1 # Buildsheet autogenerated by ravenadm tool -- Do not edit.
7 SDESC[standard]= Port scanning utility for large networks
8 HOMEPAGE= https://nmap.org/
12 SITES[main]= https://nmap.org/dist/
13 DISTFILE[1]= nmap-7.93.tar.bz2:main
15 SPKGS[standard]= single
17 OPTIONS_AVAILABLE= none
18 OPTIONS_STANDARD= none
20 BUILDRUN_DEPENDS= libpcap:single:standard
22 USES= gmake cpe pcre ssl
24 FPC_EQUIVALENT= security/nmap
27 CONFIGURE_ARGS= --with-openssl={{OPENSSLBASE}}
31 --with-libpcre={{LOCALBASE}}
32 --with-libpcap={{LOCALBASE}}
33 --with-liblua=included
36 INSTALL_REQ_TOOLCHAIN= yes
39 CPPFLAGS= -I{{OPENSSLINC}}
42 ${FIND} ${WRKSRC} -type f \( -name \*.orig -o -name \*.bak \) -delete
45 ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/ncat
46 ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/nmap
47 ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/nping
50 ${REINPLACE_CMD} -e "s|^DESTDIR *=|& ${DESTDIR}|" ${WRKSRC}/Makefile
53 ${RM} -r ${WRKSRC}/mswin32
55 [FILE:732:descriptions/desc.single]
56 Nmap is a utility for network exploration and security auditing.
57 It supports various types of host discovery (determine which hosts
58 are up), many port scanning techniques for different protocols,
59 version detection (determine service protocols and application
60 versions listening behind ports), and TCP/IP stack fingerprinting
61 (remote host OS or device identification). Nmap also offers
62 flexible target and port specification, decoy/stealth scanning,
63 sunRPC scanning, and much more.
65 Also included is Ncat, the nc(1) work-a-like of the Nmap project.
66 Refer to the separate port security/zenmap for those parts of the
67 Nmap toolset which depend on python. The translated manual pages
68 for Nmap are contained in security/nmap-i18n-man.
72 55bcfe4793e25acc96ba4274d8c4228db550b8e8efd72004b38ec55a2dd16651 10823114 nmap-7.93.tar.bz2
75 [FILE:16140:manifests/plist.single]
80 share/man/de/man1/nmap.1.gz
81 share/man/es/man1/nmap.1.gz
82 share/man/fr/man1/nmap.1.gz
83 share/man/hr/man1/nmap.1.gz
84 share/man/hu/man1/nmap.1.gz
85 share/man/it/man1/nmap.1.gz
86 share/man/ja/man1/nmap.1.gz
91 share/man/pl/man1/nmap.1.gz
92 share/man/pt_BR/man1/nmap.1.gz
93 share/man/pt_PT/man1/nmap.1.gz
94 share/man/ro/man1/nmap.1.gz
95 share/man/ru/man1/nmap.1.gz
96 share/man/sk/man1/nmap.1.gz
97 share/man/zh/man1/nmap.1.gz
98 share/ncat/ca-bundle.crt
250 share/nmap/nselib/data/
254 enterprise_numbers.txt
256 http-default-accounts-fingerprints.lua
257 http-devframework-fingerprints.lua
258 http-fingerprints.lua
261 http-web-files-extensions.lst
266 oracle-default-accounts.lst
275 targets-ipv6-wordlist
282 share/nmap/nselib/data/jdwp-class/
288 share/nmap/nselib/data/psexec/
312 allseeingeye-info.nse
317 backorifice-brute.nse
324 bittorrent-discovery.nse
326 broadcast-ataoe-discover.nse
327 broadcast-avahi-dos.nse
328 broadcast-bjnp-discover.nse
329 broadcast-db2-discover.nse
330 broadcast-dhcp-discover.nse
331 broadcast-dhcp6-discover.nse
332 broadcast-dns-service-discovery.nse
333 broadcast-dropbox-listener.nse
334 broadcast-eigrp-discovery.nse
335 broadcast-hid-discoveryd.nse
336 broadcast-igmp-discovery.nse
337 broadcast-jenkins-discover.nse
338 broadcast-listener.nse
339 broadcast-ms-sql-discover.nse
340 broadcast-netbios-master-browser.nse
341 broadcast-networker-discover.nse
342 broadcast-novell-locate.nse
343 broadcast-ospf2-discover.nse
344 broadcast-pc-anywhere.nse
346 broadcast-pim-discovery.nse
348 broadcast-pppoe-discover.nse
349 broadcast-rip-discover.nse
350 broadcast-ripng-discover.nse
351 broadcast-sonicwall-discover.nse
352 broadcast-sybase-asa-discover.nse
353 broadcast-tellstick-discover.nse
354 broadcast-upnp-info.nse
355 broadcast-versant-locate.nse
356 broadcast-wake-on-lan.nse
357 broadcast-wpad-discover.nse
358 broadcast-wsdd-discover.nse
359 broadcast-xdmcp-discover.nse
368 citrix-enum-apps-xml.nse
370 citrix-enum-servers-xml.nse
371 citrix-enum-servers.nse
375 couchdb-databases.nse
380 cvs-brute-repository.nse
390 distcc-cve2004-2687.nse
395 dns-client-subnet-scan.nse
397 dns-ip6-arpa-scan.nse
401 dns-random-srcport.nse
404 dns-service-discovery.nse
408 dns-zone-transfer.nse
412 domino-enum-users.nse
420 eppc-enum-processes.nse
423 fingerprint-strings.nse
426 flume-master-info.nse
433 ftp-proftpd-backdoor.nse
435 ftp-vsftpd-backdoor.nse
436 ftp-vuln-cve2010-4221.nse
442 hadoop-datanode-info.nse
443 hadoop-jobtracker-info.nse
444 hadoop-namenode-info.nse
445 hadoop-secondary-namenode-info.nse
446 hadoop-tasktracker-info.nse
447 hbase-master-info.nse
448 hbase-region-info.nse
454 http-adobe-coldfusion-apsa1301.nse
455 http-affiliate-id.nse
456 http-apache-negotiation.nse
457 http-apache-server-status.nse
458 http-aspnet-debug.nse
461 http-avaya-ipoffice-users.nse
462 http-awstatstotals-exec.nse
463 http-axis2-dir-traversal.nse
464 http-backup-finder.nse
465 http-barracuda-dir-traversal.nse
466 http-bigip-cookie.nse
468 http-cakephp-version.nse
470 http-cisco-anyconnect.nse
471 http-coldfusion-subzero.nse
472 http-comments-displayer.nse
473 http-config-backup.nse
474 http-cookie-flags.nse
476 http-cross-domain-policy.nse
479 http-default-accounts.nse
480 http-devframework.nse
481 http-dlink-backdoor.nse
482 http-dombased-xss.nse
483 http-domino-enum-passwords.nse
484 http-drupal-enum-users.nse
492 http-fileupload-exploiter.nse
495 http-frontpage-login.nse
498 http-gitweb-projects-enum.nse
499 http-google-malware.nse
503 http-huawei-hg5xx-vuln.nse
504 http-icloud-findmyiphone.nse
505 http-icloud-sendmsg.nse
506 http-iis-short-name-brute.nse
507 http-iis-webdav-vuln.nse
508 http-internal-ip-disclosure.nse
509 http-joomla-brute.nse
510 http-jsonp-detection.nse
511 http-litespeed-sourcecode-download.nse
513 http-majordomo2-dir-traversal.nse
514 http-malware-host.nse
516 http-method-tamper.nse
518 http-mobileversion-checker.nse
521 http-open-redirect.nse
524 http-phpmyadmin-dir-traversal.nse
528 http-qnap-nas-info.nse
529 http-referer-checker.nse
532 http-robtex-reverse-ip.nse
533 http-robtex-shared-ns.nse
534 http-sap-netweaver-leak.nse
535 http-security-headers.nse
536 http-server-header.nse
538 http-sitemap-generator.nse
539 http-slowloris-check.nse
541 http-sql-injection.nse
546 http-tplink-dir-traversal.nse
550 http-unsafe-output-escaping.nse
551 http-useragent-tester.nse
552 http-userdir-enum.nse
555 http-vlcstreamer-ls.nse
556 http-vmware-path-vuln.nse
557 http-vuln-cve2006-3392.nse
558 http-vuln-cve2009-3960.nse
559 http-vuln-cve2010-0738.nse
560 http-vuln-cve2010-2861.nse
561 http-vuln-cve2011-3192.nse
562 http-vuln-cve2011-3368.nse
563 http-vuln-cve2012-1823.nse
564 http-vuln-cve2013-0156.nse
565 http-vuln-cve2013-6786.nse
566 http-vuln-cve2013-7091.nse
567 http-vuln-cve2014-2126.nse
568 http-vuln-cve2014-2127.nse
569 http-vuln-cve2014-2128.nse
570 http-vuln-cve2014-2129.nse
571 http-vuln-cve2014-3704.nse
572 http-vuln-cve2014-8877.nse
573 http-vuln-cve2015-1427.nse
574 http-vuln-cve2015-1635.nse
575 http-vuln-cve2017-1001000.nse
576 http-vuln-cve2017-5638.nse
577 http-vuln-cve2017-5689.nse
578 http-vuln-cve2017-8917.nse
579 http-vuln-misfortune-cookie.nse
580 http-vuln-wnr1000-creds.nse
582 http-waf-fingerprint.nse
584 http-wordpress-brute.nse
585 http-wordpress-enum.nse
586 http-wordpress-users.nse
595 imap-capabilities.nse
597 impress-remote-discover.nse
602 ip-geolocation-geoplugin.nse
603 ip-geolocation-ipinfodb.nse
604 ip-geolocation-map-bing.nse
605 ip-geolocation-map-google.nse
606 ip-geolocation-map-kml.nse
607 ip-geolocation-maxmind.nse
608 ip-https-discover.nse
613 ipv6-multicast-mld-list.nse
616 irc-botnet-channels.nse
620 irc-unrealircd-backdoor.nse
628 knx-gateway-discover.nse
632 ldap-novell-getpass.nse
642 membase-http-info.nse
645 metasploit-msgrpc-brute.nse
646 metasploit-xmlrpc-brute.nse
647 mikrotik-routeros-brute.nse
652 mongodb-databases.nse
659 ms-sql-dump-hashes.nse
660 ms-sql-empty-password.nse
661 ms-sql-hasdbaccess.nse
666 ms-sql-xp-cmdshell.nse
673 mysql-dump-hashes.nse
674 mysql-empty-password.nse
680 mysql-vuln-cve2012-2122.nse
691 nessus-xmlrpc-brute.nse
692 netbus-auth-bypass.nse
708 omp2-enum-targets.nse
712 openvas-otp-brute.nse
713 openwebnet-discovery.nse
714 oracle-brute-stealth.nse
716 oracle-enum-users.nse
718 oracle-tns-version.nse
719 ovs-agent-version.nse
725 pjl-ready-message.nse
727 pop3-capabilities.nse
731 puppet-naivesigning.nse
736 quake3-master-getservers.nse
737 rdp-enum-encryption.nse
739 rdp-vuln-ms12-020.nse
740 realvnc-auth-bypass.nse
750 rmi-vuln-classloader.nse
757 rsync-list-modules.nse
762 samba-vuln-cve-2012-1182.nse
772 smb-double-pulsar-backdoor.nse
775 smb-enum-processes.nse
776 smb-enum-services.nse
777 smb-enum-sessions.nse
787 smb-security-mode.nse
790 smb-vuln-conficker.nse
791 smb-vuln-cve-2017-7494.nse
792 smb-vuln-cve2009-3103.nse
793 smb-vuln-ms06-025.nse
794 smb-vuln-ms07-029.nse
795 smb-vuln-ms08-067.nse
796 smb-vuln-ms10-054.nse
797 smb-vuln-ms10-061.nse
798 smb-vuln-ms17-010.nse
799 smb-vuln-regsvc-dos.nse
801 smb-webexec-exploit.nse
802 smb2-capabilities.nse
803 smb2-security-mode.nse
812 smtp-vuln-cve2010-4344.nse
813 smtp-vuln-cve2011-1720.nse
814 smtp-vuln-cve2011-1764.nse
824 snmp-win32-services.nse
825 snmp-win32-shares.nse
826 snmp-win32-software.nse
834 ssh-publickey-acceptance.nse
838 ssl-ccs-injection.nse
853 supermicro-ipmi-conf.nse
856 targets-ipv6-map4to6.nse
857 targets-ipv6-multicast-echo.nse
858 targets-ipv6-multicast-invalid-dst.nse
859 targets-ipv6-multicast-mld.nse
860 targets-ipv6-multicast-slaac.nse
861 targets-ipv6-wordlist.nse
863 targets-traceroute.nse
865 teamspeak2-version.nse
867 telnet-encryption.nse
874 tor-consensus-checker.nse
875 traceroute-geolocation.nse
878 ubiquiti-discovery.nse
882 uptime-agent-info.nse
907 [FILE:317:patches/patch-Makefile.in]
908 --- Makefile.in.orig 2021-07-19 23:06:50 UTC
910 @@ -10,7 +10,7 @@ mandir = @mandir@
911 top_srcdir = @top_srcdir@
913 nmapdatadir = @datadir@/nmap
914 -deskdir = $(prefix)/share/applications
915 +deskdir = $(LOCALBASE)/share/applications
916 NMAPDEVDIR=~/nmap-private-dev
918 export NBASEDIR=@NBASEDIR@
921 [FILE:1005:patches/patch-configure]
922 --- configure.orig 2020-08-27 19:13:31 UTC
924 @@ -2529,7 +2529,7 @@ ac_link='$CC -o conftest$ac_exeext $CFLA
925 ac_compiler_gnu=$ac_cv_c_compiler_gnu
926 if test -n "$ac_tool_prefix"; then
927 # Extract the first word of "${ac_tool_prefix}gcc", so it can be a program name with args.
928 -set dummy ${ac_tool_prefix}gcc; ac_word=$2
929 +set dummy ${ac_tool_prefix}$CXX; ac_word=$2
930 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5
931 $as_echo_n "checking for $ac_word... " >&6; }
932 if ${ac_cv_prog_CC+:} false; then :
933 @@ -3362,7 +3362,7 @@ ac_link='$CC -o conftest$ac_exeext $CFLA
934 ac_compiler_gnu=$ac_cv_c_compiler_gnu
935 if test -n "$ac_tool_prefix"; then
936 # Extract the first word of "${ac_tool_prefix}gcc", so it can be a program name with args.
937 -set dummy ${ac_tool_prefix}gcc; ac_word=$2
938 +set dummy ${ac_tool_prefix}$CXX; ac_word=$2
939 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5
940 $as_echo_n "checking for $ac_word... " >&6; }
941 if ${ac_cv_prog_CC+:} false; then :
944 [FILE:431:patches/patch-libdnet-stripped__src__eth-bsd.c]
945 --- libdnet-stripped/src/eth-bsd.c.orig 2009-11-09 04:49:32 UTC
946 +++ libdnet-stripped/src/eth-bsd.c
947 @@ -45,7 +45,7 @@ eth_open(const char *device)
950 if ((e = calloc(1, sizeof(*e))) != NULL) {
951 - for (i = 0; i < 128; i++) {
952 + for (i = 0; i < 1024; i++) {
953 snprintf(file, sizeof(file), "/dev/bpf%d", i);
954 /* This would be O_WRONLY, but Mac OS X 10.6 has a bug
955 where that prevents other users of the interface
958 [FILE:445:patches/patch-libdnet-stripped_src_arp-bsd.c]
959 $NetBSD: patch-libdnet-stripped_src_arp-bsd.c,v 1.1 2016/04/09 06:38:05 adam Exp $
961 Fix building on systems where RTF_LLINFO is not defined.
963 --- libdnet-stripped/src/arp-bsd.c.orig 2008-09-19 06:12:25 UTC
964 +++ libdnet-stripped/src/arp-bsd.c
967 #include <net/if_dl.h>
968 #include <net/route.h>
970 +#define RTF_LLINFO RTF_LLDATA
972 #include <netinet/in.h>
973 #include <netinet/if_ether.h>
977 [FILE:394:patches/patch-liblua__Makefile]
978 --- liblua/Makefile.orig 2018-10-17 00:30:14 UTC
981 # Your platform. See PLATS for possible values.
985 -CFLAGS= -O2 -Wall -Wextra -DLUA_COMPAT_5_2 $(SYSCFLAGS) $(MYCFLAGS)
987 +CFLAGS= -Wall -Wextra -DLUA_COMPAT_5_2 $(SYSCFLAGS) $(MYCFLAGS)
988 LDFLAGS= $(SYSLDFLAGS) $(MYLDFLAGS)
989 LIBS= -lm $(SYSLIBS) $(MYLIBS)
993 [FILE:192:patches/patch-liblua__liolib.c]
994 --- liblua/liolib.c.orig 2018-10-17 00:30:14 UTC
1000 +#include <unistd.h>
1006 [FILE:189:patches/patch-nmap.cc]
1007 --- nmap.cc.orig 2021-07-28 20:52:01 UTC
1013 +#include <getopt.h>
1016 #include "scan_engine.h"
1019 [FILE:441:freebsd/patch-intf.c]
1020 --- libdnet-stripped/src/intf.c.orig 2016-07-27 20:11:27 UTC
1021 +++ libdnet-stripped/src/intf.c
1022 @@ -163,7 +163,7 @@ intf_open(void)
1023 #if defined(SIOCGLIFCONF) || defined(SIOCGIFNETMASK_IN6) || defined(SIOCGIFNETMASK6)
1024 if ((intf->fd6 = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
1025 # ifdef EPROTONOSUPPORT
1026 - if (errno != EPROTONOSUPPORT)
1027 + if (errno != EPROTONOSUPPORT && errno != EAFNOSUPPORT)
1029 return (intf_close(intf));
1033 [FILE:506:freebsd/patch-libdnet-stripped__configure]
1034 --- libdnet-stripped/configure.orig 2020-10-13 20:13:38 UTC
1035 +++ libdnet-stripped/configure
1036 @@ -11824,11 +11824,8 @@ $as_echo_n "checking for Berkeley Packet
1037 if ${ac_cv_dnet_bsd_bpf+:} false; then :
1038 $as_echo_n "(cached) " >&6
1040 - if test -c /dev/bpf0 ; then
1041 - ac_cv_dnet_bsd_bpf=yes
1043 - ac_cv_dnet_bsd_bpf=no
1045 +# PR ports/154353 : support building in FreeBSD jail
1046 + ac_cv_dnet_bsd_bpf=yes
1049 { $as_echo "$as_me:${as_lineno-$LINENO}: result: $ac_cv_dnet_bsd_bpf" >&5