Nmap Development mailing list archives
Re: tls-ticketbleed script fails scanning all ports
From: Daniel Miller <bonsaiviking () gmail com>
Date: Wed, 28 Jun 2017 18:54:13 -0500
Frank, tls-ticketbleed requires root privileges in order to run. The portrule of the script checks for this and safely quits if you don't have sufficient privileges, but using "+" bypasses the portrule. In this case, it falls to pcap_open to fail, because without root privileges, host.interface is empty (only root can route over specific interfaces). Dan On Wed, Jun 28, 2017 at 4:22 AM, Frank Büttner <frank.buettner () mdc-berlin de> wrote:
Hello, using the tls-ticketbleed in the all port mode of nmap the script fails. running nmap --script tls-ticketbleed -Pn -p 443 host will run fine. But call nmap -d --script +tls-ticketbleed -Pn -p 443 host will result in: NSE: Starting tls-ticketbleed against host (address). NSE: tls-ticketbleed against host (address) threw an error! /usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:118: bad argument #1 to 'pcap_open' (string expected, got nil) stack traceback: [C]: in method 'pcap_open' /usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:118: in upvalue 'is_vuln' /usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:350: in function </usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:321> (...tail calls...) OS: CentOS 7.3 Nmap: 7.50 Thanks for any help. Frank _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- tls-ticketbleed script fails scanning all ports Frank Büttner (Jun 28)
- Re: tls-ticketbleed script fails scanning all ports Daniel Miller (Jun 28)
- Re: tls-ticketbleed script fails scanning all ports Frank Büttner (Jun 28)
- Re: tls-ticketbleed script fails scanning all ports Daniel Miller (Jun 28)