Nmap Development mailing list archives

Re: nmap 4.00 -sV ... ServiceProbeMatch::InitMatch: parse error


From: doug () hcsw org
Date: Wed, 8 Feb 2006 13:29:40 -0800

Hi Marc,

That's pretty strange. Is it possible that you're using a service
probes file from a different version of nmap?

Here's a quick way to find out which probes file you're using:

# nmap -sV -d2 localhost |grep Fetch
Fetchfile found ./nmap-service-probes

In my nmap 4.00 tarball line 44 of nmap-service-probes is a comment
so it's particularly baffling!

Doug




On Wed, Feb 08, 2006 at 02:30:26PM -0500 or thereabouts, Yudson, Marc CTR MDA/ION wrote:
Hello all,

 

I've tried RPM install and source for nmap 4.00. Both run most nmap
options fine, except when I attempt a version detect ... I get the
following error: (fresh install example)

 

 

# rpm -vhU http://download.insecure.org/nmap/dist/nmap-4.00-1.i386.rpm

Retrieving http://download.insecure.org/nmap/dist/nmap-4.00-1.i386.rpm

Preparing...                ###########################################
[100%]

   1:nmap                   ###########################################
[100%]

 

# rpm -vhU
http://download.insecure.org/nmap/dist/nmap-frontend-4.00-1.i386.rpm

Retrieving
http://download.insecure.org/nmap/dist/nmap-frontend-4.00-1.i386.rpm

Preparing...                ###########################################
[100%]

   1:nmap-frontend          ###########################################
[100%]

 

# nmap -sV 127.0.0.1

 

Starting Nmap 4.00 ( http://www.insecure.org/nmap/ ) at 2006-02-08 14:17
EST

ServiceProbeMatch::InitMatch: parse error on line 44 of
nmap-service-probes

QUITTING!

 

 

This is a redhat box (2.4.22-1.2199.nptl i386 GNU/Linux). Could be a
stupid error, but I figured I'd throw it out there. If anyone has any
insight, suggestions, or clues as to where to look, I'd be greatly
appreciative. Thanks!

 

 

Marc Yudson



_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev

Current thread: