Nmap Development mailing list archives

Issues with loading script module dll?


From: mike <dmciscobgp () hotmail com>
Date: Fri, 1 Feb 2008 03:55:29 +0000


Hey guys, 
 not sure what to make of this so i decided to dump the debug output of a basic scan of google.com. the part i am a bit 
lost on is towards the bottom. as you can see, it is not loading a main dll for the scripts to run (bit.dll). have a 
look at what i posted and maybe you can tell me what i did wrong, or if it is just an nmap bug. thanks! Mike
 
***WinIP*** trying to initialize winpcap 3.1
Winpcap present, dynamic linked to: WinPcap version 3.1 (packet.dll version 3, 1, 0, 27), based on libpcap version 
0.9[.x]
Starting Nmap 4.22SOC6 ( http://insecure.org ) at 2008-01-31 21:48 Central Standard Time
The max # of sockets we are using is: 0
--------------- Timing report ---------------
hostgroups: min 1, max 100000
rtt-timeouts: init 1000, min 100, max 10000
max-scan-delay: TCP 1000, UDP 1000
parallelism: min 0, max 0
max-retries: 1, host-timeout: 0
---------------------------------------------
Initiating SYN Stealth Scan at 21:48
Scanning 64.233.167.99 [2 ports]
Pcap filter: dst host 192.168.1.100 and (icmp or (tcp and (src host 64.233.167.99)))
Packet capture filter (device eth0): dst host 192.168.1.100 and (icmp or (tcp and (src host 64.233.167.99)))
SENT (0.2180s) TCP 192.168.1.100:48675 > 64.233.167.99:80 S ttl=56 id=25889 iplen=44 seq=94970715 win=1024 <mss 1460>
**TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, 
timeout/srtt/rttvar/
Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/50/* 1000000/-1/-1
64.233.167.99: 1/1/0/1/0/0 10.00/50/0 1000000/-1/-1
SENT (0.2340s) TCP 192.168.1.100:48675 > 64.233.167.99:90 S ttl=59 id=16773 iplen=44 seq=94970715 win=4096 <mss 1460>
**TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, 
timeout/srtt/rttvar/
Groupstats (1/1 incomplete): 2/*/*/*/*/* 10.00/50/* 1000000/-1/-1
64.233.167.99: 2/0/0/2/0/0 10.00/50/0 1000000/-1/-1
RCVD (0.2650s) TCP 64.233.167.99:80 > 192.168.1.100:48675 SA ttl=51 id=52698 iplen=44 seq=99553712 win=5720 
ack=94970716 <mss 1430>
Discovered open port 80/tcp on 64.233.167.99
Changing ping technique for 64.233.167.99 to TCP
Timeout vals: srtt: -1 rttvar: -1 to: 1000000 delta 47000 ==> srtt: 47000 rttvar: 47000 to: 235000
Timeout vals: srtt: -1 rttvar: -1 to: 1000000 delta 47000 ==> srtt: 47000 rttvar: 47000 to: 235000
**TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, 
timeout/srtt/rttvar/
Groupstats (1/1 incomplete): 0/*/*/*/*/* 11.00/50/* 235000/47000/47000
64.233.167.99: 0/0/0/1/1/0 11.00/50/0 235000/47000/47000
SENT (1.5000s) TCP 192.168.1.100:48676 > 64.233.167.99:90 S ttl=37 id=10502 iplen=44 seq=94905178 win=2048 <mss 1460>
**TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, 
timeout/srtt/rttvar/
Groupstats (1/1 incomplete): 1/*/*/*/*/* 11.00/50/* 235000/47000/47000
64.233.167.99: 1/0/0/2/0/0 11.00/50/0 235000/47000/47000
**TIMING STATS**: IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ccthresh/delay, 
timeout/srtt/rttvar/
Groupstats (1/1 incomplete): 0/*/*/*/*/* 11.00/50/* 235000/47000/47000
64.233.167.99: 0/0/0/2/1/0 11.00/50/0 235000/47000/47000
Discovered filtered port 90/tcp on 64.233.167.99
Moving 64.233.167.99 to completed hosts list with 1 outstanding probe.
* tcp to port 90; flags: S
Completed SYN Stealth Scan at 21:48, 1.69s elapsed (2 total ports)
Initiating Service scan at 21:48
Scanning 1 service on 64.233.167.99
Starting probes against new service: 64.233.167.99:80 (tcp)
NSOCK (1.8120s) msevent_new (IOD #1) (EID #8)
NSOCK (1.8120s) TCP connection requested to 64.233.167.99:80 (IOD #1) EID 8
NSOCK (1.8120s) nsock_loop() started (no timeout). 1 events pending
NSOCK (1.8120s) wait_for_events
NSOCK (1.8120s) PCAP read_on_nonselect
NSOCK (1.8120s) PCAP END read_on_nonselect
NSOCK (1.8590s) Callback: CONNECT SUCCESS for EID 8 [64.233.167.99:80]
NSOCK (1.8590s) msevent_new (IOD #1) (EID #18)
NSOCK (1.8590s) Read request from IOD #1 [64.233.167.99:80] (timeout: 6000ms) EID 18
NSOCK (1.8590s) msevent_delete (IOD #1) (EID #8)
NSOCK (1.8750s) wait_for_events
NSOCK (1.8750s) PCAP read_on_nonselect
NSOCK (1.8750s) PCAP END read_on_nonselect
NSOCK (7.8590s) Callback: READ TIMEOUT for EID 18 [64.233.167.99:80]
NSOCK (7.8590s) msevent_new (IOD #1) (EID #27)
NSOCK (7.8590s) Write request for 18 bytes to IOD #1 EID 27 [64.233.167.99:80]: GET / HTTP/1.0....
NSOCK (7.8590s) msevent_new (IOD #1) (EID #34)
NSOCK (7.8590s) Read request from IOD #1 [64.233.167.99:80] (timeout: 5000ms) EID 34
NSOCK (7.8590s) msevent_delete (IOD #1) (EID #18)
NSOCK (7.8590s) wait_for_events
NSOCK (7.8590s) PCAP read_on_nonselect
NSOCK (7.8590s) PCAP END read_on_nonselect
NSOCK (7.8590s) Callback: WRITE SUCCESS for EID 27 [64.233.167.99:80]
NSOCK (7.8590s) msevent_delete (IOD #1) (EID #27)
NSOCK (7.8590s) wait_for_events
NSOCK (7.8590s) PCAP read_on_nonselect
NSOCK (7.8590s) PCAP END read_on_nonselect
NSOCK (7.8900s) Callback: READ SUCCESS for EID 34 [64.233.167.99:80] (1430 bytes)
NSOCK (7.8900s) msevent_new (IOD #1) (EID #42)
NSOCK (7.8900s) Read request from IOD #1 [64.233.167.99:80] (timeout: 4953ms) EID 42
NSOCK (7.8900s) msevent_delete (IOD #1) (EID #34)
NSOCK (7.9060s) wait_for_events
NSOCK (7.9060s) PCAP read_on_nonselect
NSOCK (7.9060s) PCAP END read_on_nonselect
NSOCK (7.9060s) Callback: READ SUCCESS for EID 42 [64.233.167.99:80] (4166 bytes)
NSOCK (7.9530s) msevent_new (IOD #2) (EID #48)
NSOCK (7.9530s) TCP connection requested to 64.233.167.99:80 (IOD #2) EID 48
NSOCK (7.9530s) msevent_delete (IOD #2) (EID #42)
NSOCK (7.9530s) wait_for_events
NSOCK (7.9530s) PCAP read_on_nonselect
NSOCK (7.9530s) PCAP END read_on_nonselect
NSOCK (8.0000s) Callback: CONNECT SUCCESS for EID 48 [64.233.167.99:80]
NSOCK (8.0000s) msevent_new (IOD #2) (EID #59)
NSOCK (8.0000s) Write request for 22 bytes to IOD #2 EID 59 [64.233.167.99:80]: OPTIONS / HTTP/1.0....
NSOCK (8.0000s) msevent_new (IOD #2) (EID #66)
NSOCK (8.0000s) Read request from IOD #2 [64.233.167.99:80] (timeout: 5000ms) EID 66
NSOCK (8.0000s) msevent_delete (IOD #2) (EID #48)
NSOCK (8.0150s) wait_for_events
NSOCK (8.0150s) PCAP read_on_nonselect
NSOCK (8.0150s) PCAP END read_on_nonselect
NSOCK (8.0150s) Callback: WRITE SUCCESS for EID 59 [64.233.167.99:80]
NSOCK (8.0150s) msevent_delete (IOD #2) (EID #59)
NSOCK (8.0150s) wait_for_events
NSOCK (8.0150s) PCAP read_on_nonselect
NSOCK (8.0150s) PCAP END read_on_nonselect
NSOCK (8.0460s) Callback: READ SUCCESS for EID 66 [64.233.167.99:80] (1430 bytes)
Service scan match (Probe HTTPOptions matched with GetRequest): 64.233.167.99:80 is http. Version: |Google 
httpd|1.3|GFE|
NSOCK (8.0460s) msevent_delete (IOD #2) (EID #66)
Completed Service scan at 21:49, 6.23s elapsed (1 service on 1 host)
Starting RPC scan against 64.233.167.99
SCRIPT ENGINE: Initiating script scanning.
SCRIPT ENGINE: Script scanning .
Fetchfile found C:\tools\nmap-rpc
Fetchfile found C:\tools\nselib\
Fetchfile found C:\tools\scripts\script.db
Fetchfile found C:\tools\scripts\MSSQLm.nse
Fetchfile found C:\tools\scripts\bruteTelnet.nse
Fetchfile found C:\tools\scripts\SNMPsysdesr.nse
Fetchfile found C:\tools\scripts\SMTPcommands.nse
Fetchfile found C:\tools\scripts\HTTP_open_proxy.nse
Fetchfile found C:\tools\scripts\HTTPAuth.nse
Fetchfile found C:\tools\scripts\showHTMLTitle.nse
Fetchfile found C:\tools\scripts\ftpbounce.nse
Fetchfile found C:\tools\scripts\dns-test-open-recursion.nse
LUA INTERPRETER in ..\nse_init.cc:696: error loading module 'bit' from file 'C:\
tools\nselib\bit.dll':
system error 14001
SCRIPT ENGINE: Aborting script scan.SCRIPT ENGINE: Using 
C:\tools\nselib\?.dll;.\?.dll;C:\tools\?.dll;C:\tools\loadall.dll to search for C-modules and 
C:\tools\nselib\?.lua;.\?.lua;C:\tools\lua\?.lua;C:\tools\lua\?\init.lua;C:\tools\?.lua;C:\tools\?\init.lua for 
Lua-modules
SCRIPT ENGINE: Script scanning completed.
Host 64.233.167.99 appears to be up ... good.
Interesting ports on 64.233.167.99:
PORT STATE SERVICE REASON VERSION
80/tcp open http syn-ack Google httpd 1.3 (GFE)
90/tcp filtered dnsix no-response
Service Info: OS: Linux
Final times for host: srtt: 47000 rttvar: 47000 to: 235000
Read from C:\tools: nmap-rpc nmap-service-probes nmap-services.
Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.078 seconds
Raw packets sent: 3 (132B) | Rcvd: 1 (46B)
 
 
 

_________________________________________________________________
Shed those extra pounds with MSN and The Biggest Loser!
http://biggestloser.msn.com/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: