Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- entropy@phiral.net:~/code/inetscan/proxychains-3.1/proxychains$ ./proxychains /usr/bin/nmap -T2 -sT -PN -n -sV -p443 X.X.X.X
- ProxyChains-3.1 (http://proxychains.sf.net)
- Starting Nmap 5.00 ( http://nmap.org ) at 2012-05-12 19:30 EDT
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- Segmentation fault (core dumped)
- proxy_getaddrinfo in proxychains-3.1/proxychains/core.c
- problem is that *hints is not checked before assignment...
- comment out these three lines:
- (*res)->ai_socktype = hints->ai_socktype;
- (*res)->ai_flags = hints->ai_flags;
- (*res)->ai_protocol = hints->ai_protocol;
- paste these in:
- if (hints != NULL) {
- (*res)->ai_socktype = hints->ai_socktype;
- (*res)->ai_flags = hints->ai_flags;
- (*res)->ai_protocol = hints->ai_protocol;
- } else {
- (*res)->ai_socktype = 0;
- (*res)->ai_flags = 0;
- (*res)->ai_protocol = 0;
- }
- cd ..
- make
- make install
- entropy@phiral.net:~/code/inetscan/proxychains-3.1/proxychains$ ./proxychains /usr/bin/nmap -T2 -sT -PN -n -sV -p443 X.X.X.X
- ProxyChains-3.1 (http://proxychains.sf.net)
- Starting Nmap 5.00 ( http://nmap.org ) at 2012-05-12 19:54 EDT
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- |S-chain|-<>-127.0.0.1:9050-<><>-X.X.X.X:443-<><>-OK
- Interesting ports on X.X.X.X:
- PORT STATE SERVICE VERSION
- 443/tcp open ssl/ssl OpenSSL (SSLv3)
- Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 27.89 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement