Estoy ejecutando nmap 6.47 en Windows 7 y estoy intentando ejecutar el script ssl-ccs-injection.nse. Después de recibir un error, lo ejecuté con la opción -d (depuración) y el error en el tema es lo que apareció. Nunca he intentado ejecutar este script antes, y me pregunto qué me he perdido.
Aquí hay una copia desinfectada de la sesión junto con los errores. He reemplazado el nombre de host con example.com y usé 10.10.10.10 para su IP.
nmap -p 443 -d --script ssl-ccs-injection.nse --script-args vulns.showall example.com
Starting Nmap 6.47 ( http://nmap.org ) at 2015-02-24 10:17 Eastern Standard Time
Winpcap present, dynamic linked to: WinPcap version 4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008)
--------------- Timing report ---------------
hostgroups: min 1, max 100000
rtt-timeouts: init 1000, min 100, max 10000
max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
parallelism: min 0, max 0
max-retries: 10, host-timeout: 0
min-rate: 0, max-rate: 0
---------------------------------------------
NSE: Using Lua 5.2.
NSE: Script Arguments seen from CLI: vulns.showall
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating Ping Scan at 10:17
Scanning example.com (10.10.10.10) [4 ports]
Packet capture filter (device eth2): dst host 10.10.10.11 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.10.10.10)))
We got a TCP ping packet back from 10.10.10.10 port 443 (trynum = 0)
Completed Ping Scan at 10:17, 0.42s elapsed (1 total hosts)
Overall sending rates: 9.43 packets / s, 358.49 bytes / s.
mass_rdns: Using DNS server 209.244.0.3
mass_rdns: Using DNS server 4.2.2.1
mass_rdns: Using DNS server 156.154.70.1
mass_rdns: Using DNS server 209.244.0.3
mass_rdns: Using DNS server 4.2.2.1
mass_rdns: Using DNS server 156.154.70.1
Initiating Parallel DNS resolution of 1 host. at 10:17
mass_rdns: 1.93s 0/1 [#: 6, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]
Completed Parallel DNS resolution of 1 host. at 10:17, 0.02s elapsed
DNS resolution of 1 IPs took 1.93s. Mode: Async [#: 6, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating SYN Stealth Scan at 10:17
Scanning example.com (10.10.10.10) [1 port]
Packet capture filter (device eth2): dst host 10.10.10.11 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.10.10.10)))
Discovered open port 443/tcp on 10.10.10.10
Completed SYN Stealth Scan at 10:17, 0.36s elapsed (1 total ports)
Overall sending rates: 2.77 packets / s, 121.88 bytes / s.
NSE: Script scanning 10.10.10.10.
NSE: Starting runlevel 1 (of 1) scan.
NSE: Starting ssl-ccs-injection against example.com (10.10.10.10:443).
Initiating NSE at 10:17
NSE: ssl-ccs-injection against example.com (10.10.10.10:443) threw an error!
C:\Program Files (x86)\Nmap/scripts\ssl-ccs-injection.nse:123: variable 'keys' is not declared
stack traceback:
[C]: in function 'error'
C:\Program Files (x86)\Nmap/nselib/strict.lua:80: in function '__index'
C:\Program Files (x86)\Nmap/scripts\ssl-ccs-injection.nse:123: in function 'test_ccs_injection'
C:\Program Files (x86)\Nmap/scripts\ssl-ccs-injection.nse:269: in function <C:\Program Files (x86)\Nmap/scripts\ssl-ccs-injection.nse:245>
(...tail calls...)
Completed NSE at 10:17, 0.00s elapsed
Nmap scan report for example.com (10.10.10.10)
Host is up, received syn-ack (0.28s latency).
Scanned at 2015-02-24 10:17:12 Eastern Standard Time for 3s
PORT STATE SERVICE REASON
443/tcp open https syn-ack
Final times for host: srtt: 284875 rttvar: 227250 to: 1193875
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Read from C:\Program Files (x86)\Nmap: nmap-payloads nmap-services.
Nmap done: 1 IP address (1 host up) scanned in 3.92 seconds
Raw packets sent: 5 (196B) | Rcvd: 2 (88B)
¿Qué está pasando?