Nmap Development mailing list archives
Zenmap 7.70 crashing on Windows 7
From: Jasey DePriest <jrdepriest () gmail com>
Date: Fri, 14 Sep 2018 12:08:14 -0400
Good morning, When I run Zenmap it crashes somewhere in the service discovery or script portion. I can't be sure which since I lose the log when it crashes. It doesn't crash against every system, but it does reliably crash against certain systems. It may be related to firewall interference, but it wasn't clear from the crash. Also, I can run the same command from nmap and it runs to completion. I was unable to get Zenmap to write to a zenmap.exe.log file soI ran it from Cygwin bash and got this: /cygdrive/c/Program Files (x86)/Nmap $ ./zenmap -v -v -v ** Gdk:ERROR:gdkdrawable-win32.c:2040:_gdk_win32_drawable_finish: assertion failed: (impl->hdc_count == 0) It doesn't seem very helpful. This is the command I was using in Zenmap: nmap -sS -sU -sV -p T:-,U:58437,53,67,68,69,88,111,123,135,137,138,139,161,162,445,500,514,520,631,1433,1434,1812,1813,1900,4500,6481,49152-49161 -T4 -O -A -v --max-rtt-timeout 10m --max-scan-delay 45s --host-timeout 2h -PE --reason --traceroute --script acarsd-info,address-info,afp-ls,afp-serverinfo,afp-showmount,ajp-auth,ajp-headers,ajp-methods,ajp-request,allseeingeye-info,amqp-info,auth-owners,auth-spoof,backorifice-info,bacnet-info,banner,bitcoin-getaddr,bitcoin-info,bitcoinrpc-info,bittorrent-discovery,bjnp-discover,cassandra-info,cics-info,citrix-enum-apps-xml,citrix-enum-apps,citrix-enum-servers-xml,citrix-enum-servers,clock-skew,coap-resources,couchdb-databases,couchdb-stats,creds-summary,cups-info,cups-queue-info,daap-get-library,daytime,db2-das-info,dhcp-discover,dict-info,dns-brute,dns-cache-snoop,dns-client-subnet-scan,dns-ip6-arpa-scan,dns-nsec-enum,dns-nsec3-enum,dns-nsid,dns-recursion,dns-service-discovery,dns-srv-enum,dns-zone-transfer,drda-info,duplicates,enip-info,epmd-info,eppc-enum-processes,fcrdns,finger,firewalk,flume-master-info,fox-info,freelancer-info,ftp-anon,ftp-bounce,ftp-syst,ganglia-info,giop-info,gkrellm-info,gopher-ls,gpsd-info,hadoop-datanode-info,hadoop-jobtracker-info,hadoop-namenode-info,hadoop-secondary-namenode-info,hadoop-tasktracker-info,hbase-master-info,hbase-region-info,hddtemp-info,hnap-info,http-affiliate-id,http-apache-negotiation,http-apache-server-status,http-aspnet-debug,http-auth-finder,http-auth,http-backup-finder,http-cakephp-version,http-chrono,http-cisco-anyconnect,http-comments-displayer,http-cookie-flags,http-cors,http-date,http-default-accounts,http-devframework,http-drupal-enum-users,http-drupal-enum,http-enum,http-errors,http-favicon,http-feed,http-fetch,http-frontpage-login,http-generator,http-git,http-gitweb-projects-enum,http-grep,http-headers,http-internal-ip-disclosure,http-ls,http-malware-host,http-mcmp,http-methods,http-mobileversion-checker,http-ntlm-info,http-open-redirect,http-php-version,http-put,http-qnap-nas-info,http-referer-checker,http-robots.txt,http-security-headers,http-sitemap-generator,http-slowloris-check,http-svn-enum,http-svn-info,http-title,http-trace,http-traceroute,http-unsafe-output-escaping,http-useragent-tester,http-vhosts,http-vlcstreamer-ls,http-vmware-path-vuln,http-vuln-cve2010-0738,http-vuln-cve2011-3192,http-vuln-cve2014-2126,http-vuln-cve2014-2127,http-vuln-cve2014-2128,http-vuln-cve2014-2129,http-vuln-cve2015-1635,http-vuln-cve2017-1001000,http-waf-detect,http-waf-fingerprint,http-webdav-scan,http-wordpress-enum,icap-info,iec-identify,ike-version,imap-capabilities,imap-ntlm-info,ip-forwarding,ip-geolocation-map-kml,ip-https-discover,ipidseq,ipmi-cipher-zero,ipmi-version,ipv6-node-info,irc-botnet-channels,irc-info,iscsi-info,isns-info,jdwp-info,knx-gateway-info,ldap-novell-getpass,ldap-rootdse,ldap-search,lexmark-config,maxdb-info,mcafee-epo-agent,membase-http-info,memcached-info,metasploit-info,modbus-discover,mongodb-databases,mongodb-info,mqtt-subscribe,ms-sql-config,ms-sql-dac,ms-sql-dump-hashes,ms-sql-hasdbaccess,ms-sql-info,ms-sql-ntlm-info,ms-sql-query,ms-sql-tables,msrpc-enum,mysql-audit,mysql-databases,mysql-dump-hashes,mysql-info,mysql-query,mysql-variables,mysql-vuln-cve2012-2122,nat-pmp-info,nat-pmp-mapport,nbstat,ncp-enum-users,ncp-serverinfo,ndmp-fs-info,netbus-auth-bypass,netbus-info,nfs-ls,nfs-showmount,nfs-statfs,nntp-ntlm-info,nrpe-enum,ntp-info,ntp-monlist,omp2-enum-targets,omron-info,openlookup-info,openwebnet-discovery,oracle-tns-version,p2p-conficker,path-mtu,pcworx-info,pop3-capabilities,pop3-ntlm-info,qscan,quake1-info,quake3-info,quake3-master-getservers,rdp-enum-encryption,realvnc-auth-bypass,redis-info,resolveall,reverse-index,rfc868-time,riak-http-info,rmi-dumpregistry,rpcap-info,rpcinfo,rsync-list-modules,rtsp-methods,rusers,s7-info,servicetags,sip-call-spoof,sip-methods,smb-double-pulsar-backdoor,smb-enum-domains,smb-enum-groups,smb-enum-processes,smb-enum-sessions,smb-enum-shares,smb-ls,smb-mbenum,smb-os-discovery,smb-protocols,smb-psexec,smb-security-mode,smb-server-stats,smb-system-info,smb-vuln-ms17-010,smb2-capabilities,smb2-security-mode,smb2-time,smb2-vuln-uptime,smtp-commands,smtp-ntlm-info,smtp-strangeport,sniffer-detect,snmp-hh3c-logins,snmp-info,snmp-interfaces,snmp-netstat,snmp-processes,snmp-sysdescr,snmp-win32-services,snmp-win32-shares,snmp-win32-software,snmp-win32-users,socks-auth-info,ssh-hostkey,ssh2-enum-algos,sshv1,ssl-ccs-injection,ssl-cert-intaddr,ssl-cert,ssl-date,ssl-dh-params,ssl-enum-ciphers,ssl-heartbleed,ssl-known-key,ssl-poodle,sslv2-drown,sslv2,sstp-discover,stun-info,stuxnet-detect,targets-traceroute,telnet-encryption,telnet-ntlm-info,tftp-enum,tls-nextprotoneg,tls-ticketbleed,tn3270-screen,unittest,unusual-port,upnp-info,ventrilo-info,versant-info,vmware-version,vnc-info,vnc-title,voldemort-info,vuze-dht-info,wdb-version,weblogic-t3-info,wsdd-discover,x11-access,xdmcp-discover,xmlrpc-methods,xmpp-info W.X.Y.Z I took out the destination IP. I can run the same command from the command-line with nmap and it completes without error. My OS is Windows 7 Enterprise Edition with SP1, build 7601. If I don't have ZENMAP_DEBUGGING enabled, the log in the event log has this information: Log Name: Application Source: Application Error Date: 9/14/2018 10:50:19 AM Event ID: 1000 Task Category: (100) Level: Error Keywords: Classic User: N/A Computer: XEND-P-SECOPS02 Description: Faulting application name: zenmap.exe, version: 7.70.0.0, time stamp: 0x49180193 Faulting module name: libglib-2.0-0.dll, version: 2.28.8.0, time stamp: 0x4e253544 Exception code: 0x40000015 Fault offset: 0x0004c2d8 Faulting process id: 0x32ef4 Faulting application start time: 0x01d44c390a93b7ed Faulting application path: C:\Program Files (x86)\Nmap\zenmap.exe Faulting module path: C:\Program Files (x86)\Nmap\py2exe\libglib-2.0-0.dll Report Id: 7f94d3ae-b82d-11e8-86b3-005056911b92 Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Application Error" /> <EventID Qualifiers="0">1000</EventID> <Level>2</Level> <Task>100</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2018-09-14T14:50:19.000000000Z" /> <EventRecordID>244429</EventRecordID> <Channel>Application</Channel> <Computer>XEND-P-SECOPS02</Computer> <Security /> </System> <EventData> <Data>zenmap.exe</Data> <Data>7.70.0.0</Data> <Data>49180193</Data> <Data>libglib-2.0-0.dll</Data> <Data>2.28.8.0</Data> <Data>4e253544</Data> <Data>40000015</Data> <Data>0004c2d8</Data> <Data>32ef4</Data> <Data>01d44c390a93b7ed</Data> <Data>C:\Program Files (x86)\Nmap\zenmap.exe</Data> <Data>C:\Program Files (x86)\Nmap\py2exe\libglib-2.0-0.dll</Data> <Data>7f94d3ae-b82d-11e8-86b3-005056911b92</Data> </EventData> </Event> I've had this problem for a long time but hadn't had a reason to generate a bug report until now. I'm using the pretty output for official reporting now and just opening -oX files in Zenmap doesn't produce the same color coded output. Thanks! Jasey DePriest
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Zenmap 7.70 crashing on Windows 7 Jasey DePriest (Sep 14)