Nmap Development mailing list archives
Issues with loading script module dll?
From: mike <dmciscobgp () hotmail com>
Date: Fri, 1 Feb 2008 03:55:29 +0000
Hey guys, not sure what to make of this so i decided to dump the debug output of a basic scan of google.com. the part i am a bit lost on is towards the bottom. as you can see, it is not loading a main dll for the scripts to run (bit.dll). have a look at what i posted and maybe you can tell me what i did wrong, or if it is just an nmap bug. thanks! Mike ***WinIP*** trying to initialize winpcap 3.1 Winpcap present, dynamic linked to: WinPcap version 3.1 (packet.dll version 3, 1, 0, 27), based on libpcap version 0.9[.x] Starting Nmap 4.22SOC6 ( http://insecure.org ) at 2008-01-31 21:48 Central Standard Time The max # of sockets we are using is: 0 --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000 parallelism: min 0, max 0 max-retries: 1, host-timeout: 0 --------------------------------------------- Initiating SYN Stealth Scan at 21:48 Scanning 64.233.167.99 [2 ports] Pcap filter: dst host 192.168.1.100 and (icmp or (tcp and (src host 64.233.167.99))) Packet capture filter (device eth0): dst host 192.168.1.100 and (icmp or (tcp and (src host 64.233.167.99))) SENT (0.2180s) TCP 192.168.1.100:48675 > 64.233.167.99:80 S ttl=56 id=25889 iplen=44 seq=94970715 win=1024 <mss 1460> **TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/50/* 1000000/-1/-1 64.233.167.99: 1/1/0/1/0/0 10.00/50/0 1000000/-1/-1 SENT (0.2340s) TCP 192.168.1.100:48675 > 64.233.167.99:90 S ttl=59 id=16773 iplen=44 seq=94970715 win=4096 <mss 1460> **TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 2/*/*/*/*/* 10.00/50/* 1000000/-1/-1 64.233.167.99: 2/0/0/2/0/0 10.00/50/0 1000000/-1/-1 RCVD (0.2650s) TCP 64.233.167.99:80 > 192.168.1.100:48675 SA ttl=51 id=52698 iplen=44 seq=99553712 win=5720 ack=94970716 <mss 1430> Discovered open port 80/tcp on 64.233.167.99 Changing ping technique for 64.233.167.99 to TCP Timeout vals: srtt: -1 rttvar: -1 to: 1000000 delta 47000 ==> srtt: 47000 rttvar: 47000 to: 235000 Timeout vals: srtt: -1 rttvar: -1 to: 1000000 delta 47000 ==> srtt: 47000 rttvar: 47000 to: 235000 **TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 0/*/*/*/*/* 11.00/50/* 235000/47000/47000 64.233.167.99: 0/0/0/1/1/0 11.00/50/0 235000/47000/47000 SENT (1.5000s) TCP 192.168.1.100:48676 > 64.233.167.99:90 S ttl=37 id=10502 iplen=44 seq=94905178 win=2048 <mss 1460> **TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 1/*/*/*/*/* 11.00/50/* 235000/47000/47000 64.233.167.99: 1/0/0/2/0/0 11.00/50/0 235000/47000/47000 **TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 0/*/*/*/*/* 11.00/50/* 235000/47000/47000 64.233.167.99: 0/0/0/2/1/0 11.00/50/0 235000/47000/47000 Discovered filtered port 90/tcp on 64.233.167.99 Moving 64.233.167.99 to completed hosts list with 1 outstanding probe. * tcp to port 90; flags: S Completed SYN Stealth Scan at 21:48, 1.69s elapsed (2 total ports) Initiating Service scan at 21:48 Scanning 1 service on 64.233.167.99 Starting probes against new service: 64.233.167.99:80 (tcp) NSOCK (1.8120s) msevent_new (IOD #1) (EID #8) NSOCK (1.8120s) TCP connection requested to 64.233.167.99:80 (IOD #1) EID 8 NSOCK (1.8120s) nsock_loop() started (no timeout). 1 events pending NSOCK (1.8120s) wait_for_events NSOCK (1.8120s) PCAP read_on_nonselect NSOCK (1.8120s) PCAP END read_on_nonselect NSOCK (1.8590s) Callback: CONNECT SUCCESS for EID 8 [64.233.167.99:80] NSOCK (1.8590s) msevent_new (IOD #1) (EID #18) NSOCK (1.8590s) Read request from IOD #1 [64.233.167.99:80] (timeout: 6000ms) EID 18 NSOCK (1.8590s) msevent_delete (IOD #1) (EID #8) NSOCK (1.8750s) wait_for_events NSOCK (1.8750s) PCAP read_on_nonselect NSOCK (1.8750s) PCAP END read_on_nonselect NSOCK (7.8590s) Callback: READ TIMEOUT for EID 18 [64.233.167.99:80] NSOCK (7.8590s) msevent_new (IOD #1) (EID #27) NSOCK (7.8590s) Write request for 18 bytes to IOD #1 EID 27 [64.233.167.99:80]: GET / HTTP/1.0.... NSOCK (7.8590s) msevent_new (IOD #1) (EID #34) NSOCK (7.8590s) Read request from IOD #1 [64.233.167.99:80] (timeout: 5000ms) EID 34 NSOCK (7.8590s) msevent_delete (IOD #1) (EID #18) NSOCK (7.8590s) wait_for_events NSOCK (7.8590s) PCAP read_on_nonselect NSOCK (7.8590s) PCAP END read_on_nonselect NSOCK (7.8590s) Callback: WRITE SUCCESS for EID 27 [64.233.167.99:80] NSOCK (7.8590s) msevent_delete (IOD #1) (EID #27) NSOCK (7.8590s) wait_for_events NSOCK (7.8590s) PCAP read_on_nonselect NSOCK (7.8590s) PCAP END read_on_nonselect NSOCK (7.8900s) Callback: READ SUCCESS for EID 34 [64.233.167.99:80] (1430 bytes) NSOCK (7.8900s) msevent_new (IOD #1) (EID #42) NSOCK (7.8900s) Read request from IOD #1 [64.233.167.99:80] (timeout: 4953ms) EID 42 NSOCK (7.8900s) msevent_delete (IOD #1) (EID #34) NSOCK (7.9060s) wait_for_events NSOCK (7.9060s) PCAP read_on_nonselect NSOCK (7.9060s) PCAP END read_on_nonselect NSOCK (7.9060s) Callback: READ SUCCESS for EID 42 [64.233.167.99:80] (4166 bytes) NSOCK (7.9530s) msevent_new (IOD #2) (EID #48) NSOCK (7.9530s) TCP connection requested to 64.233.167.99:80 (IOD #2) EID 48 NSOCK (7.9530s) msevent_delete (IOD #2) (EID #42) NSOCK (7.9530s) wait_for_events NSOCK (7.9530s) PCAP read_on_nonselect NSOCK (7.9530s) PCAP END read_on_nonselect NSOCK (8.0000s) Callback: CONNECT SUCCESS for EID 48 [64.233.167.99:80] NSOCK (8.0000s) msevent_new (IOD #2) (EID #59) NSOCK (8.0000s) Write request for 22 bytes to IOD #2 EID 59 [64.233.167.99:80]: OPTIONS / HTTP/1.0.... NSOCK (8.0000s) msevent_new (IOD #2) (EID #66) NSOCK (8.0000s) Read request from IOD #2 [64.233.167.99:80] (timeout: 5000ms) EID 66 NSOCK (8.0000s) msevent_delete (IOD #2) (EID #48) NSOCK (8.0150s) wait_for_events NSOCK (8.0150s) PCAP read_on_nonselect NSOCK (8.0150s) PCAP END read_on_nonselect NSOCK (8.0150s) Callback: WRITE SUCCESS for EID 59 [64.233.167.99:80] NSOCK (8.0150s) msevent_delete (IOD #2) (EID #59) NSOCK (8.0150s) wait_for_events NSOCK (8.0150s) PCAP read_on_nonselect NSOCK (8.0150s) PCAP END read_on_nonselect NSOCK (8.0460s) Callback: READ SUCCESS for EID 66 [64.233.167.99:80] (1430 bytes) Service scan match (Probe HTTPOptions matched with GetRequest): 64.233.167.99:80 is http. Version: |Google httpd|1.3|GFE| NSOCK (8.0460s) msevent_delete (IOD #2) (EID #66) Completed Service scan at 21:49, 6.23s elapsed (1 service on 1 host) Starting RPC scan against 64.233.167.99 SCRIPT ENGINE: Initiating script scanning. SCRIPT ENGINE: Script scanning . Fetchfile found C:\tools\nmap-rpc Fetchfile found C:\tools\nselib\ Fetchfile found C:\tools\scripts\script.db Fetchfile found C:\tools\scripts\MSSQLm.nse Fetchfile found C:\tools\scripts\bruteTelnet.nse Fetchfile found C:\tools\scripts\SNMPsysdesr.nse Fetchfile found C:\tools\scripts\SMTPcommands.nse Fetchfile found C:\tools\scripts\HTTP_open_proxy.nse Fetchfile found C:\tools\scripts\HTTPAuth.nse Fetchfile found C:\tools\scripts\showHTMLTitle.nse Fetchfile found C:\tools\scripts\ftpbounce.nse Fetchfile found C:\tools\scripts\dns-test-open-recursion.nse LUA INTERPRETER in ..\nse_init.cc:696: error loading module 'bit' from file 'C:\ tools\nselib\bit.dll': system error 14001 SCRIPT ENGINE: Aborting script scan.SCRIPT ENGINE: Using C:\tools\nselib\?.dll;.\?.dll;C:\tools\?.dll;C:\tools\loadall.dll to search for C-modules and C:\tools\nselib\?.lua;.\?.lua;C:\tools\lua\?.lua;C:\tools\lua\?\init.lua;C:\tools\?.lua;C:\tools\?\init.lua for Lua-modules SCRIPT ENGINE: Script scanning completed. Host 64.233.167.99 appears to be up ... good. Interesting ports on 64.233.167.99: PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack Google httpd 1.3 (GFE) 90/tcp filtered dnsix no-response Service Info: OS: Linux Final times for host: srtt: 47000 rttvar: 47000 to: 235000 Read from C:\tools: nmap-rpc nmap-service-probes nmap-services. Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.078 seconds Raw packets sent: 3 (132B) | Rcvd: 1 (46B) _________________________________________________________________ Shed those extra pounds with MSN and The Biggest Loser! http://biggestloser.msn.com/ _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Issues with loading script module dll? mike (Jan 31)
- Re: Issues with loading script module dll? Kris Katterjohn (Jan 31)
- Re: Issues with loading script module dll? Kris Katterjohn (Jan 31)
- Re: Issues with loading script module dll? jah (Feb 01)
- Message not available
- Re: Issues with loading script module dll? jah (Feb 01)
- Message not available
- Re: Issues with loading script module dll? jah (Feb 01)
- Message not available
- Re: Issues with loading script module dll? jah (Feb 01)
- Re: Issues with loading script module dll? Kris Katterjohn (Jan 31)
- Re: Issues with loading script module dll? Kris Katterjohn (Jan 31)