Nmap Development mailing list archives

Re: Nmap 7.40 Error Modifying Profile


From: Vincent Hotmail <vincegaw () hotmail com>
Date: Sat, 4 Feb 2017 18:33:21 +0000

Hello Dan,


You are correct. I have 3 additional entries (not modifying the existing or standard ones) in my profile.


The 3 addtional entries are as follows. It was working for the IPMI and SSH profiles, but when I added the "iLo HP" 
then it started to error. Maybe my space causes the problem in "iLo HP"?


IPMI
nmap -p 22,80,443,623,5120,5123,5900,5901,7578,8889 -T4 -v -Pn 10.179.13.227

SSH
nmap -p 22,80,443,8080,8443 -T4 -v -Pn 10.179.13.227

iLo HP
nmap -p 22,80,443,3389,9300,17990,17988 -T4 -v -Pn 10.179.13.227


The "scan_profile" is as follows:


[Intense scan]
command = nmap -T4 -A -v
description = An intense, comprehensive scan. The -A option enables OS detection (-O), version detection (-sV), script 
scanning (-sC), and traceroute (--traceroute). Without root privileges only version detection and script scanning are 
run. This is considered an intrusive scan.

[Intense scan plus UDP]
command = nmap -sS -sU -T4 -A -v
description = Does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) in 
addition to scanning TCP and UDP ports.

[Intense scan, all TCP ports]
command = nmap -p 1-65535 -T4 -A -v
description = Scans all TCP ports, then does OS detection (-O), version detection (-sV), script scanning (-sC), and 
traceroute (--traceroute).

[Intense scan, no ping]
command = nmap -T4 -A -v -Pn
description = Does an intense scan without checking to see if targets are up first. This can be useful when a target 
seems to ignore the usual host discovery probes.

[Ping scan]
command = nmap -sn
description = This scan only finds which targets are up and does not port scan them.

[Quick scan]
command = nmap -T4 -F
description = This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer 
ports.

[Quick scan plus]
command = nmap -sV -T4 -O -F --version-light
description = A quick scan plus OS and version detection.

[Quick traceroute]
command = nmap -sn --traceroute
description = Traces the paths to targets without doing a full port scan on them.

[Regular scan]
command = nmap
description = A basic port scan with no extra options.

[Slow comprehensive scan]
command = nmap -sS -sU -T4 -A -v -PE -PS80,443 -PA3389 -PP -PU40125 -PY --source-port 53 --script "default or 
(discovery and safe)"
description = This is a comprehensive, slow scan. Every TCP and UDP port is scanned. OS detection (-O), version 
detection (-sV), script scanning (-sC), and traceroute (--traceroute) are all enabled. Many probes are sent for host 
discovery. This is a highly intrusive scan.




Regards,

Vincent<http://aka.ms/weboutlook>


________________________________
From: Daniel Miller <bonsaiviking () gmail com>
Sent: 02 February 2017 8:42 PM
To: Vincent Hotmail
Cc: dev () nmap org
Subject: Re: Nmap 7.40 Error Modifying Profile

Vincent,

Thanks for this bug report. I'm guessing you have a profile in your .zenmap/scan_profile.usp file that has more than 
one description. The set_text function that threw the TypeError is being passed the description of one of the profiles. 
If you can confirm this or attach your scan_profile.usp to a reply, I can do a better job of checking for this or other 
possible conditions that would produce similar crashes.

Dan

On Tue, Jan 31, 2017 at 4:46 AM, Vincent Hotmail <vincegaw () hotmail com<mailto:vincegaw () hotmail com>> wrote:
This is from a Windows 7 32-bit OS.

I'm also unable to Add a New Profile, but it doesn't give an error message as per Editing a Profile.

Version: 7.40
Traceback (most recent call last):
  File "zenmapGUI\MainWindow.pyo", line 816, in _edit_scan_profile_cb
  File "zenmapGUI\ProfileEditor.pyo", line 170, in __init__
TypeError: GtkTextBuffer.set_text() argument 1 must be string or read-only buffer, not list


Let me know if you have any more questions.


Regards,

Vincent<http://aka.ms/weboutlook>

_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: