (only root can route over specific interfaces). Dan On Wed, Jun 28, 2017 at 4:22 AM, Frank Büttner <frank.buettner () mdc-berlin de> wrote:
Hello,
using the tls-ticketbleed in the all port mode of nmap the script fails.
running nmap --script tls-ticketbleed -Pn -p 443 host
will run fine.
But call nmap -d --script +tls-ticketbleed -Pn -p 443 host
will result in:
NSE: Starting tls-ticketbleed against host (address).
NSE: tls-ticketbleed against host (address) threw an error!
/usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:118: bad argument #1
to 'pcap_open' (string expected, got nil)
stack traceback:
[C]: in method 'pcap_open'
/usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:118: in upvalue
'is_vuln'
/usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:350: in function
</usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:321>
(...tail calls...)
OS: CentOS 7.3
Nmap: 7.50
Thanks for any help.
Frank
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- tls-ticketbleed script fails scanning all ports Frank Büttner (Jun 28)
- Re: tls-ticketbleed script fails scanning all ports Daniel Miller (Jun 28)
- Re: tls-ticketbleed script fails scanning all ports Frank Büttner (Jun 28)
- Re: tls-ticketbleed script fails scanning all ports Daniel Miller (Jun 28)
