diff --git a/nselib/afp.lua b/nselib/afp.lua
index 5ee74078e..7b559067b 100644
--- a/nselib/afp.lua
+++ b/nselib/afp.lua
@@ -57,7 +57,7 @@
--
--
-- The next step needed to be performed is to authenticate to the server. We need to do this even for
--- functions that are available publically. In order to authenticate as the public user simply
+-- functions that are available publicly. In order to authenticate as the public user simply
-- authenticate using nil for both username and password. This can be achieved by calling the Login method
-- without any parameters, like this:
--
@@ -76,7 +76,7 @@
-- status, shares = helper:ListShares()
--
--
--- Once we're finnished, we need to logout and close the AFP session this is done by calling the
+-- Once we're finished, we need to logout and close the AFP session this is done by calling the
-- following two methods of the Helper class:
--
-- status, response = helper:Logout()
@@ -107,7 +107,7 @@
-- Revised 03/05/2010 - v0.4 - changed output table of Helper:Dir to include type and ID
-- - added support for --without-openssl
--
--- Revised 03/09/2010 - v0.5 - documentation, documenation and more documentation
+-- Revised 03/09/2010 - v0.5 - documentation, documentation and more documentation
-- Revised 04/03/2011 - v0.6 - add support for getting file- sizes, dates and Unix ACLs
-- - moved afp.username & afp.password arguments to library
@@ -337,7 +337,7 @@ local ERROR_MSG = {
[ERROR.FPBadUAM]="Specified UAM is unknown",
[ERROR.FPBadVersNum]="Server does not support the specified AFP version",
[ERROR.FPBitmapErr]="Attempt was made to get or set a parameter that cannot be obtained or set with this command, or a required bitmap is null",
- [ERROR.FPCantMove]="Attempt was made to move a directory into one of its descendent directories.",
+ [ERROR.FPCantMove]="Attempt was made to move a directory into one of its descendant directories.",
[ERROR.FPEOFErr]="No more matches or end of fork reached.",
[ERROR.FPLockErr]="Some or all of the requested range is locked by another user; a lock range conflict exists.",
[ERROR.FPMiscErr]="Non-AFP error occurred.",
@@ -385,7 +385,7 @@ Response = {
if self.error_msg then
return self.error_msg
else
- return ERROR_MSG[self.error_code] or ("Unknown error (%d) occured"):format(self.error_code)
+ return ERROR_MSG[self.error_code] or ("Unknown error (%d) occurred"):format(self.error_code)
end
end,
@@ -566,11 +566,11 @@ Proto = {
--
-- @param src_vol number containing the ID of the src file volume
-- @param srd_did number containing the directory id of the src file
- -- @param src_path string containingt the file path/name of the src file
+ -- @param src_path string containing the file path/name of the src file
-- @param dst_vol number containing the ID of the dst file volume
-- @param dst_did number containing the id of the dest. directory
-- @param dst_path string containing the dest path (can be nil or "")
- -- @param new_name string containign the new name of the destination
+ -- @param new_name string containing the new name of the destination
-- @return Response object
fp_copy_file = function(self, src_vol, src_did, src_path, dst_vol, dst_did, dst_path, new_name )
local pad, data_offset = 0, 0
@@ -643,7 +643,7 @@ Proto = {
offsets.directory_names_count, offsets.utf8_server_name
= bin.unpack(">SSSS", packet.data, pos)
- -- this sets up all the server flaqs in the response table as booleans
+ -- this sets up all the server flags in the response table as booleans
result.flags.SuperClient = flag_is_set(result.flags.raw, SERVERFLAGS.SuperClient)
result.flags.UUIDs = flag_is_set(result.flags.raw, SERVERFLAGS.UUIDs)
result.flags.UTF8ServerName = flag_is_set(result.flags.raw, SERVERFLAGS.UTF8ServerName)
@@ -848,7 +848,7 @@ Proto = {
data = response:getPacketData()
pos, parms.server_time, parms.vol_count = bin.unpack("IC", data)
- -- we should now be at the leading zero preceeding the first volume name
+ -- we should now be at the leading zero preceding the first volume name
-- next is the length of the volume name, move pos there
pos = pos + 1
@@ -875,7 +875,7 @@ Proto = {
-- o DHCAST128
--
-- The DHCAST128 UAM should work against most servers even though it's
- -- superceeded by the DHX2 UAM.
+ -- superceded by the DHX2 UAM.
--
-- @param afp_version string (AFP3.3|AFP3.2|AFP3.1)
-- @param uam string containing authentication information
@@ -1350,8 +1350,8 @@ Helper = {
--- Connects to the remote server and establishes a new AFP session
--
- -- @param host table as recieved by the action function of the script
- -- @param port table as recieved by the action function of the script
+ -- @param host table as received by the action function of the script
+ -- @param port table as received by the action function of the script
-- @return status boolean
-- @return string containing error message (if status is false)
OpenSession = function( self, host, port )
@@ -1386,7 +1386,7 @@ Helper = {
return status, packet
end,
- --- Terminates the connection, withou closing the AFP session
+ --- Terminates the connection, without closing the AFP session
--
-- @return status (always true)
-- @return string (always "")
@@ -1904,7 +1904,7 @@ Util =
--- Converts a numeric acl to string
--
- -- @param acls number containig acls as recieved from fp_get_file_dir_parms
+ -- @param acls number containing acls as received from fp_get_file_dir_parms
-- @return table of long ACLs
acls_to_long_string = function( acls )
@@ -2066,7 +2066,7 @@ Util =
local offset, p, name
pos, offset = bin.unpack(">S", data, pos)
- -- TODO: This really needs to be adressed someway
+ -- TODO: This really needs to be addressed someway
-- Barely, never, ever happens, which makes it difficult to pin down
-- http://developer.apple.com/mac/library/documentation/Networking/Reference/
-- AFP_Reference/Reference/reference.html#//apple_ref/doc/uid/TP40003548-CH3-CHDBEHBG [URL is wrapped]
diff --git a/nselib/ajp.lua b/nselib/ajp.lua
index becd4c964..cd5d26a7e 100644
--- a/nselib/ajp.lua
+++ b/nselib/ajp.lua
@@ -286,7 +286,7 @@ Comm = {
-- Sends a request to the server
--
-- @param req instance of object that can be serialized with tostring
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return err string containing error message on failure
send = function(self, req)
return self.socket:send(tostring(req))
@@ -294,7 +294,7 @@ Comm = {
-- Receives an AJP response from the server
--
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table containing the following fields, or string
-- containing error message on failure
-- status - status of response (see HTTP status codes)
@@ -380,7 +380,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
request = function(self, method, url, headers, attributes, options)
@@ -437,7 +437,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
get = function(self, url, headers, attributes, options)
@@ -450,7 +450,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
head = function(self, url, headers, attributes, options)
@@ -463,7 +463,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
trace = function(self, url, headers, attributes, options)
@@ -476,7 +476,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
put = function(self, url, headers, attributes, options)
@@ -489,7 +489,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
delete = function(self, url, headers, attributes, options)
@@ -502,7 +502,7 @@ Helper = {
-- @param headers table containing optional headers
-- @param attributes table containing optional attributes
-- @param options table with request specific options
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response table (@see Comm.receive), or string containing error
-- message on failure
options = function(self, url, headers, attributes, options)
diff --git a/nselib/asn1.lua b/nselib/asn1.lua
index 2dc7f0f22..a62589264 100644
--- a/nselib/asn1.lua
+++ b/nselib/asn1.lua
@@ -171,7 +171,7 @@ ASN1Decoder = {
end,
-- Decode one component of an OID from a byte string. 7 bits of the component
- -- are stored in each octet, most significant first, with the eigth bit set in
+ -- are stored in each octet, most significant first, with the eighth bit set in
-- all octets but the last. These encoding rules come from
-- http://luca.ntop.org/Teaching/Appunti/asn1.html, section 5.9 OBJECT
-- IDENTIFIER.
@@ -324,7 +324,7 @@ ASN1Encoder = {
registerBaseEncoders = function(self)
self.encoder = {}
- -- Bolean encoder
+ -- Boolean encoder
self.encoder['boolean'] = function( self, val )
if val then
return bin.pack('H','01 01 FF')
@@ -362,7 +362,7 @@ ASN1Encoder = {
end,
-- Encode one component of an OID as a byte string. 7 bits of the component are
- -- stored in each octet, most significant first, with the eigth bit set in all
+ -- stored in each octet, most significant first, with the eighth bit set in all
-- octets but the last. These encoding rules come from
-- http://luca.ntop.org/Teaching/Appunti/asn1.html, section 5.9 OBJECT
-- IDENTIFIER.
diff --git a/nselib/base32.lua b/nselib/base32.lua
index dd4e9fd53..562cdd6c3 100644
--- a/nselib/base32.lua
+++ b/nselib/base32.lua
@@ -28,7 +28,7 @@ local b32standard = {
'Y', 'Z', '2', '3', '4', '5', '6', '7',
}
-local b32dcstandard = {} -- efficency
+local b32dcstandard = {} -- efficiency
b32dcstandard['A'] = '00000'
b32dcstandard['B'] = '00001'
b32dcstandard['C'] = '00010'
@@ -69,7 +69,7 @@ local b32hexExtend = {
'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V',
}
-local b32dchexExtend = {} -- efficency
+local b32dchexExtend = {} -- efficiency
b32dchexExtend['0'] = '00000'
b32dchexExtend['1'] = '00001'
b32dchexExtend['2'] = '00010'
diff --git a/nselib/base64.lua b/nselib/base64.lua
index 20601c428..25da8cc1a 100644
--- a/nselib/base64.lua
+++ b/nselib/base64.lua
@@ -26,7 +26,7 @@ local b64table = {
'4', '5', '6', '7', '8', '9', '+', '/'
}
-local b64dctable = {} -- efficency
+local b64dctable = {} -- efficiency
b64dctable['A'] = '000000'
b64dctable['B'] = '000001'
b64dctable['C'] = '000010'
diff --git a/nselib/bittorrent.lua b/nselib/bittorrent.lua
index c9389ca62..2bf648514 100644
--- a/nselib/bittorrent.lua
+++ b/nselib/bittorrent.lua
@@ -410,7 +410,7 @@ end
--- This thread sends a DHT find_node query to every node in
-- pnt.nodes_find_node, after which every node is moved to pnt.nodes_get_peers
-- to be processed by the get_peers_thread() function. The responses to these
--- queries contain adresses of other DHT nodes (usually 8) which are added to
+-- queries contain addresses of other DHT nodes (usually 8) which are added to
-- the pnt.nodes_find_node list. This action is done for a timeout with a
-- default value of 30 seconds.
local find_node_thread = function(pnt, timeout)
@@ -430,7 +430,7 @@ local find_node_thread = function(pnt, timeout)
-- standard bittorrent protocol specified find_node query with y = q (query),
-- q = "find_node" (type of query),
- -- find_node Query = {"t":, "y":"q", "q":"find_node", "a": {"id":, "target":}}
+ -- find_node Query = {"t":, "y":"q", "q":"find_node", "a": {"id":, "target":}}
local find_node_query = "d1:ad2:id20:" .. pnt.node_id .. "6:target20:" ..
pnt.info_hash .. "e1:q9:find_node1:t2:" .. openssl.rand_bytes(2) .. "1:y1:qe"
@@ -1173,7 +1173,7 @@ Torrent =
-- the action in the response has to be 0 too
if not r_action == "00000000" then
- return false, "Wrong action field, usualy caused by an erroneous request"
+ return false, "Wrong action field, usually caused by an erroneous request"
end
-- established a connection, and now for an announce message, to which a
diff --git a/nselib/bjnp.lua b/nselib/bjnp.lua
index f9a0ac2a8..a7f76e876 100644
--- a/nselib/bjnp.lua
+++ b/nselib/bjnp.lua
@@ -284,7 +284,7 @@ Helper = {
-- @return attribs table containing device attributes when status is true
-- errmsg string containing the error message when status is false
getDeviceIdentity = function(self, devtype)
- -- Were currenlty only decoding this as I don't know what the other cruft is
+ -- Were currently only decoding this as I don't know what the other cruft is
local attrib_names = {
["scanner"] = {
{ ['MFG'] = "Manufacturer" },
diff --git a/nselib/brute.lua b/nselib/brute.lua
index 5265fa6a9..bb4235564 100644
--- a/nselib/brute.lua
+++ b/nselib/brute.lua
@@ -2,7 +2,7 @@
-- The brute library is an attempt to create a common framework for performing
-- password guessing against remote services.
--
--- The library currently attempts to parallellize the guessing by starting
+-- The library currently attempts to parallelize the guessing by starting
-- a number of working threads. The number of threads can be defined using
-- the brute.threads argument, it defaults to 10.
--
@@ -73,7 +73,7 @@
-- The connect method provides the framework with the ability to
-- ensure that the thread can run once it has been dispatched a set of
-- credentials. As the sockets in NSE are limited we want to limit the risk of
--- a thread blocking, due to insufficient free sockets, after it has aquired a
+-- a thread blocking, due to insufficient free sockets, after it has acquired a
-- username and password pair.
--
-- The following sample code illustrates how to implement a sample
@@ -141,7 +141,7 @@
-- @args brute.passonly iterate over passwords only for services that provide
-- only a password for authentication. (default: false)
-- @args brute.retries the number of times to retry if recoverable failures
--- occure. (default: 3)
+-- occur. (default: 3)
-- @args brute.delay the number of seconds to wait between guesses (default: 0)
-- @args brute.threads the number of initial worker threads, the number of
-- active threads will be automatically adjusted.
@@ -214,7 +214,7 @@ _ENV = stdnse.module("brute", stdnse.seeall)
-- * mode - can be set to either cred, user or pass and controls
-- whether the engine should iterate over users, passwords
-- or fetch a list of credentials from a single file.
--- (can be set using script-arg brut.mode)
+-- (can be set using script-arg brute.mode)
-- * title - changes the title of the result table where the
-- passwords are returned.
-- * nostore - don't store the results in the credential library
@@ -502,7 +502,7 @@ Engine =
local driver = self.driver:new( self.host, self.port, self.driver_options )
status = driver:connect()
- -- Did we succesfully connect?
+ -- Did we successfully connect?
if ( status ) then
if ( not(username) and not(password) ) then
repeat
@@ -545,7 +545,7 @@ Engine =
retries = retries - 1
-- End if:
- -- * The guess was successfull
+ -- * The guess was successful
-- * The response was not set to retry
-- * We've reached the maximum retry attempts
until( status or ( response and not( response:isRetry() ) ) or retries == 0)
@@ -621,7 +621,7 @@ Engine =
stdnse.print_debug(2, "threads=%d,tps=%d", self:activeThreads(), tps )
end
- -- if delay was speciefied, do sleep
+ -- if delay was specified, do sleep
if ( self.options.delay > 0 ) then stdnse.sleep( self.options.delay ) end
end
condvar "signal"
@@ -775,7 +775,7 @@ Engine =
result = ( #result ) and stdnse.format_output( true, result ) or ""
- -- Did any error occure? If so add this to the result.
+ -- Did any error occur? If so add this to the result.
if ( self.error ) then
result = result .. (" \n ERROR: %s"):format( self.error )
return false, result
diff --git a/nselib/cassandra.lua b/nselib/cassandra.lua
index 1c612c874..a08d35005 100644
--- a/nselib/cassandra.lua
+++ b/nselib/cassandra.lua
@@ -102,7 +102,7 @@ function sendcmd (socket, command, cnt)
response = response .. resp2
end
- -- magic response starts at 5th byte for 4 bytes, 4 byte for length + length of string commmand
+ -- magic response starts at 5th byte for 4 bytes, 4 byte for length + length of string command
if (string.sub(response,5,8+4+string.len(command)) ~= CASSANDRARESP..pack4str(command)) then
return false, "protocol response error"
end
diff --git a/nselib/creds.lua b/nselib/creds.lua
index bffb32a4e..fc6078a0e 100644
--- a/nselib/creds.lua
+++ b/nselib/creds.lua
@@ -72,7 +72,7 @@
--
--
-- Supported output formats are CSV, verbose and plain. In both verbose and plain
--- records are seperated by colons. The difference between the two is that verbose
+-- records are separated by colons. The difference between the two is that verbose
-- includes the credential state. The file extension is automatically added to
-- the filename based on the type requested.
--
diff --git a/nselib/dhcp.lua b/nselib/dhcp.lua
index 37a9f1f86..e6df6cbec 100644
--- a/nselib/dhcp.lua
+++ b/nselib/dhcp.lua
@@ -11,7 +11,7 @@
-- 2011-12-28 - Revised by Patrik Karlsson
-- o Split dhcp_send into dhcp_send, dhcp_receive
-- o Added basic support for adding options to requests
--- o Added possibility to ovverride transaction id
+-- o Added possibility to override transaction id
-- o Added WPAD action
local bin = require "bin"
diff --git a/nselib/dhcp6.lua b/nselib/dhcp6.lua
index ac7e9cd8e..6c94faa43 100644
--- a/nselib/dhcp6.lua
+++ b/nselib/dhcp6.lua
@@ -581,7 +581,7 @@ Helper = {
self.__index = self
local info, err = nmap.get_interface_info(iface)
- -- if we faile to get interface info, don't return a helper
+ -- if we fail to get interface info, don't return a helper
-- this is true on OS X for interfaces like: p2p0 and vboxnet0
if ( not(info) and err ) then
return
@@ -593,7 +593,7 @@ Helper = {
return o
end,
- -- Sends a DHCP6 Solicit message to the server, essentiall requesting a new
+ -- Sends a DHCP6 Solicit message to the server, essentially requesting a new
-- IPv6 non-temporary address
-- @return table of results suitable for use with
-- stdnse.format_output
diff --git a/nselib/dns.lua b/nselib/dns.lua
index fbafdabfc..de47e3026 100644
--- a/nselib/dns.lua
+++ b/nselib/dns.lua
@@ -167,7 +167,7 @@ local function sendPacketsTCP(data, host, port, timeout)
end
---
--- Call appropriate protocol handeler
+-- Call appropriate protocol handler
-- @param data Data to be sent.
-- @param host Host to connect to.
-- @param port Port to connect to.
@@ -682,7 +682,7 @@ additionalFetcher[types.TXT] = function(dec, retAll)
if not retAll and dec.add[1].data then
return true, string.sub(dec.add[1].data, 2)
elseif not retAll then
- stdnse.print_debug(1, "dns.aditionalFetcher found no records of the required type: TXT")
+ stdnse.print_debug(1, "dns.additionalFetcher found no records of the required type: TXT")
return false, "No Answers"
else
for _, v in ipairs(dec.add) do
@@ -1413,7 +1413,7 @@ local function encodeOPT_Z(flags)
end
---
--- Adds an client-subnet paylod to the OPT packet
+-- Adds an client-subnet payload to the OPT packet
-- implementing http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
-- @param pkt Table representing DNS packet.
-- @param Z Table of Z flags. Only DO is supported.
@@ -1431,7 +1431,7 @@ function addClientSubnet(pkt,Z,subnet)
end
---
--- Adds an NSID paylod to the OPT packet
+-- Adds an NSID payload to the OPT packet
-- @param pkt Table representing DNS packet.
-- @param Z Table of Z flags. Only DO is supported.
function addNSID (pkt,Z)
diff --git a/nselib/dnsbl.lua b/nselib/dnsbl.lua
index 833ca4291..9668f2099 100644
--- a/nselib/dnsbl.lua
+++ b/nselib/dnsbl.lua
@@ -102,7 +102,7 @@ SERVICES = {
local rev_ip = dns.reverse(self.ip):match("^(.*)%.in%-addr%.arpa$")
return ("%s.spam.dnsbl.sorbs.net"):format(rev_ip)
end,
- -- This function parses the response and supports borth long and
+ -- This function parses the response and supports both long and
-- short mode.
resp_parser = function(self, r)
local responses = {
@@ -384,7 +384,7 @@ SERVICES = {
local octet1, octet2, octet3, octet4 = table.unpack(parts)
if ( octet1 ~= 127 ) then
- -- This should'nt happen :P
+ -- This shouldn't happen :P
stdnse.print_debug(
"The request made to dnsbl.httpbl.org was considered invalid (%i)",
octet1)
diff --git a/nselib/dnssd.lua b/nselib/dnssd.lua
index 3376b5a5e..375ba8ada 100644
--- a/nselib/dnssd.lua
+++ b/nselib/dnssd.lua
@@ -3,7 +3,7 @@
-- The library supports
-- * Unicast and Multicast requests
-- * Decoding responses
--- * Running requests in parallell using Lua coroutines
+-- * Running requests in parallel using Lua coroutines
--
-- The library contains the following classes
-- * Comm
@@ -14,15 +14,15 @@
-- * Util
-- ** The Util class contains a number of static functions mainly used to convert data.
--
--- The following code snipplet queries all mDNS resolvers on the network for a
--- full list of their supported services and returns the formated output:
+-- The following code snippet queries all mDNS resolvers on the network for a
+-- full list of their supported services and returns the formatted output:
--
-- local helper = dnssd.Helper:new( )
-- helper:setMulticast(true)
-- return stdnse.format_output(helper:queryServices())
--
--
--- This next snipplet queries a specific host for the same information:
+-- This next snippet queries a specific host for the same information:
--
-- local helper = dnssd.Helper:new( host, port )
-- return stdnse.format_output(helper:queryServices())
@@ -86,7 +86,7 @@ Util = {
local services = {}
-- Create unique table of services
for _, r in ipairs( response ) do
- -- do we really have mutliple responses?
+ -- do we really have multiple responses?
if ( not(r.output) ) then return end
for _, svc in ipairs(r.output ) do
services[svc] = services[svc] or {}
@@ -116,7 +116,7 @@ Util = {
return services
end,
- --- Returns the amount of currenlty active threads
+ --- Returns the amount of currently active threads
--
-- @param threads table containing the list of threads
-- @return count number containing the number of non-dead threads
diff --git a/nselib/drda.lua b/nselib/drda.lua
index f9ebee571..867d5e1eb 100644
--- a/nselib/drda.lua
+++ b/nselib/drda.lua
@@ -634,9 +634,9 @@ Helper = {
-- At this point we have a few differences in behaviour
-- * DB2 has told us earlier if the DB does not exist
-- * Apache Derby will do so here, regardless of the login was
- -- successfull or not
+ -- successful or not
-- * Informix will tell us that the DB does not exist IF the
- -- login was successfull
+ -- login was successful
--
-- Therefore the order of these checks are important!!
if ( packet:getDRDAByCodePoint( CodePoint.ACCRDBRM ) ) then
@@ -778,7 +778,7 @@ StringUtil =
--
-- @param str string to pad
-- @param chr char to pad with
- -- @param len the total length of the finnished string
+ -- @param len the total length of the finished string
-- @return str string containing the padded string
padWithChar = function( str, chr, len )
if ( len < #str ) then
diff --git a/nselib/eigrp.lua b/nselib/eigrp.lua
index 6014933f5..f5c6bd284 100644
--- a/nselib/eigrp.lua
+++ b/nselib/eigrp.lua
@@ -88,7 +88,7 @@ EIGRP = {
return o
end,
- --- Parses a raw eigrp packet and returns a structred response.
+ --- Parses a raw eigrp packet and returns a structured response.
-- @param eigrp_raw string EIGRP Raw packet.
-- @return response table Structured eigrp packet.
parse = function(eigrp_raw)
diff --git a/nselib/giop.lua b/nselib/giop.lua
index 0dacc2107..17ece68dd 100644
--- a/nselib/giop.lua
+++ b/nselib/giop.lua
@@ -95,8 +95,8 @@ Packet.GIOP = {
--- Creates a Packet.GIOP
--
- -- @param msgtype number containing the messaget type
- -- @param data string conatining the message data
+ -- @param msgtype number containing the message type
+ -- @param data string containing the message data
-- @return obj a new Packet.GIOP instance
new = function( self, msgtype, data )
local o = {}
@@ -422,7 +422,7 @@ MessageDecoder = {
--- Decodes a get response
--
- -- @param packet the GIOP packet as recieved by the comm
+ -- @param packet the GIOP packet as received by the comm
-- exchGIOPPacket function
-- @return status true on success, false on failure
-- @return table containing ip and ctx
@@ -445,7 +445,7 @@ MessageDecoder = {
--- Decodes a _is_a response (not implemented)
--
- -- @param packet the GIOP packet as recieved by the comm
+ -- @param packet the GIOP packet as received by the comm
-- exchGIOPPacket function
-- @return status, always true
["_is_a"] = function( packet )
@@ -454,7 +454,7 @@ MessageDecoder = {
--- Decodes a list response
--
- -- @param packet the GIOP packet as recieved by the comm
+ -- @param packet the GIOP packet as received by the comm
-- exchGIOPPacket function
-- @return status true on success, false on failure
-- @return table containing id, kind and
@@ -509,7 +509,7 @@ Comm = {
return o
end,
- --- Sends and recieves a GIOP packet
+ --- Sends and receives a GIOP packet
--
-- @param packet containing a Packet.* object, the object must
-- implement the __tostring meta method
diff --git a/nselib/gps.lua b/nselib/gps.lua
index b47005178..68c17b8a1 100644
--- a/nselib/gps.lua
+++ b/nselib/gps.lua
@@ -72,7 +72,7 @@ NMEA = {
return true
end,
- -- Parses a GPS sentence using the apropriate parser
+ -- Parses a GPS sentence using the appropriate parser
--
-- @param str containing the GPS sentence
-- @return entry table containing the parsed response or
diff --git a/nselib/http.lua b/nselib/http.lua
index 88d16dfc5..1169c2818 100644
--- a/nselib/http.lua
+++ b/nselib/http.lua
@@ -620,7 +620,7 @@ local function recv_body(s, response, method, partial)
end
-- 4. If the message uses the media type "multipart/byteranges", and the
- -- ransfer-length is not otherwise specified, then this self- elimiting
+ -- transfer-length is not otherwise specified, then this self-delimiting
-- media type defines the transfer-length. [sic]
-- Case 4 is unhandled.
@@ -998,7 +998,7 @@ local function lookup_cache (method, host, port, path, options)
end
local function response_is_cacheable(response)
- -- if response.status is nil, then an error must have occured during the request
+ -- if response.status is nil, then an error must have occurred during the request
-- and we probably don't want to cache the response
if not response.status then
return false
@@ -1444,7 +1444,7 @@ local function get_redirect_ok(host, port, options)
end
---Fetches a resource with a GET request and returns the result as a table. This is a simple
--- wraper around generic_request, with the added benefit of having local caching
+-- wrapper around generic_request, with the added benefit of having local caching
-- and support for HTTP redirects. Redirects are followed only if they pass all the
-- validation rules of the redirect_ok function. This function may be overridden by supplying
-- a custom function in the redirect_ok field of the options array. The default
@@ -1621,7 +1621,7 @@ end
--
-- @param path The path to retrieve.
-- @param options [optional] A table that lets the caller control socket timeouts, HTTP headers, and other parameters. For full documentation, see the module documentation (above).
--- @param all_requests [optional] The current pipeline queue (retunred from a previous add_pipeline call), or nil if it's the first call.
+-- @param all_requests [optional] The current pipeline queue (returned from a previous add_pipeline call), or nil if it's the first call.
-- @param method [optional] The HTTP method ('GET', 'HEAD', 'POST', etc). Default: 'GET'.
-- @return Table with the pipeline get requests (plus this new one)
-- @see http.pipeline_go
diff --git a/nselib/httpspider.lua b/nselib/httpspider.lua
index 79e0c4331..08b439d2d 100644
--- a/nselib/httpspider.lua
+++ b/nselib/httpspider.lua
@@ -41,16 +41,16 @@
-- For advanced use, the library currently supports a number of closures (withinhost,
-- withindomain, doscraping). Please note, that withinhost and withindomain options also
-- support boolean values. You will want to override them only for advanced use. You can
--- define them using the following ultities:
+-- define them using the following utilities:
--
-- * iswithinhost
--- ** You can use this ultity to check if the resource exists within the host.
+-- ** You can use this utility to check if the resource exists within the host.
--
-- * iswithindomain
--- ** You can use this ultity to check if the resource exists within the domain.
+-- ** You can use this utility to check if the resource exists within the domain.
--
-- * isresource
--- ** You can use this ultity to check the type of the resource (for example "js").
+-- ** You can use this utility to check the type of the resource (for example "js").
-- ** A third option may hold a number of signs that may exist after the extension
-- ** of the resource. By default, these are [#, ?]. For example, if we want to return
-- only php resources, the function will also return example.php?query=foo or
@@ -506,7 +506,7 @@ UrlQueue = {
return o
end,
- -- get's the next available url in the queue
+ -- gets the next available url in the queue
getNext = function(self)
return table.remove(self.urls,1)
end,
@@ -548,7 +548,7 @@ Crawler = {
removewww = function(url) return string.gsub(url, "^www%.", "") end,
- -- An ultity when defining closures. Checks if the resource exists within host.
+ -- An utility when defining closures. Checks if the resource exists within host.
-- @param u URL that points to the resource we want to check.
iswithinhost = function(self, u)
local parsed_u = url.parse(tostring(u))
@@ -565,7 +565,7 @@ Crawler = {
return true
end,
- -- An ultity when defining closures. Checks if the resource exists within domain.
+ -- An utility when defining closures. Checks if the resource exists within domain.
-- @param u URL that points to the resource we want to check.
iswithindomain = function(self, u)
local parsed_u = url.parse(tostring(u))
@@ -581,7 +581,7 @@ Crawler = {
return true
end,
- -- An ultity when defining closures. Checks the type of the resource.
+ -- An utility when defining closures. Checks the type of the resource.
-- @param u URL that points to the resource we want to check.
-- @param ext the extension of the resource.
-- @param signs table of signs that may exist after the extension of the resource.
@@ -663,12 +663,12 @@ Crawler = {
o.options.timeout = o.options.timeout or 10000
o.processed = {}
- -- script arguments have precedense
+ -- script arguments have precedence
if ( not(o.options.maxdepth) ) then
o.options.maxdepth = tonumber(stdnse.get_script_args("httpspider.maxdepth"))
end
- -- script arguments have precedense
+ -- script arguments have precedence
if ( not(o.options.maxpagecount) ) then
o.options.maxpagecount = tonumber(stdnse.get_script_args("httpspider.maxpagecount"))
end
@@ -678,7 +678,7 @@ Crawler = {
end
if ( o.options.useheadfornonwebfiles ) then
- -- Load web files extensitons from a file in nselib/data folder.
+ -- Load web files extensions from a file in nselib/data folder.
-- For more information on individual file formats, see
-- http://en.wikipedia.org/wiki/List_of_file_formats.
o.web_files_extensions = {}
diff --git a/nselib/iax2.lua b/nselib/iax2.lua
index 4f8f2f273..f42ec63d1 100644
--- a/nselib/iax2.lua
+++ b/nselib/iax2.lua
@@ -269,7 +269,7 @@ Helper = {
end,
-- Request a session release
- -- @param username string containing the extention (username)
+ -- @param username string containing the extension (username)
-- @param password string containing the password
regRelease = function(self, username, password)
diff --git a/nselib/ike.lua b/nselib/ike.lua
index b916b0ae9..05bca7ac4 100644
--- a/nselib/ike.lua
+++ b/nselib/ike.lua
@@ -11,7 +11,7 @@ local io = require "io"
description = [[
A very basic IKE library.
-The current funcionality includes:
+The current functionality includes:
1. Generating a Main or Aggressive Mode IKE request packet with a variable amount of transforms and a vpn group.
2. Sending a packet
3. Receiving the response
@@ -271,7 +271,7 @@ local function lookup(vendor_ids)
if row.category == 'vid_ordering' and all_vids:find(row.fingerprint) then
- -- Use ordering information if there where no vendor matches from prevoius step
+ -- Use ordering information if there where no vendor matches from previous step
if info.vendor == nil then
info.vendor = row
@@ -489,7 +489,7 @@ end
-- Generate multiple transforms
--- Input nust be a table of complete transforms
+-- Input must be a table of complete transforms
--
local function generate_transforms(transform_table)
local transforms = ''
@@ -504,7 +504,7 @@ end
-- Create a request packet
-- Support for multiple transforms, which minimizes the
--- the amount of traffic/packets needed to be sendt
+-- the amount of traffic/packets needed to be sent
--
function request(port, proto, mode, transforms, diffie, id)
local payload_after_sa, str_aggressive, l, l_sa, l_pro
diff --git a/nselib/imap.lua b/nselib/imap.lua
index 37f3fbbee..bd869def9 100644
--- a/nselib/imap.lua
+++ b/nselib/imap.lua
@@ -8,7 +8,7 @@
-- interface for script writers, and the IMAP class providing
-- all protocol-level functionality.
--
--- The following example illustrates the reommended use of the library:
+-- The following example illustrates the recommended use of the library:
--
-- local helper = imap.Helper:new(host, port)
-- helper:connect()
@@ -130,7 +130,7 @@ IMAP = {
status, data = self.socket:send("TlRMTVNTUAABAAAAB7IIogYABgA3AAAADwAPACgAAAAFASgKAAAAD0FCVVNFLUFJUi5MT0NBTERPTUFJTg==\r\n")
if ( not(status) ) then return false, "ERROR: Failed to send NTLM packet" end
status, data = self:receive()
- if ( not(status) ) then return false, "ERROR: Failed to receieve NTLM challenge" end
+ if ( not(status) ) then return false, "ERROR: Failed to receive NTLM challenge" end
end
if ( data:match(("^A%04d "):format(self.counter-1)) ) then
@@ -245,7 +245,7 @@ Helper = {
return self.client:connect()
end,
- --- Login to the server using eithe plain-text or using the authentication
+ --- Login to the server using either plain-text or using the authentication
-- mechanism provided in the mech argument.
--
-- @param username string containing the username
diff --git a/nselib/informix.lua b/nselib/informix.lua
index b06bba005..0605fb835 100644
--- a/nselib/informix.lua
+++ b/nselib/informix.lua
@@ -372,7 +372,7 @@ MessageDecoders = {
_, len = bin.unpack(">S", data )
-- For some *@#! reason the SQ_DONE packet sometimes contains an
- -- length exeeding the length of the packet by one. Attempt to
+ -- length exceeding the length of the packet by one. Attempt to
-- detect this and fix.
status, data = socket:receive_buf(match.numbytes(len), true)
_, tmp = bin.unpack(">S", data, len - 2)
@@ -471,7 +471,7 @@ MessageDecoders = {
--
-- @param socket already connected to the Informix database server
-- @param info table containing the following fields:
- -- metadata as recieved from SQ_DESCRIBE
+ -- metadata as received from SQ_DESCRIBE
-- rows containing already retrieved rows
-- id containing the statement id as sent to SQ_ID
-- @return status true on success, false on failure
@@ -1026,7 +1026,7 @@ Packet.Connect = {
pos, tmp = bin.unpack(">S", data, pos)
if ( 108 ~= tmp ) then
- return false, "Connect recieved unexpected response"
+ return false, "Connect received unexpected response"
end
pos = pos + 12
@@ -1058,7 +1058,7 @@ Packet.Connect = {
pos, tmp = bin.unpack(">S", data, pos)
if ( tmp ~= 102 ) then
- return false, "Connect recieved unexpected response"
+ return false, "Connect received unexpected response"
end
pos = pos + 6
@@ -1066,7 +1066,7 @@ Packet.Connect = {
pos, self.oserror = bin.unpack(">s", data, pos )
if ( self.svcerror ~= 0 ) then
- self.errmsg = Constants.ErrorMsg[self.svcerror] or ("Unknown error %d occured"):format( self.svcerror )
+ self.errmsg = Constants.ErrorMsg[self.svcerror] or ("Unknown error %d occurred"):format( self.svcerror )
end
return true
@@ -1204,7 +1204,7 @@ Helper = {
--- Attempts to login to the Informix database server
-- The optional parameters parameter takes any informix specific parameters
- -- used to connect to the database. In case it's ommited a set of default
+ -- used to connect to the database. In case it's omitted a set of default
-- parameters are set. Parameters should be past as key, value pairs inside
-- of a table array as the following example:
--
diff --git a/nselib/ipp.lua b/nselib/ipp.lua
index 296f6f190..b6b6047d3 100644
--- a/nselib/ipp.lua
+++ b/nselib/ipp.lua
@@ -398,7 +398,7 @@ Helper = {
for _, ag in ipairs(response:getAttributeGroups(IPP.Attribute.IPP_TAG_JOB)) do
local uri = ag:getAttributeValue("printer-uri")
local printer = uri:match(".*/(.*)$") or "Unknown"
- -- some jobs have mutlitple state attributes, so far the ENUM ones have been correct
+ -- some jobs have multiple state attributes, so far the ENUM ones have been correct
local state = ag:getAttributeValue("job-state", IPP.Attribute.IPP_TAG_ENUM) or ag:getAttributeValue("job-state")
-- some jobs have multiple id tag, so far the INTEGER type have shown the correct ID
local id = ag:getAttributeValue("job-id", IPP.Attribute.IPP_TAG_INTEGER) or ag:getAttributeValue("job-id")
diff --git a/nselib/isns.lua b/nselib/isns.lua
index 00fb12fc0..0e018c1ce 100644
--- a/nselib/isns.lua
+++ b/nselib/isns.lua
@@ -261,7 +261,7 @@ Request = {
-- @param func_id number containing the function ID of the message
-- @param flags number containing the message flags
-- @param data string containing the opaque raw data
- -- @param auth string containing the opaqur raw auth data
+ -- @param auth string containing the opaque raw auth data
-- @param trans_id number containing the transaction id
-- @param seq_id number containing the sequence id
-- @return o new instance of Request
@@ -452,7 +452,7 @@ Helper = {
--
-- Lists portals
-- @return status true on success, false on failure
- -- @return resulst list of iSCSI nodes, err string on failure
+ -- @return results list of iSCSI nodes, err string on failure
listPortals = function(self)
local attribs, name = Attributes:new(), "iqn.control.node\0por"
@@ -510,7 +510,7 @@ Helper = {
--
-- Lists iSCSI nodes
-- @return status true on success, false on failure
- -- @return resulst list of iSCSI nodes, err string on failure
+ -- @return results list of iSCSI nodes, err string on failure
listISCINodes = function(self)
local attribs = Attributes:new()
local name = "iqn.control.node\0por"
diff --git a/nselib/jdwp.lua b/nselib/jdwp.lua
index d880b0a83..2542b95c4 100644
--- a/nselib/jdwp.lua
+++ b/nselib/jdwp.lua
@@ -1,14 +1,14 @@
--- JDWP (Java Debug Wire Protocol) library implementing a set of commands needed to
-- use remote debugging port and inject java bytecode.
--
--- There are two basic packet types in JDWP protool.
+-- There are two basic packet types in JDWP protocol.
-- Command packet and reply packet. Command packets are sent by
-- a debugger to a remote port which replies with a reply packet.
--
-- Simple handshake is needed to start the communication.
-- The debugger sends a "JDWP-Handshake" string and gets the same as a reply.
-- Each (command and reply packet) has an id field since communication can be asynchronous.
--- Packet id can be monothonicaly increasing.
+-- Packet id can be monotonicaly increasing.
-- Although communication can be asynchronous, it is not (at least in my tests) so the same
-- packet id can be used for all communication.
--
@@ -128,13 +128,13 @@ JDWPCommandPacket = {
end,
-- Packs command packet as a string od bytes, ready to be sent
- -- to the target debugee.
+ -- to the target debuggee.
pack = function(self)
local packed_packet
if self.data == nil then
- packed_packet = bin.pack(">I",11) -- lenght - minimal header is 11 bytes
+ packed_packet = bin.pack(">I",11) -- length - minimal header is 11 bytes
else
- packed_packet = bin.pack(">I",11 + #self.data) -- lenght with data
+ packed_packet = bin.pack(">I",11 + #self.data) -- length with data
end
packed_packet = packed_packet .. bin.pack(">I",self.id)
packed_packet = packed_packet .. bin.pack(">C",0) -- flag
@@ -182,7 +182,7 @@ JDWPReplyPacket = {
}
---- Negotiates the initial debugger-debugee handshake.
+--- Negotiates the initial debugger-debuggee handshake.
--
--@param host Host to connect to.
--@param port Port to connect to.
@@ -217,14 +217,14 @@ end
--- Helper function to pack regular string into UTF-8 string.
--
--@param data String to pack into UTF-8.
---@return utf8_string UTF-8 packed string. Four bytes lenght followed by the string its self.
+--@return utf8_string UTF-8 packed string. Four bytes length followed by the string its self.
function toUTF8(data)
local utf8_string = bin.pack(">i",#data) .. data
return utf8_string
end
--- Helper function to read all Reply packed data which might be fragmented
--- over multipe packets.
+-- over multiple packets.
--
--@param socket Socket to receive from.
--@return (status,data) If status is false, error string is returned, else data contains read ReplyPacket bytes.
@@ -238,7 +238,7 @@ function receive_all(socket)
while expected_length > #data do -- read until we get all the ReplyPacket data
status,result = socket:receive()
if not status then
- return true, data -- if somethign is wrong,return partial data
+ return true, data -- if something is wrong, return partial data
end
data = data .. result
end
@@ -251,7 +251,7 @@ end
--
--@param data Data from which to extract the string.
--@param pos Offset into data string where to begin.
---@return (pos,ascii_string) Returns position where the string extraction ended and actuall ascii string.
+--@return (pos,ascii_string) Returns position where the string extraction ended and actual ascii string.
local function extract_string(data,pos)
local string_size
if pos > #data then
@@ -281,7 +281,7 @@ function executeCommand(socket,command)
if not status then
return false, reply_packet
end
- if not (reply_packet.error_code == 0) then -- we have a packet with error , error code 0 means no error occured
+ if not (reply_packet.error_code == 0) then -- we have a packet with error , error code 0 means no error occurred
return false, ERROR_CODES[reply_packet.error_code]
end
local data = reply_packet.data
@@ -289,7 +289,7 @@ function executeCommand(socket,command)
end
--- VirtualMachine Command Set (1)
--- Commands targeted at the debugggee virtual machine.
+-- Commands targeted at the debuggee virtual machine.
-- http://docs.oracle.com/javase/1.5.0/docs/guide/jpda/jdwp/jdwp-protocol.html#JDWP_VirtualMachine
@@ -297,7 +297,7 @@ end
-- Returns the JDWP version implemented by the target VM as a table.
--
-- Returns a table with following values:
--- * 'description' Debugge vm verbose description.
+-- * 'description' Debugger vm verbose description.
-- * 'jdwpMajor' Number representing major JDWP version.
-- * 'jdwpMinor' Number representing minor JDWP version.
-- * 'vmVersion' String representing version of the debuggee VM.
@@ -376,7 +376,7 @@ end
--
--@param socket Socket to use to send the command.
--@param id Packet id.
---@return (status, threads) If status is false threads contains an error string, else it conatins a list of all threads in the debuggee VM.
+--@return (status, threads) If status is false threads contains an error string, else it contains a list of all threads in the debuggee VM.
function getAllThreads(socket,id)
local command = JDWPCommandPacket:new(id,1,4,nil)
local status, data = executeCommand(socket,command)
@@ -567,7 +567,7 @@ end
--@numberOfArguments Number of method arguments.
--@arguments Already packed arguments.
--@options Invocation options.
---@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manualy.
+--@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manually.
function invokeStaticMethod(socket,id,classID,methodID,numberOfArguments,arguments,options)
local params
if numberOfArguments == 0 then
@@ -685,7 +685,7 @@ end
--@param methodID ID of the method to invoke.
--@param numberOfArguments Number of method arguments.
--@arguments Already packed arguments.
---@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manualy.
+--@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manually.
function invokeObjectMethod(socket,id,objectID,threadID,classID,methodID,numberOfArguments,arguments)
local params
@@ -922,7 +922,7 @@ end
--
-- Returns a table containing following fields:
-- * 'id' Injected class reference ID.
--- * 'instance' Inected calss' instance reference ID.
+-- * 'instance' Injected calss' instance reference ID.
-- * 'thread' Thread in which the class was injected and instantiated.
--
-- @param socket Socket to use for communication.
@@ -944,7 +944,7 @@ function injectClass(socket,class_bytes)
end
end
if byteArrayID == nil then
- stdnse.print_debug("finding byte arrray id failed")
+ stdnse.print_debug("finding byte array id failed")
return false
end
stdnse.print_debug("Found byte[] id %d",byteArrayID)
diff --git a/nselib/json.lua b/nselib/json.lua
index 88607b163..fa8c88ab2 100644
--- a/nselib/json.lua
+++ b/nselib/json.lua
@@ -21,7 +21,7 @@
-- Heavily modified 02/22/2010 - v0.3. Rewrote the parser into an OO-form, to not have to handle
-- all kinds of state with parameters and return values.
-- Modified 02/27/2010 - v0.4 Added unicode handling (written by David Fifield). Renamed toJson
--- and fromJson intogenerate() and parse(), implemented more proper numeric parsing and added some more error checking.
+-- and fromJson into generate() and parse(), implemented more proper numeric parsing and added some more error checking.
local bit = require "bit"
local nmap = require "nmap"
@@ -404,7 +404,7 @@ function Json:parseUnicodeEscape()
end
-- Encode a Unicode code point to UTF-8. See RFC 3629.
--- Does not check that cp is a real charaacter; that is, doesn't exclude the
+-- Does not check that cp is a real character; that is, doesn't exclude the
-- surrogate range U+D800 - U+DFFF and a handful of others.
local function utf8_enc(cp)
local bytes = {}
diff --git a/nselib/ldap.lua b/nselib/ldap.lua
index 3102d2940..132589475 100644
--- a/nselib/ldap.lua
+++ b/nselib/ldap.lua
@@ -29,7 +29,7 @@ _ENV = stdnse.module("ldap", stdnse.seeall)
local ldapMessageId = 1
ERROR_MSG = {}
-ERROR_MSG[1] = "Intialization of LDAP library failed."
+ERROR_MSG[1] = "Initialization of LDAP library failed."
ERROR_MSG[4] = "Size limit exceeded."
ERROR_MSG[13] = "Confidentiality required"
ERROR_MSG[32] = "No such object"
@@ -367,7 +367,7 @@ function bindRequest( socket, params )
response.protocolOp = asn1.intToBER( tmp )
if response.protocolOp.number ~= APPNO.BindResponse then
- return false, string.format("Recieved incorrect Op in packet: %d, expected %d", response.protocolOp.number, APPNO.BindResponse)
+ return false, string.format("Received incorrect Op in packet: %d, expected %d", response.protocolOp.number, APPNO.BindResponse)
end
pos, response.resultCode = decode( packet, pos )
@@ -378,7 +378,7 @@ function bindRequest( socket, params )
pos, response.errorMessage = decode( packet, pos )
error_msg = ERROR_MSG[response.resultCode]
return false, string.format("\n Error: %s\n Details: %s",
- error_msg or "Unknown error occured (code: " .. response.resultCode ..
+ error_msg or "Unknown error occurred (code: " .. response.resultCode ..
")", response.errorMessage or "" )
else
return true, "Success"
@@ -643,7 +643,7 @@ function searchResultToFile( searchEntries, filename )
end
end
- -- write the new, fully populuated table out to CSV
+ -- write the new, fully populated table out to CSV
-- initialize header row
local output = "\"name\""
@@ -710,7 +710,7 @@ function convertADTimeStamp(timestamp)
if (timestamp and timestamp > 0) then
-- The result value was 3036 seconds off what Microsoft says it should be.
- -- I have been unable to find an explaination for this, and have resorted to
+ -- I have been unable to find an explanation for this, and have resorted to
-- manually adjusting the formula.
result = ( timestamp / 10000000 ) - 3036
@@ -728,7 +728,7 @@ end
-- For example 20110904003302.0Z becomes 2001/09/04 00:33:02 UTC
--
--
--- @param timestamp in Zulu format without seperators
+-- @param timestamp in Zulu format without separators
-- @return string containing human readable form
function convertZuluTimeStamp(timestamp)
diff --git a/nselib/match.lua b/nselib/match.lua
index ab1a70d13..d039d7c18 100644
--- a/nselib/match.lua
+++ b/nselib/match.lua
@@ -9,7 +9,7 @@ local pcre = require "pcre"
local stdnse = require "stdnse"
_ENV = stdnse.module("match", stdnse.seeall)
---various functions for use with nse's nsock:receive_buf - function
+--various functions for use with NSE's nsock:receive_buf - function
-- e.g.
-- sock:receive_buf(regex("myregexpattern"), true) - does a match using pcre
diff --git a/nselib/membase.lua b/nselib/membase.lua
index 33170c47b..5664d6c9b 100644
--- a/nselib/membase.lua
+++ b/nselib/membase.lua
@@ -97,7 +97,7 @@ TAP = {
-- Creates a new instance of the request
-- @param username string containing the username
-- @param password string containing the password
- -- @param mech string containing the SASL mechanism, currently suppored:
+ -- @param mech string containing the SASL mechanism, currently supported:
-- PLAIN - plain-text authentication
-- @return o instance of request
new = function(self, username, password, mech)
@@ -315,7 +315,7 @@ Helper = {
-- @param password string containing the password
-- @param mech string containing the SASL mechanism to use
-- @return status true on success, false on failure
- -- @return respons string containing "Auth failure" on failure
+ -- @return response string containing "Auth failure" on failure
login = function(self, username, password, mech)
mech = mech or self.mech or "PLAIN"
local status, response = self:exch(TAP.Request.Authenticate:new(username, password, mech))
diff --git a/nselib/mobileme.lua b/nselib/mobileme.lua
index ed43b4266..20311ccf1 100644
--- a/nselib/mobileme.lua
+++ b/nselib/mobileme.lua
@@ -46,7 +46,7 @@ MobileMe = {
-- Sends a message to an iOS device
-- @param devid string containing the device id to which the message should
-- be sent
- -- @param subject string containing the messsage subject
+ -- @param subject string containing the message subject
-- @param message string containing the message body
-- @param alarm boolean true if alarm should be sounded, false if not
-- @return status true on success, false on failure
@@ -116,7 +116,7 @@ MobileMe = {
if ( response.status == 401 ) then
return false, "Authentication failed"
elseif ( response.status ~= 200 and response.status ~= 330 ) then
- return false, "An unexpected error occured"
+ return false, "An unexpected error occurred"
end
retries = retries - 1
@@ -229,7 +229,7 @@ Helper = {
--
-- @param devid string containing the device id to which the message should
-- be sent
- -- @param subject string containing the messsage subject
+ -- @param subject string containing the message subject
-- @param message string containing the message body
-- @param alarm boolean true if alarm should be sounded, false if not
-- @return status true on success, false on failure
diff --git a/nselib/mongodb.lua b/nselib/mongodb.lua
index d98c21c11..1a8178345 100644
--- a/nselib/mongodb.lua
+++ b/nselib/mongodb.lua
@@ -325,7 +325,7 @@ Standard message header :
struct {
int32 messageLength; // total size of the message, including the 4 bytes of length
int32 requestID; // client or database-generated identifier for this message
- int32 responseTo; // requestID from the original request (used in reponses from db)
+ int32 responseTo; // requestID from the original request (used in responses from db)
int32 opCode; // request type - see table below
}
@@ -573,7 +573,7 @@ function query(socket, data)
data = data .. try( socket:receive() )
isComplete, pSize = isPacketComplete(data)
end
- -- All required data shold be read now
+ -- All required data should be read now
local packetData = data:sub(1,pSize)
local residualData = data:sub(pSize+1)
local responseHeader = parseResponseHeader(packetData)
@@ -629,8 +629,8 @@ function login(socket, db, username, password)
end
---- Converts a quert result as received from MongoDB query into nmap "result" table
--- @param resultTable table as returned from a quer
+--- Converts a query result as received from MongoDB query into nmap "result" table
+-- @param resultTable table as returned from a query
-- @return table suitable for stdnse.format_output
function queryResultToTable( resultTable )
diff --git a/nselib/msrpc.lua b/nselib/msrpc.lua
index 8dc42c715..36ef66eaf 100644
--- a/nselib/msrpc.lua
+++ b/nselib/msrpc.lua
@@ -130,7 +130,7 @@ local LSA_GROUPSIZE = 20
-- up. Raising this could find more users, but at the expense of more packets.
local LSA_MINEMPTY = 10
----Mapping between well known MSRPC UUIDs and coresponding exe/service
+---Mapping between well known MSRPC UUIDs and corresponding exe/service
local UUID2EXE = {
["1ff70682-0a51-30e8-076d-740be8cee98b"] = "mstask.exe atsvc interface (Scheduler service)",
["3faf4738-3a21-4307-b46c-fdda9bb8c0d5"] = "AudioSrv AudioSrv interface (Windows Audio service)",
@@ -279,13 +279,13 @@ function bind(smbstate, interface_uuid, interface_version, transfer_syntax)
parameters = result['parameters']
data = result['data']
- -- Extract the first part from the resposne
+ -- Extract the first part from the response
pos, result['version_major'], result['version_minor'], result['packet_type'], result['packet_flags'], result['data_representation'], result['frag_length'], result['auth_length'], result['call_id'] = bin.unpack("IIwinreg_openhku provides a useable key, for example.
+--@param handle A handle to hive or key. winreg_openhku provides a usable key, for example.
--@param index The index of the key to return. Generally you'll start at 0 and increment until
-- an error is returned.
--@param name The name buffer. This should be set to the empty string; however, setting to 'nil' can have
@@ -2647,7 +2647,7 @@ end
--- Calls the function OpenKey, which obtains a handle to a named key.
--
--@param smbstate The SMB state table
---@param handle A handle to hive or key. winreg_openhku provides a useable key, for example.
+--@param handle A handle to hive or key. winreg_openhku provides a usable key, for example.
--@param keyname The name of the key to open.
--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
-- useful one being 'handle', which is a handle to the newly opened key.
@@ -4059,7 +4059,7 @@ function get_user_list(host)
return true, response, names
end
----Retrieve information about a domain. This is done by three seperate calls to samr_querydomaininfo2() to get all
+---Retrieve information about a domain. This is done by three separate calls to samr_querydomaininfo2() to get all
-- possible information. smbstate has to be in the proper state for this to work.
local function get_domain_info(host, domain)
local result = {}
@@ -4649,7 +4649,7 @@ function get_server_stats(host)
stats['bytessent'] = bit.bor(bit.lshift(stats['bytessent_high'], 32), stats['bytessent_low'])
stats['bytesrcvd'] = bit.bor(bit.lshift(stats['bytesrcvd_high'], 32), stats['bytesrcvd_low'])
- -- Sidestep divide-by-zero errors (probabyl won't come up, but I'd rather be safe)
+ -- Sidestep divide-by-zero errors (probably won't come up, but I'd rather be safe)
if(stats['period'] == 0) then
stats['period'] = 1
end
@@ -4687,7 +4687,7 @@ function enum_shares(host)
return false, bind_result
end
- -- Call netsharenumall
+ -- Call netshareenumall
status, netshareenumall_result = srvsvc_netshareenumall(smbstate, host.ip)
if(status == false) then
smb.stop(smbstate)
diff --git a/nselib/msrpcperformance.lua b/nselib/msrpcperformance.lua
index 17021a4cc..31409ca31 100644
--- a/nselib/msrpcperformance.lua
+++ b/nselib/msrpcperformance.lua
@@ -344,7 +344,7 @@ end
-- // for each instance.
-- //
-- // If (PERF_DATA_BLOCK.NumInstances < 0) then the counter definition
--- // strucutre above will be followed by only a PERF_COUNTER_BLOCK and the
+-- // structure above will be followed by only a PERF_COUNTER_BLOCK and the
-- // counter data for that COUNTER.
-- typedef struct _PERF_INSTANCE_DEFINITION {
-- DWORD ByteLength; // Length in bytes of this structure,
diff --git a/nselib/msrpctypes.lua b/nselib/msrpctypes.lua
index 2d752424d..b230cb637 100644
--- a/nselib/msrpctypes.lua
+++ b/nselib/msrpctypes.lua
@@ -16,9 +16,9 @@
-- Strings are a little bit trickier. A string is preceded by three 32-bit values: the max length, the offset, and
-- the length. Additionally, strings may or may not be null terminated, depending on where they're being used. For
-- more information on strings, see the comments on marshall_unicode. The functions marshall_unicode
--- and unmarshall_unicode can be used to mashall/unmarshall strings.
+-- and unmarshall_unicode can be used to marshall/unmarshall strings.
--
--- Pointers also have interesting properties. A pointer is preceeded by a 4-byte value called (at least by Wireshark)
+-- Pointers also have interesting properties. A pointer is preceded by a 4-byte value called (at least by Wireshark)
-- the "referent id". For a valid pointer, this can be anything except 0 (I use 'NMAP' for it). If it's '0', then
-- it's a null pointer and the data doesn't actually follow. To help clarify, a pointer to the integer '4' could be
-- marshalled as the hex string 78 56 34 12 04 00 00 00 (the referent_id is 0x12345678 and the integer
@@ -33,7 +33,7 @@
--
-- So far, this is fairly straight forward. Arrays are where everything falls apart.
--
--- An array of basic types is simply the types themselves, preceeded by the "max length" of the array (which can be
+-- An array of basic types is simply the types themselves, preceded by the "max length" of the array (which can be
-- longer than the actual length). When pointers are used in an array, however, things get hairy. The 'referent_id's
-- of the pointers are all put at the start of the array, along with the base types. Then, the data is put at the
-- end of the array, for all the referent_ids that aren't null. Let's say you have four strings, "abc", "def", null, and
@@ -83,12 +83,12 @@
-- function the same way unmarshall_array would. This is a bit of a kludge, but it's the best I could come up
-- with.
--
--- There are different sections in here, which correspond to "families" of types. I modelled these after Samba's .idl files.
+-- There are different sections in here, which correspond to "families" of types. I modeled these after Samba's .idl files.
-- MISC corresponds to misc.idl, LSA to lsa.idl, etc. Each of these sections has possible dependencies; for example, SAMR
-- functions use LSA strings, and everything uses SECURITY and MISC. So the order is important -- dependencies have to go
-- above the module.
--
--- The datatypes used here are modelled after the datatypes used by Microsoft's functions. Each function that represents
+-- The datatypes used here are modeled after the datatypes used by Microsoft's functions. Each function that represents
-- a struct will have the struct definition in its comment; and that struct (or the closest representation to it) will be
-- returned. Often, this requires scripts to access something like result['names']['names'][0]['name'], which is
-- rather unwieldy, but I decided that following Microsoft's definitions was the most usable way for many reasons. I find
@@ -148,7 +148,7 @@ function string_to_unicode(string, do_null)
result = result .. string.sub(string, i, i) .. string.char(0)
end
- -- Add a null, if the caller requestd it
+ -- Add a null, if the caller requested it
if(do_null == true) then
result = result .. string.char(0) .. string.char(0)
end
@@ -230,7 +230,7 @@ end
-- When marshalling the body, the function func is called, which is passed as
-- a parameter, with the arguments args. This function has to return a marshalled
-- parameter, but other than that it can be any marshalling function. The 'value' parameter
--- simply determined whether or not it's a null pointer, and will probably be a repease of
+-- simply determined whether or not it's a null pointer, and will probably be a repeat of
-- one of the arguments.
--
-- Note that the function func doesn't have to conform to any special prototype,
@@ -572,7 +572,7 @@ function marshall_unicode(str, do_null, max_length)
return result
end
---- Marshall a null-teriminated ascii string, with the length/maxlength prepended. Very similar
+--- Marshall a null-terminated ascii string, with the length/maxlength prepended. Very similar
-- to marshall_unicode, except it's ascii and the null terminator is always used.
--
--@param str The string to marshall.
@@ -1154,7 +1154,7 @@ function marshall_NTTIME(time)
return result
end
----Unmarshalles an NTTIME. See marshall_NTTIME for more information.
+---Unmarshalls an NTTIME. See marshall_NTTIME for more information.
--
--@param data The data packet.
--@param pos The position within the data.
@@ -1190,7 +1190,7 @@ function marshall_NTTIME_ptr(time)
return result
end
----Unmarshalles an NTTIME*.
+---Unmarshalls an NTTIME*.
--
--@param data The data packet.
--@param pos The position within the data.
@@ -1935,7 +1935,7 @@ end
--@param sid_type The sid_type value (I don't know what this means)
--@param rid The rid (a number representing the user)
--@param sid_index The sid_index value (I don't know what this means, either)
---@param unknown An unknown value (is normaly 0).
+--@param unknown An unknown value (is normally 0).
--@return A string representing the marshalled data.
local function marshall_lsa_TranslatedSid2(location, sid_type, rid, sid_index, unknown)
local result = ""
@@ -2760,7 +2760,7 @@ function unmarshall_winreg_StringBuf_ptr(data, pos)
end
---- A winreg_String has the same makup as a winreg_StringBuf, as far as I can tell, so delegate to that function.
+--- A winreg_String has the same makeup as a winreg_StringBuf, as far as I can tell, so delegate to that function.
--
--@param table The table representing the String.
--@param max_length [optional] The maximum size of the buffer, in characters. Defaults to the length of the string, including the null.
@@ -2775,7 +2775,7 @@ function marshall_winreg_String(table, max_length)
return result
end
----Unmarshall a winreg_String. Since ti has the same makup as winreg_StringBuf, delegate to that.
+---Unmarshall a winreg_String. Since it has the same makeup as winreg_StringBuf, delegate to that.
--
--@param data The data buffer.
--@param pos The position in the data buffer.
@@ -4499,19 +4499,19 @@ local atsvc_DaysOfMonth =
Fifth = 0x00000010,
Sixth = 0x00000020,
Seventh = 0x00000040,
- Eight = 0x00000080,
+ Eighth = 0x00000080,
Ninth = 0x00000100,
Tenth = 0x00000200,
Eleventh = 0x00000400,
Twelfth = 0x00000800,
- Thitteenth = 0x00001000,
+ Thirteenth = 0x00001000,
Fourteenth = 0x00002000,
Fifteenth = 0x00004000,
Sixteenth = 0x00008000,
Seventeenth = 0x00010000,
Eighteenth = 0x00020000,
Ninteenth = 0x00040000,
- Twentyth = 0x00080000,
+ Twentieth = 0x00080000,
Twentyfirst = 0x00100000,
Twentysecond = 0x00200000,
Twentythird = 0x00400000,
diff --git a/nselib/mssql.lua b/nselib/mssql.lua
index 1369d6275..e4d9bbb26 100644
--- a/nselib/mssql.lua
+++ b/nselib/mssql.lua
@@ -50,11 +50,11 @@
--
--
-- Known limitations:
--- * The library does not support SSL. The foremost reason being the akward choice of implementation where the SSL handshake is performed within the TDS data block. By default, servers support connections over non SSL connections though.
+-- * The library does not support SSL. The foremost reason being the awkward choice of implementation where the SSL handshake is performed within the TDS data block. By default, servers support connections over non SSL connections though.
-- * Version 7 and ONLY version 7 of the protocol is supported. This should cover Microsoft SQL Server 7.0 and later.
-- * TDS Responses contain one or more response tokens which are parsed based on their type. The supported tokens are listed in the TokenType table and their respective parsers can be found in the Token class. Note that some token parsers are not fully implemented and simply move the offset the right number of bytes to continue processing of the response.
-- * The library only supports a limited subsets of datatypes and will abort execution and return an error if it detects an unsupported type. The supported data types are listed in the DataTypes table. In order to add additional data types a parser function has to be added to both the ColumnInfo and ColumnData class.
--- * No functionality for languages, localization or characted codepages has been considered or implemented.
+-- * No functionality for languages, localization or character codepages has been considered or implemented.
-- * The library does database authentication only. No OS authentication or use of the integrated security model is supported.
-- * Queries using SELECT, INSERT, DELETE and EXEC of procedures have been tested while developing scripts.
--
@@ -78,7 +78,7 @@
-- @args mssql.instance-port The port of the instance to connect to.
--
-- @args mssql.instance-all Targets all SQL server instances discovered
--- throught the browser service.
+-- through the browser service.
--
-- @args mssql.domain The domain against which to perform integrated
-- authentication. When set, the scripts assume integrated authentication
@@ -267,9 +267,9 @@ SqlServerVersionInfo =
minor = nil, -- The minor version (e.g. 0)
build = nil, -- The build number (e.g. 2047)
subBuild = nil, -- The sub-build number (e.g. 0)
- productName = nil, -- The prodcut name (e.g. "SQL Server 2005")
+ productName = nil, -- The product name (e.g. "SQL Server 2005")
brandedVersion = nil, -- The branded version of the product (e.g. "2005")
- servicePackLevel = nil, -- The service pack leve (e.g. "SP1")
+ servicePackLevel = nil, -- The service pack level (e.g. "SP1")
patched = nil, -- Whether patches have been applied since SP installation (true/false/nil)
source = nil, -- The source of the version info (e.g. "SSRP", "SSNetLib")
@@ -513,7 +513,7 @@ SSRP =
--- Parses an SSRP string and returns a table containing one or more
-- SqlServerInstanceInfo objects created from the parsed string.
_ParseSsrpString = function( host, ssrpString )
- -- It would seem easier to just capture (.-;;) repeateadly, since
+ -- It would seem easier to just capture (.-;;) repeatedly, since
-- each instance ends with ";;", but ";;" can also occur within the
-- data, signifying an empty field (e.g. "...bv;;@COMPNAME;;tcp;1433;;...").
-- So, instead, we'll split up the string ahead of time.
@@ -743,7 +743,7 @@ for i, v in pairs(LoginErrorType) do
LoginErrorMessage[v] = i
end
--- "static" ColumInfo parser class
+-- "static" ColumnInfo parser class
ColumnInfo =
{
@@ -879,7 +879,7 @@ ColumnInfo =
}
--- "static" ColumData parser class
+-- "static" ColumnData parser class
ColumnData =
{
Parse = {
@@ -1326,7 +1326,7 @@ Token =
return pos, token
end,
- --- Parses a DoneProc token recieved after executing a SP
+ --- Parses a DoneProc token received after executing a SP
--
-- @param data string containing "raw" data
-- @param pos number containing offset into data
@@ -1341,7 +1341,7 @@ Token =
end,
- --- Parses a DoneInProc token recieved after executing a SP
+ --- Parses a DoneInProc token received after executing a SP
--
-- @param data string containing "raw" data
-- @param pos number containing offset into data
@@ -1834,7 +1834,7 @@ LoginPacket =
-- offset to auth info
data = data .. bin.pack("stdnse.output_result
--
- -- @param tbl as recieved by Helper.Query
+ -- @param tbl as received by Helper.Query
-- @param with_headers boolean true if output should contain column headers
-- @return table suitable for stdnse.output_result
FormatOutputTable = function ( tbl, with_headers )
diff --git a/nselib/mysql.lua b/nselib/mysql.lua
index 1c56740dc..cc92bb98b 100644
--- a/nselib/mysql.lua
+++ b/nselib/mysql.lua
@@ -19,7 +19,7 @@ _ENV = stdnse.module("mysql", stdnse.seeall)
--
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
-- Revised 01/23/2010 - v0.2 - added query support, cleanup, documentation
--- Revised 08/24/2010 - v0.3 - added error handling for recieveGreeting
+-- Revised 08/24/2010 - v0.3 - added error handling for receiveGreeting
-- fixed a number of incorrect receives and changed
-- them to receive_bytes instead.
@@ -97,7 +97,7 @@ local function decodeHeader( data, pos )
return pos, response
end
---- Recieves the server greeting upon intial connection
+--- Receives the server greeting upon initial connection
--
-- @param socket already connected to the remote server
-- @return status true on success, false on failure
@@ -188,7 +188,7 @@ end
-- currently only post41 authentication is supported
-- @param username string containing the username of the user that is authenticating
-- @param password string containing the users password or nil if empty
--- @param salt string containing the servers salt as recieved from receiveGreeting
+-- @param salt string containing the servers salt as received from receiveGreeting
-- @return status boolean
-- @return response table or error message on failure
function loginRequest( socket, params, username, password, salt )
@@ -489,7 +489,7 @@ end
-- @param socket socket already connected to mysql
-- @param query string containing the sql query
-- @return status true on success, false on failure
--- @return rows table containing row tabels as decoded by decodeDataPackets
+-- @return rows table containing row tables as decoded by decodeDataPackets
function sqlQuery( socket, query )
local catch = function() socket:close() stdnse.print_debug("sqlQuery(): failed") end
@@ -548,7 +548,7 @@ end
-- @param rs table as returned from sqlQuery
-- @param options table containing additional options, currently:
-- - noheaders - does not include column names in result
--- @return string containing the formated resultset table
+-- @return string containing the formatted resultset table
function formatResultset(rs, options)
options = options or {}
if ( not(rs) or not(rs.cols) or not(rs.rows) ) then
diff --git a/nselib/ncp.lua b/nselib/ncp.lua
index dc12b4808..cb610c012 100644
--- a/nselib/ncp.lua
+++ b/nselib/ncp.lua
@@ -26,7 +26,7 @@
-- server.
--
-- * Helper
--- - The prefered script interface to the library containing functions
+-- - The preferred script interface to the library containing functions
-- that wrap functions from the NCP class using more descriptive names
-- and easier interface.
--
diff --git a/nselib/ndmp.lua b/nselib/ndmp.lua
index c7911cd58..e079f7ec8 100644
--- a/nselib/ndmp.lua
+++ b/nselib/ndmp.lua
@@ -278,7 +278,7 @@ Comm = {
-- Creates new Comm instance
-- @param host table as received by the action method
- -- @param port table as receuved by the action method
+ -- @param port table as received by the action method
-- @return o new instance of Comm
new = function(self, host, port)
local o = {
diff --git a/nselib/nmap.luadoc b/nselib/nmap.luadoc
index 509fe7149..d7cf6ad35 100644
--- a/nselib/nmap.luadoc
+++ b/nselib/nmap.luadoc
@@ -713,7 +713,7 @@ function pcap_close()
--
-- It also has the following member functions:
--
--- * digest(algorithm) returns the digest of the certificate using the given digest algorithm, which is any of the strings returned by openssl.supported_digests, typicaly something like "md5" or "sha1".
+-- * digest(algorithm) returns the digest of the certificate using the given digest algorithm, which is any of the strings returned by openssl.supported_digests, typically something like "md5" or "sha1".
--
-- The "subject" and "issuer" fields hold each
-- distinguished name. Fields with an unknown OID are represented as an array
diff --git a/nselib/nrpc.lua b/nselib/nrpc.lua
index bfe2f91a0..9f0fccdcf 100644
--- a/nselib/nrpc.lua
+++ b/nselib/nrpc.lua
@@ -82,8 +82,8 @@ Helper = {
--- Creates a new Helper instance
--
- -- @param host table as recieved by the script action method
- -- @param port table as recieved by the script action method
+ -- @param host table as received by the script action method
+ -- @param port table as received by the script action method
new = function(self, host, port)
local o = {}
setmetatable(o, self)
diff --git a/nselib/openssl.luadoc b/nselib/openssl.luadoc
index bf2558ac7..c6c0f0d6a 100644
--- a/nselib/openssl.luadoc
+++ b/nselib/openssl.luadoc
@@ -85,7 +85,7 @@ function bignum_rand(bits)
--- Returns a pseudorandom bignum.
-- @param bits Size of the returned bignum in bits.
--- @return Pseudoandom bignum.
+-- @return Pseudorandom bignum.
function bignum_pseudo_rand(bits)
--- Returns the bignum which is the result of a^p mod
diff --git a/nselib/packet.lua b/nselib/packet.lua
index 7d926dbb9..ed96694a5 100644
--- a/nselib/packet.lua
+++ b/nselib/packet.lua
@@ -110,7 +110,7 @@ function in_cksum(b)
sum = bit.rshift(sum, 16) + bit.band(sum, 0xffff)
sum = sum + bit.rshift(sum, 16)
sum = bit.bnot(sum)
- sum = bit.band(sum, 0xffff) -- trunctate to 16 bits
+ sum = bit.band(sum, 0xffff) -- truncate to 16 bits
return sum
end
@@ -361,7 +361,7 @@ end
-- @param mac_src six-byte string of source MAC address.
-- @param mac_dst sis-byte string of destination MAC address.
-- @param ip_bin_src 16-byte string of source IPv6 address.
--- @param ip_bin_dst 16-byte string of destinatiion IPv6 address.
+-- @param ip_bin_dst 16-byte string of destination IPv6 address.
-- @param id integer that represents Echo ID.
-- @param sequence integer that represents Echo sequence.
-- @param data string of Echo data.
@@ -453,7 +453,7 @@ end
-- @param mac_src six-byte string of source MAC address.
-- @param mac_dst sis-byte string of destination MAC address.
-- @param ip_bin_src 16-byte string of source IPv6 address.
--- @param ip_bin_dst 16-byte string of destinatiion IPv6 address.
+-- @param ip_bin_dst 16-byte string of destination IPv6 address.
-- @param id integer that represents Echo ID.
-- @param seq integer that represents Echo sequence.
-- @param data string of Echo data.
@@ -505,7 +505,7 @@ function ip6tobin(str)
local dot_count = stdnse.strsplit("%.", str)
if #dot_count == 4 then -- It might be IPv4-compatible IPv6 address.
local ip64 = stdnse.strsplit(":", str)
- local ip4_str = ip64[#ip64] -- Get the embeded IPv4 address string.
+ local ip4_str = ip64[#ip64] -- Get the embedded IPv4 address string.
ip4_bin = iptobin(ip4_str)
if not ip4_bin then
return nil
@@ -626,7 +626,7 @@ function Packet:u32(index)
end
--- Return part of the packet contents as a byte string.
-- @param index The beginning of the part of the packet to extract. The index
--- is 0-based. If omitted the default value is 0 (begining of the string)
+-- is 0-based. If omitted the default value is 0 (beginning of the string)
-- @param length The length of the part of the packet to extract. If omitted
-- the remaining contents from index to the end of the string are returned.
-- @return A string.
diff --git a/nselib/pgsql.lua b/nselib/pgsql.lua
index dd5696ea7..d9d6e1647 100644
--- a/nselib/pgsql.lua
+++ b/nselib/pgsql.lua
@@ -22,7 +22,7 @@ _ENV = stdnse.module("pgsql", stdnse.seeall)
-- Version 0.3
-- Created 02/05/2010 - v0.1 - created by Patrik Karlsson
--- Revised 02/20/2010 - v0.2 - added detectVersion to automaticaly detect and return
+-- Revised 02/20/2010 - v0.2 - added detectVersion to automatically detect and return
-- the correct version class
-- Revised 03/04/2010 - v0.3 - added support for trust authentication method
@@ -68,7 +68,7 @@ v2 =
--- Decodes an Auth Request packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding, -1 on error
@@ -100,7 +100,7 @@ v2 =
--- Decodes an Error packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding
@@ -212,7 +212,7 @@ v2 =
-- @param params table containing any additional parameters authtype, version
-- @param username string containing the username to use for authentication
-- @param password string containing the password to use for authentication
- -- @param salt string containing the crypthographic salt value
+ -- @param salt string containing the cryptographic salt value
-- @return status true on success, false on failure
-- @return result table containing parameter status information,
-- result string containing an error message if login fails
@@ -261,7 +261,7 @@ v3 =
--- Decodes an Auth Request packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding, -1 on error
@@ -292,7 +292,7 @@ v3 =
--- Decodes an ParameterStatus packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding
@@ -308,7 +308,7 @@ v3 =
--- Decodes an Error packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding
@@ -345,7 +345,7 @@ v3 =
--- Decodes the BackendKeyData packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding, -1 on error
@@ -364,7 +364,7 @@ v3 =
--- Decodes an ReadyForQuery packet
--
- -- @param data string containing raw data recieved from socket
+ -- @param data string containing raw data received from socket
-- @param len number containing the length as retrieved from the header
-- @param pos number containing the offset into the data buffer
-- @return pos number containing the offset after decoding, -1 on error
@@ -468,7 +468,7 @@ v3 =
-- @param params table containing any additional parameters authtype, version
-- @param username string containing the username to use for authentication
-- @param password string containing the password to use for authentication
- -- @param salt string containing the crypthographic salt value
+ -- @param salt string containing the cryptographic salt value
-- @return status true on success, false on failure
-- @return result table containing parameter status information,
-- result string containing an error message if login fails
diff --git a/nselib/pppoe.lua b/nselib/pppoe.lua
index 11aae5aee..fccd4403f 100644
--- a/nselib/pppoe.lua
+++ b/nselib/pppoe.lua
@@ -822,7 +822,7 @@ Helper = {
retries = retries - 1
until( pado.tags or retries == 0 )
if ( not(pado.tags) ) then
- return false, "PADO response containined no tags"
+ return false, "PADO response contained no tags"
end
local pado_host_unique
diff --git a/nselib/proxy.lua b/nselib/proxy.lua
index 59714d283..c476965ac 100644
--- a/nselib/proxy.lua
+++ b/nselib/proxy.lua
@@ -15,7 +15,7 @@ _ENV = stdnse.module("proxy", stdnse.seeall)
-- Start of local functions
---- check function, makes checkings for all valid returned status
+--- check function, checks for all valid returned status
--- If any of the HTTP status below is found, the proxy is potentially open
--- The script tries to split header from body before checking for status
--@param result connection result
@@ -225,7 +225,7 @@ function socksHandshake(socket, version, hostname)
if(r2 ~= 0x00) then
stdnse.print_debug("Socks5: Authentication required")
else
- -- If no Auth is required, try to estabilish connection
+ -- If no Auth is required, try to establish connection
stdnse.print_debug("Socks5: No authentication required")
-- Socks5 second payload: Version, Command, Null, Address type, Ip-Address, Port number
paystring = '05 01 00 01 ' .. sip .. '00 50'
@@ -264,7 +264,7 @@ end
-- if true, the proxy server might be redirecting the requests
-- to a default page
--
--- Functions slipts body from head before comparing, to avoid session
+-- Functions splits body from head before comparing, to avoid session
-- variables, cookies...
--
-- @param resp1 A string with the response for the first request
diff --git a/nselib/rmi.lua b/nselib/rmi.lua
index 86d9fc4b1..d23e2e34b 100644
--- a/nselib/rmi.lua
+++ b/nselib/rmi.lua
@@ -24,7 +24,7 @@
--
-- If you want to add calls to classes you know of, you can use e.g Jode to decompile the
-- stub-class or skeleton class and find out the details that are needed to perform an
--- RMI method invokation. Those are
+-- RMI method invocation. Those are
-- Class hashcode
-- Method number (each method gets a number)
-- Arguments f
@@ -78,7 +78,7 @@ end
-- local breader= BufferedReader:new(socket)
--
-- bWriter.pack('>i', integer)
--- bWrier.flush() -- sends the data
+-- bWriter.flush() -- sends the data
--
-- if bsocket:canRead(4) then -- Waits until four bytes can be read
-- local packetLength = bsocket:unpack('i') -- Read the four bytess
@@ -142,7 +142,7 @@ BufferedWriter = {
-- local breader= BufferedReader:new(socket)
--
-- bWriter.pack('>i', integer)
--- bWrier.flush() -- sends the data
+-- bWriter.flush() -- sends the data
--
-- if bsocket:canRead(4) then -- Waits until four bytes can be read
-- local packetLength = bsocket:unpack('i') -- Read the four bytess
@@ -161,7 +161,7 @@ BufferedReader = {
end,
---
-- This method blocks until the specified number of bytes
- -- have been read from the socket and are avaiable for
+ -- have been read from the socket and are available for
-- the caller to read, e.g via the unpack function
canRead= function(self,count)
local status, data
@@ -257,7 +257,7 @@ local JavaTypes = {
---
-- The JavaDOS classes
-- The JavaDOS class is an approximation of a java DataOutputStream. It provides convenience functions
--- for writing java types toan underlying BufferedWriter
+-- for writing java types to an underlying BufferedWriter
--
-- When used in conjunction with the BufferedX- classes, they handle the availability-
-- checks transparently, i.e the caller does not have to check if enough data is available
@@ -335,7 +335,7 @@ JavaDIS = {
return o
end,
- -- This closure method generates all reader methods (except unstandard ones) on the fly
+ -- This closure method generates all reader methods (except nonstandard ones) on the fly
-- according to the definitions in JavaTypes.
_generateReaderFunc = function(self, javatype)
local functionName = 'read'..javatype.name
@@ -349,7 +349,7 @@ JavaDIS = {
end
self[functionName] = newFunc
end,
- -- This is a bit special, since we do not know beforehand how many bytes must be read. Therfore
+ -- This is a bit special, since we do not know beforehand how many bytes must be read. Therefore
-- this cannot be generated on the fly like the others.
readUTF = function(self, text)
-- First, we need to read the length, 2 bytes
@@ -703,7 +703,7 @@ RmiDataStream = {
----
-- Connects to a remote service. The connection process creates a
--- socket and does some handshaking. If this is successfull,
+-- socket and does some handshaking. If this is successful,
-- we are definitely talking to an RMI service.
function RmiDataStream:connect(host, port)
local status, err
@@ -752,7 +752,7 @@ function RmiDataStream:connect(host, port)
return true
end
--- Reads a DgcAck message, which is sent during conection handshake
+-- Reads a DgcAck message, which is sent during connection handshake
--@param dis - a JavaDIS to read from
--@return status
--@return error message
@@ -1216,7 +1216,7 @@ function readNonProxyDesc(dis)
if ( TypeDecoders[fieldType] ) then
status, value= TypeDecoders[fieldType](dis)
else
- dbg("ellol reading".. RMIUtils.tcString(fieldType))
+ dbg("error reading".. RMIUtils.tcString(fieldType))
return
end
dbg("Read fieldvalue ".. tostring(value) .. " for field ".. tostring(fields[i]))
@@ -1460,7 +1460,7 @@ function Registry:lookup(name)
end
----
-- Arguments class
--- This class is meant to handle arguments which is sent to a mehtod invoked
+-- This class is meant to handle arguments which is sent to a method invoked
-- remotely. It is mean to contain functionality to add java primitive datatypes,
-- such as pushInt, pushString, pushLong etc. All of these are not implemented
-- currently
diff --git a/nselib/rpc.lua b/nselib/rpc.lua
index 04e0ead6b..36b64879e 100644
--- a/nselib/rpc.lua
+++ b/nselib/rpc.lua
@@ -9,7 +9,7 @@
-- The library contains the following classes:
-- * Comm
-- ** Handles network connections.
--- ** Handles low-level packet sending, recieving, decoding and encoding.
+-- ** Handles low-level packet sending, receiving, decoding and encoding.
-- ** Stores rpc programs info: socket, protocol, program name, id and version.
-- ** Used by Mount, NFS, RPC and Portmap.
-- * Portmap
@@ -1668,7 +1668,7 @@ NFS = {
pos, lookup.attributes = Util.unmarshall_nfsattr(data, pos, comm.version)
else
- stdnse.pritn_debug("NFS.LookUpDecode: NFS unsupported version %d", comm.version)
+ stdnse.print_debug("NFS.LookUpDecode: NFS unsupported version %d", comm.version)
return -1, nil
end
diff --git a/nselib/rpcap.lua b/nselib/rpcap.lua
index a8b0fa7a5..41f0c146b 100644
--- a/nselib/rpcap.lua
+++ b/nselib/rpcap.lua
@@ -1,6 +1,6 @@
---
-- This library implements the fundamentals needed to communicate with the
--- WinPcap Remote Capture Deamon. It currently supports authenticating to
+-- WinPcap Remote Capture Daemon. It currently supports authenticating to
-- the service using either NULL-, or Password-based authentication.
-- In addition it has the capabilities to list the interfaces that may be
-- used for sniffing.
@@ -10,7 +10,7 @@
-- handled by the Comm class, and the main interface for script
-- writers is kept under the Helper class.
--
--- The following code snipplet illustrates how to connect to the service and
+-- The following code snippet illustrates how to connect to the service and
-- extract information about network interfaces:
--
-- local helper = rpcap.Helper:new(host, port)
@@ -388,7 +388,7 @@ Helper = {
-- @param username [optional]
-- @param password [optional]
-- @return status true on success, false on failure
- -- @return err string containing error mesage on failure
+ -- @return err string containing error message on failure
login = function(self, username, password)
local auth
diff --git a/nselib/rsync.lua b/nselib/rsync.lua
index 4ef87a93d..d32f84a4a 100644
--- a/nselib/rsync.lua
+++ b/nselib/rsync.lua
@@ -31,7 +31,7 @@ Helper = {
-- Handles send and receive of control messages
-- @param data string containing the command to send
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return data containing the response from the server
-- err string, if status is false
ctrl_exch = function(self, data)
@@ -103,7 +103,7 @@ Helper = {
end
if ( data == "@RSYNCD: OK" ) then
- return true, "Authentication successfull"
+ return true, "Authentication successful"
end
return false, "Authentication failed"
end,
diff --git a/nselib/rtsp.lua b/nselib/rtsp.lua
index 216387bd1..f742ad5f4 100644
--- a/nselib/rtsp.lua
+++ b/nselib/rtsp.lua
@@ -105,7 +105,7 @@ Response = {
local tmp = stdnse.strsplit("\r\n", data)
if ( not(tmp) ) then return nil end
- -- we should have atleas one entry
+ -- we should have atleast one entry
if ( #tmp > 1 ) then
o.headers = {}
for i=2, #tmp do
@@ -207,15 +207,15 @@ Client = {
repeat
local err
status, err = self.socket:send( tostring(req) )
- -- check if send was successfull, in case it wasn't AND
+ -- check if send was successful, in case it wasn't AND
-- this is our last retry, ABORT
if ( not(status) and 0 == retries - 1 ) then
stdnse.print_debug(2, "Failed to send request to server (%s)", err)
return false, ("Failed to send request to server (%s)"):format(err)
- -- if send was successfull, attempt to receive the response
+ -- if send was successful, attempt to receive the response
elseif ( status ) then
status, data = self.socket:receive()
- -- if we got the response allright, break out of retry loop
+ -- if we got the response all right, break out of retry loop
if ( status ) then break end
end
-- if either send or receive fails, re-connect the socket
diff --git a/nselib/sasl.lua b/nselib/sasl.lua
index 7c94aafb5..6e5d5bd3f 100644
--- a/nselib/sasl.lua
+++ b/nselib/sasl.lua
@@ -6,7 +6,7 @@
-- The DigestMD5 class contains all code necessary to calculate
-- a DIGEST-MD5 response based on the servers challenge and the other
-- necessary arguments (@see DigestMD5.new).
--- It can be called throught the SASL helper or directly like this:
+-- It can be called through the SASL helper or directly like this:
--
-- local dmd5 = DigestMD5:new(chall, user, pass, "AUTHENTICATE", nil, "imap")
-- local digest = dmd5:calcDigest()
@@ -21,7 +21,7 @@
-- local response = ntlm:calcResponse()
--
--
--- The Helper class contains the high level methodes:
+-- The Helper class contains the high level methods:
-- * new: This is the SASL object constructor.
-- * set_mechanism: Sets the authentication mechanism to use.
-- * set_callback: Sets the encoding function to use.
@@ -37,7 +37,7 @@
-- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html
-- Version 0.2
--- Created 07/17/2011 - v0.1 - Created by Djalal Harouini
+-- Created 07/17/2011 - v0.1 - Created by Djalal Harouni
-- Revised 07/18/2011 - v0.2 - Added NTLM, DIGEST-MD5 classes
@@ -80,7 +80,7 @@ if HAVE_SSL then
end,
-- parses a challenge received from the server
- -- takes care of both quoted and unqoted identifiers
+ -- takes care of both quoted and unquoted identifiers
-- regardless of what RFC says
parseChallenge = function(self)
local results = {}
@@ -190,7 +190,7 @@ if HAVE_SSL then
return o
end,
- --- Converst str to "unicode" (adds null bytes for every other byte)
+ --- Converts str to "unicode" (adds null bytes for every other byte)
-- @param str containing string to convert
-- @return unicode string containing the unicoded str
to_unicode = function(str)
@@ -442,7 +442,7 @@ Helper = {
--- Resets all the data of the SASL object.
--
- -- This methode will clear the specified SASL mechanism.
+ -- This method will clear the specified SASL mechanism.
reset = function(self)
self:set_mechanism()
end,
diff --git a/nselib/shortport.lua b/nselib/shortport.lua
index f6a23f7f7..bc9db6c8d 100644
--- a/nselib/shortport.lua
+++ b/nselib/shortport.lua
@@ -12,7 +12,7 @@ _ENV = stdnse.module("shortport", stdnse.seeall)
---
-- See if a table contains a value.
--- @param t A table repesenting a set.
+-- @param t A table representing a set.
-- @param value The value to check for.
-- @return True if t contains value, false otherwise.
local function includes(t, value)
diff --git a/nselib/sip.lua b/nselib/sip.lua
index 800922246..c153df824 100644
--- a/nselib/sip.lua
+++ b/nselib/sip.lua
@@ -175,7 +175,7 @@ Session = {
end
local status, lhost, lport, rhost, rport = self.conn.socket:get_info()
if ( not(status) ) then
- return false, "Failed to retreive socket information"
+ return false, "Failed to retrieve socket information"
end
self.sessdata:setClient(lhost, lport)
self.sessdata:setServer(rhost, rport)
@@ -741,7 +741,7 @@ SipAuth = {
end,
--- Calculates the authentication response
- -- @return reponse string containing the authentication response
+ -- @return response string containing the authentication response
calculateResponse = function(self)
if ( not(self.nonce) or not(self.algorithm) or not(self.realm) ) then
diff --git a/nselib/smb.lua b/nselib/smb.lua
index cde2e47e3..e5d8274ea 100644
--- a/nselib/smb.lua
+++ b/nselib/smb.lua
@@ -874,8 +874,8 @@ function smb_read(smb, read_data)
local result = netbios_data .. smb_data
if(#result ~= length) then
- stdnse.print_debug(1, "SMB: ERROR: Received wrong number of bytes, there will likely be issues (recieved %d, expected %d)", #result, length)
- return false, string.format("SMB: ERROR: Didn't receive the expected number of bytes; recieved %d, expected %d. This will almost certainly cause some errors.", #result, length)
+ stdnse.print_debug(1, "SMB: ERROR: Received wrong number of bytes, there will likely be issues (received %d, expected %d)", #result, length)
+ return false, string.format("SMB: ERROR: Didn't receive the expected number of bytes; received %d, expected %d. This will almost certainly cause some errors.", #result, length)
end
-- Check the message signature (ignoring the first four bytes, which are the netbios header)
@@ -956,7 +956,7 @@ end
function negotiate_protocol(smb, overrides)
local header, parameters, data
local pos
- local header1, header2, header3, ehader4, command, status, flags, flags2, pid_high, signature, unused, pid, mid
+ local header1, header2, header3, header4, command, status, flags, flags2, pid_high, signature, unused, pid, mid
header = smb_encode_header(smb, command_codes['SMB_COM_NEGOTIATE'], overrides)
@@ -991,7 +991,7 @@ function negotiate_protocol(smb, overrides)
end
-- Parse out the header
- local uid, tid, header4
+ local uid, tid
pos, header1, header2, header3, header4, command, status, flags, flags2, pid_high, signature, unused, tid, pid, uid, mid = bin.unpack("volid - include volume ids in result
-- dir - find directories
-- archive - find archived files
--- @return iterator function retreiving the next result
+-- @return iterator function retrieving the next result
function find_files(smbstate, fname, options)
local TRANS2_FIND_FIRST2, TRANS2_FIND_NEXT2 = 1, 2
options = options or {}
@@ -3094,7 +3094,7 @@ function share_get_details(host, share)
-- Try and get full details about the share
status, result = msrpc.get_share_info(host, share)
if(status == false) then
- -- We don't stop for this error (it's pretty common since administive privileges are required here)
+ -- We don't stop for this error (it's pretty common since administrative privileges are required here)
stdnse.print_debug(1, "SMB: Failed to get share info for %s: %s", share, result)
details['details'] = result
else
@@ -3423,7 +3423,7 @@ function is_admin(host, username, domain, password, password_hash, hash_type)
status, err = negotiate_protocol(smbstate, overrides)
if(status == false) then
- stdnse.print_debug("SMB; is_admin: Failed to negotiatie protocol: %s [%s]", err, username)
+ stdnse.print_debug("SMB; is_admin: Failed to negotiate protocol: %s [%s]", err, username)
stop(smbstate)
return false
end
diff --git a/nselib/smbauth.lua b/nselib/smbauth.lua
index 6bf9b4591..b97f4eadb 100644
--- a/nselib/smbauth.lua
+++ b/nselib/smbauth.lua
@@ -53,7 +53,7 @@
--
--@args smbusername The SMB username to log in with. The forms "DOMAIN\username" and "username@DOMAIN"
-- are not understood. To set a domain, use the smbdomain argument.
---@args smbdomain The domain to log in with. If you aren't in a domained environment, then anything
+--@args smbdomain The domain to log in with. If you aren't in a domain environment, then anything
-- will (should?) be accepted by the server.
--@args smbpassword The password to connect with. Be cautious with this, since some servers will lock
-- accounts if the incorrect password is given. Although it's rare that the
@@ -770,7 +770,7 @@ function get_host_info_from_security_blob(security_blob)
if ( target_info_length > 0 ) then
-- Definition of AvId values (IDs for AV_PAIR (attribute-value pair) structures),
- -- as definied by the NTLM Authentication Protocol specification [MS-NLMP].
+ -- as defined by the NTLM Authentication Protocol specification [MS-NLMP].
local NTLM_AV_ID_VALUES = {
MsvAvEOL = 0x0,
MsvAvNbComputerName = 0x1,
@@ -824,7 +824,7 @@ end
---Create an 8-byte message signature that's sent with all SMB packets.
--
---@param mac_key The key used for authentication. It's the concatination of the session key and the
+--@param mac_key The key used for authentication. It's the concatenation of the session key and the
-- response hash.
--@param data The packet to generate the signature for. This should be the packet that's about to be
-- sent, except with the signature slot replaced with the sequence number.
diff --git a/nselib/smtp.lua b/nselib/smtp.lua
index 607e40132..bf6ddb852 100644
--- a/nselib/smtp.lua
+++ b/nselib/smtp.lua
@@ -362,7 +362,7 @@ end
--
-- @param socket connected to server
-- @param domain to use in the EHLO command.
--- @return true on sucess, or false on failures.
+-- @return true on success, or false on failures.
-- @return response returned by the SMTP server on success, or an
-- error message on failures.
ehlo = function(socket, domain)
@@ -640,7 +640,7 @@ login = function(socket, username, password, mech)
-- sniffed of the wire, seems to always be the same
-- decodes to some NTLMSSP blob greatness
status, response = query(socket, "TlRMTVNTUAABAAAAB7IIogYABgA3AAAADwAPACgAAAAFASgKAAAAD0FCVVNFLUFJUi5MT0NBTERPTUFJTg==")
- if ( not(status) ) then return false, "ERROR: Failed to receieve NTLM challenge" end
+ if ( not(status) ) then return false, "ERROR: Failed to receive NTLM challenge" end
end
diff --git a/nselib/snmp.lua b/nselib/snmp.lua
index 6a69aa9a4..26f2a0e6e 100644
--- a/nselib/snmp.lua
+++ b/nselib/snmp.lua
@@ -81,7 +81,7 @@ local tagDecoder = {}
-- IP Address
-- Response-PDU
--- TOOD: Figure out how to remove these dependancies
+-- TOOD: Figure out how to remove these dependencies
tagDecoder["A2"] = function( self, encStr, elen, pos )
local seq = {}
@@ -483,7 +483,7 @@ function snmpWalk( socket, base_oid )
status, response = socket:receive_bytes(1)
if ( not( status ) ) then
- -- Unless we don't have a usefull error message, don't report it
+ -- Unless we have a useful error message, don't report it
if ( response ~= "ERROR" ) then
stdnse.print_debug("snmp.snmpWalk: Received no answer (%s)", response)
return false, response
diff --git a/nselib/socks.lua b/nselib/socks.lua
index a57b99add..b8d19aa69 100644
--- a/nselib/socks.lua
+++ b/nselib/socks.lua
@@ -171,7 +171,7 @@ Helper = {
-- Create a new instance of the class
-- @param host table containing the host table
-- @param port table containing the port table
- -- @param options table containing library options, currenlty:
+ -- @param options table containing library options, currently:
-- timeout - socket timeout in ms
-- @return o instance of Helper
new = function(self, host, port, options)
@@ -197,7 +197,7 @@ Helper = {
-- Connects to the SOCKS server
-- @param auth_method table containing the auth. methods to request
-- @return status true on success, false on failure
- -- @return response table containing the respons or err string on failure
+ -- @return response table containing the response or err string on failure
connect = function(self, auth_method)
self.socket = nmap.new_socket()
self.socket:set_timeout(self.options.timeout or 10000)
@@ -267,7 +267,7 @@ Helper = {
end
if ( auth:isSuccess() ) then
- return true, "Authentication was successfull"
+ return true, "Authentication was successful"
else
return false, "Authentication failed"
end
diff --git a/nselib/srvloc.lua b/nselib/srvloc.lua
index 9277199a7..a935f65cd 100644
--- a/nselib/srvloc.lua
+++ b/nselib/srvloc.lua
@@ -89,7 +89,7 @@ Reply = {
end,
--- Attempts to create an instance by reading data off the socket
- -- @param socket socket conected to the SRVLOC service
+ -- @param socket socket connected to the SRVLOC service
-- @return new instance of the Reply.Service class
fromSocket = function(socket)
local status, data = socket:receive()
@@ -143,7 +143,7 @@ Reply = {
end,
--- Attempts to create an instance by reading data off the socket
- -- @param socket socket conected to the SRVLOC service
+ -- @param socket socket connected to the SRVLOC service
-- @return new instance of the Reply.Attribute class
fromSocket = function(socket)
local status, data = socket:receive()
@@ -295,7 +295,7 @@ Request = {
}
--- The Helper class serves as primary interface for scripts using the libraryy
+-- The Helper class serves as primary interface for scripts using the library
Helper = {
new = function(self, host, port)
diff --git a/nselib/stdnse.lua b/nselib/stdnse.lua
index bbeb98b6d..cc80628c8 100644
--- a/nselib/stdnse.lua
+++ b/nselib/stdnse.lua
@@ -272,7 +272,7 @@ end
-- stdnse.tohex(123456, {separator = ":"}) --> "1:e2:40"
-- stdnse.tohex(123456, {separator = ":", group = 4}) --> "1:e240"
-- @param s String or number to be encoded.
--- @param options Table specifiying formatting options.
+-- @param options Table specifying formatting options.
-- @return String in hexadecimal format.
function tohex( s, options )
options = options or EMPTY
@@ -702,7 +702,7 @@ end
-- occurs.
--@param data The table of output.
--@param indent Used for indentation on recursive calls; should generally be set to
--- nil when callling from a script.
+-- nil when calling from a script.
-- @return nil, if data is empty, otherwise a
-- multiline string.
function format_output(status, data, indent)
diff --git a/nselib/stun.lua b/nselib/stun.lua
index 40a9dcd11..cff953f35 100644
--- a/nselib/stun.lua
+++ b/nselib/stun.lua
@@ -283,7 +283,7 @@ Comm = {
Util = {
-- creates a random string
- -- @param len number containg the length of the generated random string
+ -- @param len number containing the length of the generated random string
-- @return str containing the random string
randomString = function(len)
local str = ""
@@ -325,7 +325,7 @@ Helper = {
-- Get's the external public IP
-- @return status true on success, false on failure
- -- @return result containing the IP as tring
+ -- @return result containing the IP as string
getExternalAddress = function(self)
local trans_id
diff --git a/nselib/tftp.lua b/nselib/tftp.lua
index d6ad79ea9..8779b41f2 100644
--- a/nselib/tftp.lua
+++ b/nselib/tftp.lua
@@ -7,11 +7,11 @@
-- * Packet
-- ** The Packet classes contain one class for each TFTP operation.
-- * File
--- ** The File class holds a recieved file including the name and contents
+-- ** The File class holds a received file including the name and contents
-- * ConnHandler
-- ** The ConnHandler class handles and processes incoming connections.
--
--- The following code snipplet starts the TFTP server and waits for the file incoming.txt
+-- The following code snippet starts the TFTP server and waits for the file incoming.txt
-- to be uploaded for 10 seconds:
--
-- tftp.start()
@@ -192,14 +192,14 @@ local function processConnection( host, port, data )
while( true ) do
local status, pdata = socket:receive()
if ( not(status) ) then
- -- if we're here and havent succesfully read a packet for 5 seconds, abort
+ -- if we're here and haven't successfully read a packet for 5 seconds, abort
if ( os.time() - lastread > 5 ) then
coroutine.yield(false)
else
coroutine.yield(true)
end
else
- -- record last time we had a succesful read
+ -- record last time we had a successful read
lastread = os.time()
pos, op = bin.unpack(">S", pdata)
if ( OpCode.DATA ~= op ) then
@@ -217,7 +217,7 @@ local function processConnection( host, port, data )
break
end
- -- for every fith block check that we've received the preceeding four
+ -- for every fifth block check that we've received the preceding four
if ( ( #blocks % 5 ) == 0 ) then
for b = #blocks - 4, #blocks do
if ( not(blocks[b]) ) then
@@ -251,7 +251,7 @@ local function processConnection( host, port, data )
end
filecontent = filecontent .. blocks[i]
end
- stdnse.print_debug("Finnished receiving file \"%s\"", filename)
+ stdnse.print_debug("Finished receiving file \"%s\"", filename)
-- Add anew file to the global infiles table
table.insert( infiles, File:new(filename, filecontent, host) )
@@ -305,7 +305,7 @@ end
local function waitLast()
-- The thread that started the server needs to wait here until the rest
-- of the scripts finnish running. We know we are done once the state
- -- shifts to STOPPED and we get a singla from the condvar in the
+ -- shifts to STOPPED and we get a signal from the condvar in the
-- dispatcher
local s_condvar = nmap.condvar(state)
while( srvthread == coroutine.running() and state ~= "STOPPED" ) do
@@ -316,7 +316,7 @@ end
--- Waits for a file with a specific filename for at least the number of
-- seconds specified by the timeout parameter. If this function is called
-- from the thread that's running the server it will wait until all the
--- other threads have finnished executing before returning.
+-- other threads have finished executing before returning.
--
-- @param filename string containing the name of the file to receive
-- @param timeout number containing the minimum number of seconds to wait
diff --git a/nselib/tns.lua b/nselib/tns.lua
index f6b919e54..21daabb2d 100644
--- a/nselib/tns.lua
+++ b/nselib/tns.lua
@@ -488,7 +488,7 @@ Packet.PreAuth = {
--- Parses the PreAuth packet response and extracts data needed to
-- perform authentication
--
- -- @param tns Packet.TNS containing the TNS packet recieved from the server
+ -- @param tns Packet.TNS containing the TNS packet received from the server
-- @return table containing the keys and values returned by the server
parseResponse = function( self, tns )
local kvps = {}
@@ -576,7 +576,7 @@ Packet.Auth = {
-- Parses the response of an Auth packet
--
- -- @param tns Packet.TNS containing the TNS packet recieved from the server
+ -- @param tns Packet.TNS containing the TNS packet received from the server
-- @return table containing the key pair values from the Auth packet
parseResponse = function( self, tns )
local kvps = {}
@@ -1084,7 +1084,7 @@ Packet.QueryResponseAck = {
-- The mask is used in order to achieve "compression" and is essentially
-- at a bit mask that decides what columns should be fetched from the
- -- preceeding row. The mask is provided in reverse order and a set bit
+ -- preceding row. The mask is provided in reverse order and a set bit
-- indicates that data is provided while an unset bit indicates that the
-- column data should be fetched from the previous row.
--
@@ -1319,10 +1319,10 @@ Comm = {
return self.socket:send( tostring(tns) )
end,
- --- Handles communication when a MARKER packet is recieved and retrieves
+ --- Handles communication when a MARKER packet is received and retrieves
-- the following error message
--
- -- @return false always to indicate that an error occured
+ -- @return false always to indicate that an error occurred
-- @return msg containing the error message
handleMarker = function( self )
local status, tns = self:recvTNSPacket()
@@ -1354,10 +1354,10 @@ Comm = {
return false, msg
end,
- --- Recieves a TNS packet and handles TNS-resends
+ --- Receives a TNS packet and handles TNS-resends
--
-- @return status true on success, false on failure
- -- @return tns Packet.TNS containing the recieved packet or err on failure
+ -- @return tns Packet.TNS containing the received packet or err on failure
recvTNSPacket = function( self )
local tns
local retries = 5
@@ -1391,9 +1391,9 @@ Comm = {
return true, tns
end,
- --- Sends a TNS packet and recieves (and handles) the response
+ --- Sends a TNS packet and receives (and handles) the response
--
- -- @param pkt containingt the Packet.* to send to the server
+ -- @param pkt containing the Packet.* to send to the server
-- @return status true on success, false on failure
-- @return the parsed response as return from the respective parseResponse
-- function or error message if status was false
@@ -1495,7 +1495,7 @@ Crypt = {
-- @param user containing the Oracle user name
-- @param pass containing the Oracle user password
-- @param srv_sesskey_enc containing the encrypted server session key as
- -- recieved from the PreAuth packet
+ -- received from the PreAuth packet
-- @return cli_sesskey_enc the encrypted client session key
-- @return auth_pass the encrypted Oracle password
Encrypt10g = function( self, user, pass, srv_sesskey_enc )
@@ -1525,8 +1525,8 @@ Crypt = {
--
-- @param pass containing the Oracle user password
-- @param srv_sesskey_enc containing the encrypted server session key as
- -- recieved from the PreAuth packet
- -- @param auth_vrfy_data containing the password salt as recieved from the
+ -- received from the PreAuth packet
+ -- @param auth_vrfy_data containing the password salt as received from the
-- PreAuth packet
-- @return cli_sesskey_enc the encrypted client session key
-- @return auth_pass the encrypted Oracle password
@@ -1672,10 +1672,10 @@ Helper = {
end,
--- Sends a command to the TNS lsnr
- -- It currently accepts and tries to send all commands recieved
+ -- It currently accepts and tries to send all commands received
--
-- @param cmd string containing the command to send to the server
- -- @return data string containing the result recieved from the server
+ -- @return data string containing the result received from the server
lsnrCtl = function( self, cmd )
local status, data = self.socket:connect( self.host.ip, self.port.number, "tcp" )
local conn, packet, tns, pkt
diff --git a/nselib/upnp.lua b/nselib/upnp.lua
index ece197f1c..41d56a231 100644
--- a/nselib/upnp.lua
+++ b/nselib/upnp.lua
@@ -13,14 +13,14 @@
-- * Util
-- ** The Util class contains a number of static functions mainly used to convert and sort data.
--
--- The following code snipplet queries all UPnP services on the network:
+-- The following code snippet queries all UPnP services on the network:
--
-- local helper = upnp.Helper:new()
-- helper:setMulticast(true)
-- return stdnse.format_output(helper:queryServices())
--
--
--- This next snipplet queries a specific host for the same information:
+-- This next snippet queries a specific host for the same information:
--
-- local helper = upnp.Helper:new(host, port)
-- return stdnse.format_output(helper:queryServices())
diff --git a/nselib/url.lua b/nselib/url.lua
index 406ee4e84..93b1b634f 100644
--- a/nselib/url.lua
+++ b/nselib/url.lua
@@ -197,7 +197,7 @@ end
---
-- Rebuilds a parsed URL from its components.
--
--- Components are protected if any reserved or unallowed characters are found.
+-- Components are protected if any reserved or disallowed characters are found.
-- @param parsed Parsed URL, as returned by parse.
-- @return A string with the corresponding URL.
-----------------------------------------------------------------------------
diff --git a/nselib/vnc.lua b/nselib/vnc.lua
index f8f65061d..79b92d373 100644
--- a/nselib/vnc.lua
+++ b/nselib/vnc.lua
@@ -1,6 +1,6 @@
---
-- The VNC library provides some basic functionality needed in order to
--- communicate with VNC servers, and derivates such as Tight- or Ultra-
+-- communicate with VNC servers, and derivatives such as Tight- or Ultra-
-- VNC.
--
-- Summary
diff --git a/nselib/vulns.lua b/nselib/vulns.lua
index fe5fea25a..6e1341348 100644
--- a/nselib/vulns.lua
+++ b/nselib/vulns.lua
@@ -8,7 +8,7 @@
-- Each vulnerability must have its own state:
-- NOT_VULN: The program was confirmed to be not vulnerable.
-- LIKELY_VULN: The program is likely to be vulnerable,
--- this can be the case when we do a simple version comparaison. This
+-- this can be the case when we do a simple version comparison. This
-- state should cover possible false positive situations.
-- VULN: The program was confirmed to be vulnerable.
-- EXPLOIT: The program was confirmed to be vulnerable and
@@ -157,7 +157,7 @@
--
--
-- @args vulns.showall If set, the library will show and report all the
--- registred vulnerabilities which includes the
+-- registered vulnerabilities which includes the
-- NOT VULNERABLE ones. By default the library will only
-- report the VULNERABLE entries: VULNERABLE,
-- LIKELY VULNERABLE, VULNERABLE (DoS)
@@ -336,7 +336,7 @@ local VULNS
-- },
-- },
--
--- -- Entries whithout the vulnerability ID are stored here.
+-- -- Entries without the vulnerability ID are stored here.
-- 'NMAP_ID' = {
-- 'XXXXX' = {
-- ...
@@ -600,7 +600,7 @@ local default_filter = function(vuln_table) return true end
-- This function just inserts the callback filters in the filters_db.
--
-- @param filters_db The filters database (a table in the registry).
--- @param filter_callback The callbackk function.
+-- @param filter_callback The callback function.
-- @return FID The filter ID associated with the callback function.
local register_filter = function(filters_db, filter_callback)
if filter_callback and type(filter_callback) == "function" then
@@ -683,7 +683,7 @@ local l_update_id = function(fid_table, id_type, id, vuln_table)
-- Add the ID vulnerability type if it is missing
l_add_id_type(fid_table, id_type)
- -- Make sure that we are referecing the correct tables
+ -- Make sure that we are referencing the correct tables
fid_table[id_type][id] = fid_table[id_type][id] or {}
fid_table[id_type][id]['ENTRIES'] = fid_table[id_type][id]['ENTRIES'] or {}
local push_table = fid_table[id_type][id]['ENTRIES']
@@ -1015,7 +1015,7 @@ local l_add = function(vulndb, vuln_table)
-- Search the Filters IDS for the vulnerability
for _, fid in ipairs(FIDS) do
for id_type, id in pairs(vuln_table.IDS) do
- -- Count how many IDs should be refenrecing the vulnerability
+ -- Count how many IDs should be referencing the vulnerability
-- entry in all the FILTERS_IDS tables.
ids_count = ids_count + 1
@@ -1564,7 +1564,7 @@ end
-- This function can be used to see if there are any references to the
-- specified vulnerability in the database, it will return
-- True if so which means that one of the scripts has
--- attempted to check this vulnerabilty.
+-- attempted to check this vulnerability.
--
-- Scripts must call vulns.save_reports() function first to
-- setup the vulnerability database.
@@ -1712,7 +1712,7 @@ end
--
-- The selection_filter is an optional table parameter of
-- optional fields which can be used to select which vulnerabilities to
--- report, if it is not set then all vulnerabilites entries will be
+-- report, if it is not set then all vulnerabilities entries will be
-- returned.
--
-- @usage
diff --git a/nselib/vuzedht.lua b/nselib/vuzedht.lua
index e08c8c75c..bee10700d 100644
--- a/nselib/vuzedht.lua
+++ b/nselib/vuzedht.lua
@@ -10,7 +10,7 @@
--
-- o Response - the response class containing all of the response classes. It
-- currently contains the Header, PING, FIND_NODE and ERROR
--- classs.
+-- class.
--
-- o Session - a class containing "session state" such as the transaction- and
-- instance ID's.
@@ -175,7 +175,7 @@ Response = {
end
},
- -- The reponse header, present in all packets
+ -- The response header, present in all packets
Header = {
Vendors = {
@@ -503,7 +503,7 @@ Helper = {
end,
-- Sends a Vuze PING request to the server and parses the response
- -- @return status true on succes, false on failure
+ -- @return status true on success, false on failure
-- @return response PING response instance on success,
-- err string containing the error message on failure
ping = function(self)
diff --git a/nselib/wsdd.lua b/nselib/wsdd.lua
index fdbf15973..0f6ac978c 100644
--- a/nselib/wsdd.lua
+++ b/nselib/wsdd.lua
@@ -21,7 +21,7 @@
-- * Decoders
-- ** The Decoders class contains static functions used for decoding probe matches
--
--- The following code snipplet shows how the library can be used:
+-- The following code snippet shows how the library can be used:
--
-- local helper = wsdd.Helper:new()
-- helper:setMulticast(true)
diff --git a/nselib/xdmcp.lua b/nselib/xdmcp.lua
index 1b4c89420..51b6a8eca 100644
--- a/nselib/xdmcp.lua
+++ b/nselib/xdmcp.lua
@@ -286,7 +286,7 @@ Helper = {
-- @param host table as received by the action method
-- @param port table as received by the action method
-- @param options table
- -- @retun o new instance of Helper
+ -- @return o new instance of Helper
new = function(self, host, port, options)
local o = {
host = host,
diff --git a/nselib/xmpp.lua b/nselib/xmpp.lua
index e47e63f08..8e92a35ad 100644
--- a/nselib/xmpp.lua
+++ b/nselib/xmpp.lua
@@ -108,8 +108,8 @@ XMPP = {
--- Creates a new instance of the XMPP class
--
- -- @param host table as receieved by the action function
- -- @param port table as receieved by the action function
+ -- @param host table as received by the action function
+ -- @param port table as received by the action function
-- @param options table containing options, currently supported
-- timeout - sets the socket timeout
-- servername - sets the server name to use in
@@ -215,7 +215,7 @@ XMPP = {
status, err = self:send("")
if ( not(status) ) then return false, "ERROR: Failed to initiate STARTTLS" end
local status, tag = self:receive_tag()
- if ( not(status) ) then return false, "ERROR: Failed to recevice from server" end
+ if ( not(status) ) then return false, "ERROR: Failed to receive from server" end
if ( tag.name == "proceed" ) then
status, err = self.socket:reconnect_ssl()
self.options.starttls = false
@@ -364,8 +364,8 @@ XMPP = {
Helper = {
--- Creates a new Helper instance
- -- @param host table as receieved by the action function
- -- @param port table as receieved by the action function
+ -- @param host table as received by the action function
+ -- @param port table as received by the action function
-- @param options table containing options, currently supported
-- timeout - sets the socket timeout
-- servername - sets the server name to use in
diff --git a/scripts/afp-brute.nse b/scripts/afp-brute.nse
index 2a2883bea..d963074d3 100644
--- a/scripts/afp-brute.nse
+++ b/scripts/afp-brute.nse
@@ -6,7 +6,7 @@ local string = require "string"
local table = require "table"
local unpwdb = require "unpwdb"
--- we dont really need openssl here, but let's attempt to load it as a way
+-- we don't really need openssl here, but let's attempt to load it as a way
-- to simply prevent the script from running, in case we don't have it
local openssl = stdnse.silent_require("openssl")
@@ -44,7 +44,7 @@ categories = {"intrusive", "brute"}
-- Version 0.3
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
-- Revised 03/09/2010 - v0.2 - changed so that passwords are iterated over users
--- - this change makes better sence as guessing is slow
+-- - this change makes better sense as guessing is slow
-- Revised 09/09/2011 - v0.3 - changed account status text to be more consistent with other *-brute scripts
portrule = shortport.port_or_service(548, "afp")
diff --git a/scripts/afp-ls.nse b/scripts/afp-ls.nse
index 42093d729..01651ad8a 100644
--- a/scripts/afp-ls.nse
+++ b/scripts/afp-ls.nse
@@ -133,11 +133,11 @@ action = function(host, port)
if ( status ) then
local status, fsize = afpHelper:GetFileSize( vol, item.name)
if ( not(status) ) then
- return ("\n\nERROR: Failed to retreive file size for %/%s"):format(vol, item.name)
+ return ("\n\nERROR: Failed to retrieve file size for %/%s"):format(vol, item.name)
end
local status, date = afpHelper:GetFileDates( vol, item.name)
if ( not(status) ) then
- return ("\n\nERROR: Failed to retreive file dates for %/%s"):format(vol, item.name)
+ return ("\n\nERROR: Failed to retrieve file dates for %/%s"):format(vol, item.name)
end
tab.addrow(file_tab, result.privs, result.uid, result.gid, fsize, date.create, item.name)
@@ -156,7 +156,7 @@ action = function(host, port)
status, response = afpHelper:Logout()
status, response = afpHelper:CloseSession()
- -- stop after first succesfull attempt
+ -- stop after first successful attempt
if ( output and #output > 0 ) then
table.insert(output, "")
table.insert(output, ("Information retrieved as: %s"):format(username))
diff --git a/scripts/afp-showmount.nse b/scripts/afp-showmount.nse
index c16611702..a5da0c932 100644
--- a/scripts/afp-showmount.nse
+++ b/scripts/afp-showmount.nse
@@ -29,7 +29,7 @@ Shows AFP shares and ACLs.
-- Version 0.4
-- Created 01/03/2010 - v0.1 - created by Patrik Karlsson
-- Revised 01/13/2010 - v0.2 - Fixed a bug where a single share wouldn't show due to formatting issues
--- Revised 01/20/2010 - v0.3 - removed superflous functions
+-- Revised 01/20/2010 - v0.3 - removed superfluous functions
-- Revised 05/03/2010 - v0.4 - cleaned up and added dependency to afp-brute and added support for credentials
-- by argument or registry
diff --git a/scripts/asn-query.nse b/scripts/asn-query.nse
index 8d78f8832..9a3e1949a 100644
--- a/scripts/asn-query.nse
+++ b/scripts/asn-query.nse
@@ -65,7 +65,7 @@ end
---
-- Cached results are checked before sending a query for the target and extracting the
--- relevent information from the response. Mutual exclusion is used so that results can be
+-- relevant information from the response. Mutual exclusion is used so that results can be
-- cached and so a single thread will be active at any time.
-- @param host Host table.
-- @return Formatted answers or nil on errors.
diff --git a/scripts/backorifice-brute.nse b/scripts/backorifice-brute.nse
index 44efd105d..1e3ac8d30 100644
--- a/scripts/backorifice-brute.nse
+++ b/scripts/backorifice-brute.nse
@@ -117,7 +117,7 @@ local backorifice =
-- both are encrypted with the same initial seed, this is
-- how we verify we are talking to a BackOrifice service.
-- The statement is optimized so as not to decrypt unless
- -- comparison of encrypted magicstrings succeds
+ -- comparison of encrypted magicstrings succeeds
if status and response:sub(1,8) == encrypted_ping:sub(1,8)
and self:BOcrypt(response,seed):match("!PONG!(1%.20)!.*!") then
local BOversion, BOhostname = self:BOcrypt(response,seed):match("!PONG!(1%.20)!(.*)!")
diff --git a/scripts/broadcast-dhcp-discover.nse b/scripts/broadcast-dhcp-discover.nse
index b6fe2c58c..94327fb17 100644
--- a/scripts/broadcast-dhcp-discover.nse
+++ b/scripts/broadcast-dhcp-discover.nse
@@ -164,7 +164,7 @@ action = function()
local request_type = dhcp.request_types["DHCPDISCOVER"]
local ip_address = bin.pack(">I", ipOps.todword("0.0.0.0"))
- -- we nead to set the flags to broadcast
+ -- we need to set the flags to broadcast
local request_options, overrides, lease_time = nil, { flags = 0x8000 }, nil
local status, packet = dhcp.dhcp_build(request_type, ip_address, mac, nil, request_options, overrides, lease_time, transaction_id)
if (not(status)) then return "\n ERROR: Failed to build packet" end
diff --git a/scripts/broadcast-eigrp-discovery.nse b/scripts/broadcast-eigrp-discovery.nse
index 5d4235cf5..eab97d9aa 100644
--- a/scripts/broadcast-eigrp-discovery.nse
+++ b/scripts/broadcast-eigrp-discovery.nse
@@ -221,7 +221,7 @@ action = function()
-- If an interface was provided, get its information
interface = nmap.get_interface_info(interface)
if not interface then
- return ("\n ERROR: Failed to retreive %s interface information."):format(interface)
+ return ("\n ERROR: Failed to retrieve %s interface information."):format(interface)
end
interfaces = {interface}
stdnse.print_debug("%s: Will use %s interface.", SCRIPT_NAME, interface.shortname)
diff --git a/scripts/broadcast-igmp-discovery.nse b/scripts/broadcast-igmp-discovery.nse
index febb3f5ff..b4a4a9001 100644
--- a/scripts/broadcast-igmp-discovery.nse
+++ b/scripts/broadcast-igmp-discovery.nse
@@ -105,7 +105,7 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery", "safe", "broadcast"}
---- Parses a raw igmp packet and return a structred packet.
+--- Parses a raw igmp packet and return a structured packet.
-- @param data string IGMP Raw packet.
-- @return response table Structured igmp packet.
local igmpParse = function(data)
@@ -204,7 +204,7 @@ end
--- Crafts a raw IGMP packet.
-- @param interface Source interface of the packet.
--- @param vesion IGMP version. Could be 1, 2 or 3.
+-- @param version IGMP version. Could be 1, 2 or 3.
-- @return string Raw IGMP packet.
local igmpRaw = function(interface, version)
-- Only 1, 2 and 3 are valid IGMP versions
@@ -247,7 +247,7 @@ end
local igmpQuery;
--- Sends an IGMP Membership query.
-- @param interface Network interface to send on.
--- @param vesion IGMP version. Could be 1, 2, 3 or all.
+-- @param version IGMP version. Could be 1, 2, 3 or all.
igmpQuery = function(interface, version)
local srcip = interface.address
local dstip = "224.0.0.1"
@@ -278,7 +278,7 @@ igmpQuery = function(interface, version)
end
end
--- Function to compare wieght of an IGMP response message.
+-- Function to compare weight of an IGMP response message.
-- Used to sort elements in responses table.
local respCompare = function(a,b)
return ipOps.todword(a.src) + a.type + (a.ngroups or ipOps.todword(a.group))
@@ -338,7 +338,7 @@ action = function(host, port)
-- Get the interface information
interface = nmap.get_interface_info(interface)
if not interface then
- return ("ERROR: Failed to retreive %s interface information."):format(interface)
+ return ("ERROR: Failed to retrieve %s interface information."):format(interface)
end
interfaces = {interface}
stdnse.print_debug("%s: Will use %s interface.", SCRIPT_NAME, interface.shortname)
diff --git a/scripts/broadcast-pc-duo.nse b/scripts/broadcast-pc-duo.nse
index 3cd5003ac..35fef3cac 100644
--- a/scripts/broadcast-pc-duo.nse
+++ b/scripts/broadcast-pc-duo.nse
@@ -33,7 +33,7 @@ local TIMEOUT = stdnse.parse_timespec(stdnse.get_script_args("broadcast-pc-duo.t
prerule = function() return ( nmap.address_family() == "inet") end
-- Sends a UDP probe to the server and processes the response
--- @param probe table contaning a pc-duo probe
+-- @param probe table containing a pc-duo probe
-- @param responses table containing the responses
local function udpProbe(probe, responses)
diff --git a/scripts/broadcast-ping.nse b/scripts/broadcast-ping.nse
index d35f9254e..3f6062f29 100644
--- a/scripts/broadcast-ping.nse
+++ b/scripts/broadcast-ping.nse
@@ -24,7 +24,7 @@ The newtarget script-arg can be used so the script adds the
discovered IPs as targets.
The timeout of the ICMP probes can be specified using the timeout
-script-arg. The default timeout is 3000 ms. A higher number might be necesary
+script-arg. The default timeout is 3000 ms. A higher number might be necessary
when scanning across larger networks.
The number of sent probes can be specified using the num-probes
diff --git a/scripts/broadcast-ripng-discover.nse b/scripts/broadcast-ripng-discover.nse
index e6a77b869..3de48e91c 100644
--- a/scripts/broadcast-ripng-discover.nse
+++ b/scripts/broadcast-ripng-discover.nse
@@ -47,7 +47,7 @@ RIPng = {
-- @param prefix string containing the ipv6 route prefix
-- @param tag number containing the route tag
-- @param prefix_len number containing the length in bits of the
- -- signifcant part of the prefix
+ -- significant part of the prefix
-- @param metric number containing the current metric for the
-- destination
new = function(self, prefix, tag, prefix_len, metric)
diff --git a/scripts/broadcast-wpad-discover.nse b/scripts/broadcast-wpad-discover.nse
index ed09a989f..d9e81fd68 100644
--- a/scripts/broadcast-wpad-discover.nse
+++ b/scripts/broadcast-wpad-discover.nse
@@ -111,7 +111,7 @@ local function dnsDiscover()
local d = domain
-- reduce domain until we only have a single dot left
-- there is a security problem in querying for wpad.tld like eg
- -- wpad.com as this could be a rougue domain. This loop does not
+ -- wpad.com as this could be a rogue domain. This loop does not
-- account for domains with tld's containing two parts e.g. co.uk.
-- However, as the script just attempts to download and parse the
-- proxy values in the WPAD there should be no real harm here.
diff --git a/scripts/broadcast-wsdd-discover.nse b/scripts/broadcast-wsdd-discover.nse
index 680dd1f0e..62d35b804 100644
--- a/scripts/broadcast-wsdd-discover.nse
+++ b/scripts/broadcast-wsdd-discover.nse
@@ -48,7 +48,7 @@ categories = {"broadcast", "safe"}
prerule = function() return true end
--- function used for running several discovery threads in parallell
+-- function used for running several discovery threads in parallel
--
-- @param funcname string containing the name of the function to run
-- the name should be one of the discovery functions in wsdd.Helper
diff --git a/scripts/cassandra-info.nse b/scripts/cassandra-info.nse
index cfe8d7d31..c9dcc0ba4 100644
--- a/scripts/cassandra-info.nse
+++ b/scripts/cassandra-info.nse
@@ -54,7 +54,7 @@ function action(host,port)
local results = {}
- -- uglyness to allow creds.cassandra to work, as the port is not recognized
+ -- ugliness to allow creds.cassandra to work, as the port is not recognized
-- as cassandra even when service scan was run, taken from mongodb
local ps = port.service
port.service = 'cassandra'
diff --git a/scripts/couchdb-databases.nse b/scripts/couchdb-databases.nse
index 700d49173..79323a00f 100644
--- a/scripts/couchdb-databases.nse
+++ b/scripts/couchdb-databases.nse
@@ -46,7 +46,7 @@ local DISCARD = {}
--- Removes uninteresting data from the table
-- uses the DISCARD table above to see what
-- keys should be omitted from the results
--- @param data a table containg data
+-- @param data a table containing data
--@return another table containing data, with some keys removed
local function queryResultToTable(data)
local result = {}
diff --git a/scripts/couchdb-stats.nse b/scripts/couchdb-stats.nse
index 1b51989d6..91aa54fb1 100644
--- a/scripts/couchdb-stats.nse
+++ b/scripts/couchdb-stats.nse
@@ -59,7 +59,7 @@ local DISCARD = {stddev=1,min=1,max=1, mean=1}
--- Removes uninteresting data from the table
-- uses the DISCARD table above to see what
-- keys should be omitted from the results
--- @param data a table containg data
+-- @param data a table containing data
--@return another table containing data, with some keys removed
local function queryResultToTable(data)
local result = {}
diff --git a/scripts/cvs-brute.nse b/scripts/cvs-brute.nse
index cd0396ff1..6757ef5d0 100644
--- a/scripts/cvs-brute.nse
+++ b/scripts/cvs-brute.nse
@@ -61,7 +61,7 @@ Driver =
return true, brute.Account:new(username, password, creds.State.VALID)
end
- -- This error seems to indicate tha the user does not exist
+ -- This error seems to indicate that the user does not exist
if ( err:match("E PAM start error%: Critical error %- immediate abort\0$") ) then
stdnse.print_debug(2, "%s: The user %s does not exist", SCRIPT_NAME, username)
local err = brute.Error:new("Account invalid")
diff --git a/scripts/daap-get-library.nse b/scripts/daap-get-library.nse
index 65e513a69..3aa8a9958 100644
--- a/scripts/daap-get-library.nse
+++ b/scripts/daap-get-library.nse
@@ -139,7 +139,7 @@ function getRevisionNumber( host, port, sessionid )
return revision
end
---- Gets the database identitity for the library
+--- Gets the database identity for the library
--
-- @param host table containing an ip field.
-- @param port table containing number and protocol fields.
diff --git a/scripts/db2-das-info.nse b/scripts/db2-das-info.nse
index 26372fb2d..397790659 100644
--- a/scripts/db2-das-info.nse
+++ b/scripts/db2-das-info.nse
@@ -116,7 +116,7 @@ end
--- Does *very* basic parsing of a DB2 packet
--
-- Due to the limited documentation of the protocol this function is guesswork
--- The section called info is essentialy the data part of the db2das data response
+-- The section called info is essentially the data part of the db2das data response
-- The length of this section is found at offset 158 in the db2das.data section
--
--
@@ -156,7 +156,7 @@ end
-- The bytes following the header are considered to be the data
--
-- Offset 38 of the header contains an integer with the length of the data section
--- The length of the data section can unfortunately be of either endianess
+-- The length of the data section can unfortunately be of either endianness
-- There's
--
-- @param socket connected to the server
diff --git a/scripts/dns-client-subnet-scan.nse b/scripts/dns-client-subnet-scan.nse
index 57b5d10a0..c2214502d 100644
--- a/scripts/dns-client-subnet-scan.nse
+++ b/scripts/dns-client-subnet-scan.nse
@@ -339,7 +339,7 @@ action = function(host, port)
end
local nameserver = (host and host.ip) or argNS
- -- if we have no nameserver argument and no host, we dont have sufficient
+ -- if we have no nameserver argument and no host, we don't have sufficient
-- information to continue, abort
if not nameserver then
return nil
diff --git a/scripts/dns-nsec3-enum.nse b/scripts/dns-nsec3-enum.nse
index 08036cbc8..85aaf67f5 100644
--- a/scripts/dns-nsec3-enum.nse
+++ b/scripts/dns-nsec3-enum.nse
@@ -80,7 +80,7 @@ portrule = shortport.port_or_service(53, "domain", {"tcp", "udp"})
all_results = {}
--- get time (in miliseconds) when the script should finish
+-- get time (in milliseconds) when the script should finish
local function get_end_time()
local t = nmap.timing_level()
local limit = stdnse.parse_timespec(stdnse.get_script_args('dns-nsec3-enum.timelimit') or "30m")
@@ -230,7 +230,7 @@ local function query_for_hashes(host,subdomain,domain)
return ranges
end
--- does the actuall enumeration
+-- does the actual enumeration
local function enum(host, port, domain)
local seen, seen_subdomain = {}, {}
diff --git a/scripts/dns-zone-transfer.nse b/scripts/dns-zone-transfer.nse
index a35ee0dee..987f29f66 100644
--- a/scripts/dns-zone-transfer.nse
+++ b/scripts/dns-zone-transfer.nse
@@ -547,7 +547,7 @@ function parse_records_table(number, data, table, offset)
return offset
end
--- An iterator that breaks up a concatentation of responses. In DNS over TCP,
+-- An iterator that breaks up a concatenation of responses. In DNS over TCP,
-- each response is prefixed by a two-byte length (RFC 1035 section 4.2.2).
-- Responses returned by this iterator include the two-byte length prefix.
function responses_iter(data)
diff --git a/scripts/drda-brute.nse b/scripts/drda-brute.nse
index 5bf3ce0e7..ca6302cb4 100644
--- a/scripts/drda-brute.nse
+++ b/scripts/drda-brute.nse
@@ -13,7 +13,7 @@ Performs password guessing against databases supporting the IBM DB2 protocol suc
---
-- @args drda-brute.threads the amount of accounts to attempt to brute
--- force in parallell (default 10).
+-- force in parallel (default 10).
-- @args drda-brute.dbname the database name against which to guess
-- passwords (default "SAMPLE").
--
@@ -33,7 +33,7 @@ categories={"intrusive", "brute"}
-- Version 0.5
-- Created 05/08/2010 - v0.1 - created by Patrik Karlsson
-- Revised 05/09/2010 - v0.2 - re-wrote as multi-threaded
--- Revised 05/10/2010 - v0.3 - revised parallellised design
+-- Revised 05/10/2010 - v0.3 - revised parallelised design
-- Revised 08/14/2010 - v0.4 - renamed script and library from db2* to drda*
-- Revised 09/09/2011 - v0.5 - changed account status text to be more consistent with other *-brute scripts
@@ -60,8 +60,8 @@ end
--- Iterates over the password list and guesses passwords
--
--- @param host table with information as recieved by action
--- @param port table with information as recieved by action
+-- @param host table with information as received by action
+-- @param port table with information as received by action
-- @param database string containing the database name
-- @param creds an iterator producing username, password pairs
-- @param valid_accounts table in which to store found accounts
@@ -93,8 +93,8 @@ end
--- Checks if the supplied database exists
--
--- @param host table with information as recieved by action
--- @param port table with information as recieved by action
+-- @param host table with information as received by action
+-- @param port table with information as received by action
-- @param database string containing the database name
-- @return status true on success, false on failure
isValidDb = function( host, port, database )
@@ -112,7 +112,7 @@ isValidDb = function( host, port, database )
return false
end
---- Returns the amount of currenlty active threads
+--- Returns the amount of currently active threads
--
-- @param threads table containing the list of threads
-- @return count number containing the number of non-dead threads
diff --git a/scripts/firewalk.nse b/scripts/firewalk.nse
index ceb6d648d..bb7e06777 100644
--- a/scripts/firewalk.nse
+++ b/scripts/firewalk.nse
@@ -729,7 +729,7 @@ local function initial_ttl(host)
nmap.registry['firewalk']['traceroutefail'] = true
if nmap.verbosity() > 0 then
- stdnse.print_debug("%s requires unavailable traceroute informations.", SCRIPT_NAME)
+ stdnse.print_debug("%s requires unavailable traceroute information.", SCRIPT_NAME)
end
return nil
@@ -906,7 +906,7 @@ end
--- send a probe and update it
-- @param scanner the scanner handle
--- @param probe the probe specifications and related informations
+-- @param probe the probe specifications and related information
local function send_probe(scanner, probe)
local try = nmap.new_try(function() scanner.sock:ip_close() end)
@@ -918,7 +918,7 @@ local function send_probe(scanner, probe)
try(scanner.sock:ip_send(pkt.buf, scanner.target))
- -- update probe informations
+ -- update probe information
probe.retry = probe.retry + 1
probe.sent_time = nmap.clock_ms()
diff --git a/scripts/flume-master-info.nse b/scripts/flume-master-info.nse
index 294922fbb..8e1714876 100644
--- a/scripts/flume-master-info.nse
+++ b/scripts/flume-master-info.nse
@@ -110,7 +110,7 @@ function table_count(tt, item)
return count
end
-parse_page = function( host, port, uri, intresting_keys )
+parse_page = function( host, port, uri, interesting_keys )
local result = {}
local response = http.get( host, port, uri )
stdnse.print_debug(1, "%s: Status %s",
@@ -125,7 +125,7 @@ parse_page = function( host, port, uri, intresting_keys )
if nmap.verbosity() > 1 then
result[#result+1] = ("%s: %s"):format(name,value:gsub("^%s*(.-)%s*$", "%1"))
else
- for i,v in ipairs(intresting_keys) do
+ for i,v in ipairs(interesting_keys) do
if name:match(("^%s"):format(v)) then
result[#result+1] = ("%s: %s"):format(name,value:gsub("^%s*(.-)%s*$", "%1"))
end
diff --git a/scripts/ftp-vuln-cve2010-4221.nse b/scripts/ftp-vuln-cve2010-4221.nse
index 47f2c9654..897d2fc4a 100644
--- a/scripts/ftp-vuln-cve2010-4221.nse
+++ b/scripts/ftp-vuln-cve2010-4221.nse
@@ -34,7 +34,7 @@ Reference:
-- | Description:
-- | ProFTPD server (version 1.3.2rc3 through 1.3.3b) is vulnerable to
-- | stack-based buffer overflow. By sending a large number of TELNET_IAC
--- | escape sequence, a remote attacker will be able to corrup the stack and
+-- | escape sequence, a remote attacker will be able to corrupt the stack and
-- | execute arbitrary code.
-- | Disclosure date: 2010-11-02
-- | References:
@@ -180,7 +180,7 @@ action = function(host, port)
description = [[
ProFTPD server (version 1.3.2rc3 through 1.3.3b) is vulnerable to
stack-based buffer overflow. By sending a large number of TELNET_IAC
-escape sequence, a remote attacker will be able to corrup the stack and
+escape sequence, a remote attacker will be able to corrupt the stack and
execute arbitrary code.]],
references = {
'http://bugs.proftpd.org/show_bug.cgi?id=3521',
diff --git a/scripts/gkrellm-info.nse b/scripts/gkrellm-info.nse
index f9c4773b2..83e542506 100644
--- a/scripts/gkrellm-info.nse
+++ b/scripts/gkrellm-info.nse
@@ -161,7 +161,7 @@ action = function(host, port)
-- If there's an error we get a response back, and only then
local status, data = socket:receive_buf("\n", false)
if( status and data ~= "" ) then
- return fail("An unknown error occured, aborting ...")
+ return fail("An unknown error occurred, aborting ...")
elseif ( status ) then
status, data = socket:receive_buf("\n", false)
if ( status ) then
diff --git a/scripts/hbase-master-info.nse b/scripts/hbase-master-info.nse
index 68bb54eda..3f8e69c51 100644
--- a/scripts/hbase-master-info.nse
+++ b/scripts/hbase-master-info.nse
@@ -12,7 +12,7 @@ Retrieves information from an Apache HBase (Hadoop database) master HTTP status
Information gathered:
* Hbase version
* Hbase compile date
- * Hbase root eirectory
+ * Hbase root directory
* Hadoop version
* Hadoop compile date
* Average load
diff --git a/scripts/http-brute.nse b/scripts/http-brute.nse
index 6289ea636..6c5004492 100644
--- a/scripts/http-brute.nse
+++ b/scripts/http-brute.nse
@@ -62,7 +62,7 @@ Driver = {
end,
connect = function( self )
- -- This will cause problems, as ther is no way for us to "reserve"
+ -- This will cause problems, as there is no way for us to "reserve"
-- a socket. We may end up here early with a set of credentials
-- which won't be guessed until the end, due to socket exhaustion.
return true
diff --git a/scripts/http-comments-displayer.nse b/scripts/http-comments-displayer.nse
index cf680c878..caa5df6b4 100644
--- a/scripts/http-comments-displayer.nse
+++ b/scripts/http-comments-displayer.nse
@@ -13,7 +13,7 @@ Extracts and outputs HTML and JavaScript comments from HTTP responses.
-- Default: nil (crawler mode on)
-- @args http-comments-displayer.context declares the number of chars
-- to extend our final strings. This is useful when we need to
--- to see the code that the comments are reffering to.
+-- to see the code that the comments are referring to.
-- Default: 0, Maximum Value: 50
--
--
@@ -52,7 +52,7 @@ PATTERNS = {
portrule = shortport.port_or_service( {80, 443}, {"http", "https"}, "tcp", "open")
--- Returns comment's line number by counting the occurences of the
+-- Returns comment's line number by counting the occurrences of the
-- new line character ("\n") from the start of the HTML file until
-- the related comment.
local getLineNumber = function(body, comment)
diff --git a/scripts/http-csrf.nse b/scripts/http-csrf.nse
index 70c8ef603..449971ce6 100644
--- a/scripts/http-csrf.nse
+++ b/scripts/http-csrf.nse
@@ -10,7 +10,7 @@ will also calculate the entropy of each attribute's value. A big entropy means a
possible token.
A common use case for this script comes along with a cookie that gives access
-in pages that require authentication, because that's where the priviledged
+in pages that require authentication, because that's where the privileged
exist. See the http library's documentation to set your own cookie.
]]
@@ -31,15 +31,15 @@ exist. See the http library's documentation to set your own cookie.
-- | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=some-very-random-page.com
-- | Found the following CSRF vulnerabilities:
-- |
--- | Path: http://www.some-very-random-page.com/
+-- | Path: http://www.example.com/
-- | Form id: search_bar_input
-- | Form action: /search
-- |
--- | Path: http://www.some-very-random-page.com/c/334/watches.html
+-- | Path: http://www.example.com/c/334/watches.html
-- | Form id: custom_price_filters
-- | Form action: /search
-- |
--- | Path: http://www.some-very-radom-page.com/c/334/watches.html
+-- | Path: http://www.example.com/c/334/watches.html
-- | Form id: custom_price_filters
-- |_ Form action: /c/334/rologia-xeiros-watches.html
--
diff --git a/scripts/http-default-accounts.nse b/scripts/http-default-accounts.nse
index 1639836ab..c1f9870db 100644
--- a/scripts/http-default-accounts.nse
+++ b/scripts/http-default-accounts.nse
@@ -69,7 +69,7 @@ portrule = shortport.http
--validate_fingerprints(fingerprints)
--Returns an error string if there is something wrong with
--fingerprint table.
---Modified's version of http-enums validation code
+--Modified version of http-enums validation code
--@param fingerprints Fingerprint table
--@return Error string if its an invalid fingerprint table
---
diff --git a/scripts/http-domino-enum-passwords.nse b/scripts/http-domino-enum-passwords.nse
index 797301822..28b6571c5 100644
--- a/scripts/http-domino-enum-passwords.nse
+++ b/scripts/http-domino-enum-passwords.nse
@@ -15,7 +15,7 @@ also download any Domino ID Files attached to the Person document.
-- @usage
-- nmap --script domino-enum-passwords -p 80 --script-args domino-enum-passwords.username='patrik karlsson',domino-enum-passwords.password=secret
--
--- This script attempts to enumerate the password hashes used to authenitcate
+-- This script attempts to enumerate the password hashes used to authenticate
-- to the Lotus Domino Web interface. By default, these hashes are accessible
-- to every authenticated user. Passwords are presented in a form suitable for
-- running in John the Ripper.
@@ -115,7 +115,7 @@ end
--
-- @param host table as received by the action function or the name specified
-- in the hostname argument
--- @param port as recieved by the action method
+-- @param port as received by the action method
-- @param path the patch against which to validate the credentials
-- @param user the username used for authentication
-- @param pass the password used for authentication
@@ -133,9 +133,9 @@ end
--- Retrieves all uniq links in a pages
--
--- @param body the html content of the recieved page
+-- @param body the html content of the received page
-- @param filter a filter to use for additional link filtering
--- @param links [optional] table containing previousy retrieved links
+-- @param links [optional] table containing previously retrieved links
-- @return links table containing retrieved links
local function getLinks( body, filter, links )
local tmp = {}
@@ -164,7 +164,7 @@ end
--- Retrieves the "next page" path from the returned document
--
--- @param body the html content of the recieved page
+-- @param body the html content of the received page
-- @return link to next page
local function getPager( body )
return body:match("
-- Revised 05/23/2011 - v0.2 - changed so that uservar is optional
--- Revised 06/05/2011 - v0.3 - major re-write, added onsucces, onfailure and
+-- Revised 06/05/2011 - v0.3 - major re-write, added onsuccess, onfailure and
-- support for redirects
--
@@ -96,7 +96,7 @@ Driver = {
end,
connect = function( self )
- -- This will cause problems, as ther is no way for us to "reserve"
+ -- This will cause problems, as there is no way for us to "reserve"
-- a socket. We may end up here early with a set of credentials
-- which won't be guessed until the end, due to socket exhaustion.
return true
diff --git a/scripts/http-icloud-sendmsg.nse b/scripts/http-icloud-sendmsg.nse
index f74edbeca..1321c0182 100644
--- a/scripts/http-icloud-sendmsg.nse
+++ b/scripts/http-icloud-sendmsg.nse
@@ -85,7 +85,7 @@ action = function()
end
if ( not(arg_deviceindex) and not(arg_listdevices) ) then
- return fail("No device ID was specificed")
+ return fail("No device ID was specified")
end
if ( 1 == tonumber(arg_listdevices) or "true" == arg_listdevices ) then
diff --git a/scripts/http-iis-webdav-vuln.nse b/scripts/http-iis-webdav-vuln.nse
index 2cca54d55..c07cb9a76 100644
--- a/scripts/http-iis-webdav-vuln.nse
+++ b/scripts/http-iis-webdav-vuln.nse
@@ -48,7 +48,7 @@ local enum_results =
UNKNOWN = 3
}
----Sends a PROPFIND request to the given host, and for the given folder. Returns a table reprenting a response.
+---Sends a PROPFIND request to the given host, and for the given folder. Returns a table representing a response.
local function get_response(host, port, folder)
local webdav_req = ''
diff --git a/scripts/http-method-tamper.nse b/scripts/http-method-tamper.nse
index a136a4a31..96c3af1f1 100644
--- a/scripts/http-method-tamper.nse
+++ b/scripts/http-method-tamper.nse
@@ -9,7 +9,7 @@ The script determines if the protected URI is vulnerable by performing HTTP verb
for PHP servers ).
If the table paths is set, it will attempt to access the given URIs. Otherwise, a web crawler
-is initiated to try to find protected resources. Note that in a PHP environment with .htacess files you need to specify a
+is initiated to try to find protected resources. Note that in a PHP environment with .htaccess files you need to specify a
path to a file rather than a directory to find misconfigured .htaccess files.
References:
@@ -46,7 +46,7 @@ References:
-- | http://capec.mitre.org/data/definitions/274.html
-- |_ https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29
--
--- @args http-method-tamper.uri Base URI to crawl. Not aplicable if http-method-tamper.paths is set.
+-- @args http-method-tamper.uri Base URI to crawl. Not applicable if http-method-tamper.paths is set.
-- @args http-method-tamper.paths Array of paths to check. If not set, the script will crawl the web server.
-- @args http-method-tamper.timeout Web crawler timeout. Default: 10s
---
diff --git a/scripts/http-methods.nse b/scripts/http-methods.nse
index 62e326f80..f48c8b533 100644
--- a/scripts/http-methods.nse
+++ b/scripts/http-methods.nse
@@ -66,7 +66,7 @@ action = function(host, port)
local url_path, retest_http_methods
local response, methods, options_status_line, output
- -- default vaules for script-args
+ -- default values for script-args
url_path = stdnse.get_script_args("http-methods.url-path") or "/"
retest_http_methods = stdnse.get_script_args("http-methods.retest") ~= nil
diff --git a/scripts/http-open-proxy.nse b/scripts/http-open-proxy.nse
index f763f94d3..33e636a95 100644
--- a/scripts/http-open-proxy.nse
+++ b/scripts/http-open-proxy.nse
@@ -49,7 +49,7 @@ categories = {"default", "discovery", "external", "safe"}
-- @param port The port table
-- @param test_url The url te send the request
-- @param pattern The pattern to check for valid result
--- @return status (if any request was succeded
+-- @return status if any request succeeded
-- @return response String with supported methods
function custom_test(host, port, test_url, pattern)
local lstatus = false
@@ -96,7 +96,7 @@ end
--
-- @param host The host table
-- @param port The port table
--- @return status (if any request was succeded
+-- @return status if any request succeeded
-- @return response String with supported methods
function default_test(host, port)
local fstatus = false
diff --git a/scripts/http-passwd.nse b/scripts/http-passwd.nse
index e9dbd5b32..4ba8bf2b1 100644
--- a/scripts/http-passwd.nse
+++ b/scripts/http-passwd.nse
@@ -109,7 +109,7 @@ end
--- Formats output.
--@param passwd passwd or boot.ini file.
---@param dir Formatted request which elicited the good reponse.
+--@param dir Formatted request which elicited the good response.
--@return String description for output
local output = function(passwd, dir)
local trunc, len = truncatePasswd(passwd)
diff --git a/scripts/http-referer-checker.nse b/scripts/http-referer-checker.nse
index 8a3d1d0f7..7d8835e4b 100644
--- a/scripts/http-referer-checker.nse
+++ b/scripts/http-referer-checker.nse
@@ -5,7 +5,7 @@ third-party entities.
]]
---
--- @usage nmap -p80 --script http-refferer-checker.nse
+-- @usage nmap -p80 --script http-referer-checker.nse
--
-- This script informs about cross-domain include of scripts by
-- finding src attributes that point to a different domain.
diff --git a/scripts/http-robtex-reverse-ip.nse b/scripts/http-robtex-reverse-ip.nse
index 3c28d7f51..d997054f0 100644
--- a/scripts/http-robtex-reverse-ip.nse
+++ b/scripts/http-robtex-reverse-ip.nse
@@ -42,7 +42,7 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery", "safe", "external"}
---- Scrape reverse ip informations from robtex website
+--- Scrape reverse ip information from robtex website
-- @param data string containing the retrieved web page
-- @return table containing the resolved host names
function parse_robtex_response(data)
diff --git a/scripts/http-sitemap-generator.nse b/scripts/http-sitemap-generator.nse
index 2249f89c7..614031402 100644
--- a/scripts/http-sitemap-generator.nse
+++ b/scripts/http-sitemap-generator.nse
@@ -98,8 +98,8 @@ end
local function internal_table_to_output(t)
local output = {}
for _,dir in ipairs(t) do
- local ext_and_occurences = sort_by_keys(dir[2])
- output[#output+1] = {name=dir[1], table.concat(ext_and_occurences, "; ")}
+ local ext_and_occurrences = sort_by_keys(dir[2])
+ output[#output+1] = {name=dir[1], table.concat(ext_and_occurrences, "; ")}
end
return output
end
diff --git a/scripts/http-slowloris.nse b/scripts/http-slowloris.nse
index 96c54b9c9..e9e3cf658 100644
--- a/scripts/http-slowloris.nse
+++ b/scripts/http-slowloris.nse
@@ -83,7 +83,7 @@ local Reason = "slowloris" -- DoSed due to slowloris attack or something else
local Bestopt
--- get time (in miliseconds) when the script should finish
+-- get time (in milliseconds) when the script should finish
local function get_end_time()
if TimeLimit == nil then
return -1
diff --git a/scripts/http-sql-injection.nse b/scripts/http-sql-injection.nse
index 27246c727..83f831fed 100644
--- a/scripts/http-sql-injection.nse
+++ b/scripts/http-sql-injection.nse
@@ -87,7 +87,7 @@ local function check_injection_response(response)
end
--[[
-Replaces usual queries with malicious querie and return a table with them.
+Replaces usual queries with malicious query and return a table with them.
]]--
local function build_injection_vector(urls)
diff --git a/scripts/http-stored-xss.nse b/scripts/http-stored-xss.nse
index 091d8b70c..777eae538 100644
--- a/scripts/http-stored-xss.nse
+++ b/scripts/http-stored-xss.nse
@@ -1,7 +1,7 @@
description = [[
Posts specially crafted strings to every form it
encounters and then searches through the website for those
-strings to determine whether the payloads were succesful.
+strings to determine whether the payloads were successful.
]]
---
@@ -118,7 +118,7 @@ local checkPayload = function(body, p)
end
--- Check if the payloads were succesfull by checking the content of pages in the uploadspaths array.
+-- Check if the payloads were successful by checking the content of pages in the uploadspaths array.
local checkRequests = function(body, target)
local output = {}
diff --git a/scripts/http-tplink-dir-traversal.nse b/scripts/http-tplink-dir-traversal.nse
index e54e485e2..c990211ed 100644
--- a/scripts/http-tplink-dir-traversal.nse
+++ b/scripts/http-tplink-dir-traversal.nse
@@ -26,7 +26,7 @@ Other interesting files:
-- | State: VULNERABLE (Exploitable)
-- | Description:
-- | Some TP-Link wireless routers are vulnerable to a path traversal vulnerability that allows attackers to read configurations or any other file in the device.
--- | This vulnerability can be exploited remotely and without authenticatication.
+-- | This vulnerability can be exploited remotely and without authentication.
-- | Confirmed vulnerable models: WR740N, WR740ND, WR2543ND
-- | Possibly vulnerable (Based on the same firmware): WR743ND,WR842ND,WA-901ND,WR941N,WR941ND,WR1043ND,MR3220,MR3020,WR841N.
-- | Disclosure date: 2012-06-18
@@ -115,7 +115,7 @@ action = function(host, port)
state = vulns.STATE.NOT_VULN,
description = [[
Some TP-Link wireless routers are vulnerable to a path traversal vulnerability that allows attackers to read configurations or any other file in the device.
-This vulnerability can be exploited without authenticatication.
+This vulnerability can be exploited without authentication.
Confirmed vulnerable models: WR740N, WR740ND, WR2543ND
Possibly vulnerable (Based on the same firmware): WR743ND,WR842ND,WA-901ND,WR941N,WR941ND,WR1043ND,MR3220,MR3020,WR841N.]],
references = {
diff --git a/scripts/http-useragent-tester.nse b/scripts/http-useragent-tester.nse
index 45ebb6d84..005024cfe 100644
--- a/scripts/http-useragent-tester.nse
+++ b/scripts/http-useragent-tester.nse
@@ -1,14 +1,14 @@
description = [[
-Checks if various crawling ultities are allowed by the host.
+Checks if various crawling utilities are allowed by the host.
]]
---
-- @usage nmap -p80 --script http-useragent-tester.nse
--
-- This script sets various User-Agent headers that are used by different
--- ultities and crawling libraries (for example CURL or wget). If the request is
+-- utilities and crawling libraries (for example CURL or wget). If the request is
-- redirected to a page different than a (valid) browser request would be, that
--- means that this ultity is banned.
+-- means that this utility is banned.
--
-- @args http-useragent-tester.useragents A table with more User-Agent headers.
-- Default: nil
diff --git a/scripts/http-virustotal.nse b/scripts/http-virustotal.nse
index cb22912df..1e8633d59 100644
--- a/scripts/http-virustotal.nse
+++ b/scripts/http-virustotal.nse
@@ -225,7 +225,7 @@ action = function()
resource = json_data['resource']
local output = {}
- table.insert(output, "Your file was succesfully uploaded and placed in the scanning queue.")
+ table.insert(output, "Your file was successfully uploaded and placed in the scanning queue.")
table.insert(output, { name = "To check the current status visit:", json_data['permalink'] })
return stdnse.format_output(true, output)
elseif ( arg_filename ) then
@@ -248,7 +248,7 @@ action = function()
end
if ( not(response.response_code) or 0 == tonumber(response.response_code) ) then
- return fail(("Failed to retreive scan report for resource: %s"):format(resource))
+ return fail(("Failed to retrieve scan report for resource: %s"):format(resource))
end
return stdnse.format_output(true, parseScanReport(response))
diff --git a/scripts/http-vmware-path-vuln.nse b/scripts/http-vmware-path-vuln.nse
index 735d78faa..a06076364 100644
--- a/scripts/http-vmware-path-vuln.nse
+++ b/scripts/http-vmware-path-vuln.nse
@@ -62,7 +62,7 @@ local function fake_xml_parse(str, tag)
-- Lowercase the 'body' we're searching
local lc = string.lower(str)
- -- Lowrcase the tag
+ -- Lowercase the tag
tag = string.lower(tag)
-- This loop does some ugly pattern-based xml parsing
diff --git a/scripts/http-vuln-cve2011-3192.nse b/scripts/http-vuln-cve2011-3192.nse
index 1b20e2528..44cdb11fa 100644
--- a/scripts/http-vuln-cve2011-3192.nse
+++ b/scripts/http-vuln-cve2011-3192.nse
@@ -41,7 +41,7 @@ References:
-- 2011-08-29 Duarte Silva
-- - Removed the "Accept-Encoding" HTTP header
-- - Removed response header printing
--- * Changes based on Henri Doreau and David Fifield sugestions
+-- * Changes based on Henri Doreau and David Fifield suggestions
-- 2011-08-20 Duarte Silva
-- * First version ;)
-- 2011-11-07 Henri Doreau
diff --git a/scripts/http-vuln-cve2011-3368.nse b/scripts/http-vuln-cve2011-3368.nse
index 568aa5967..8a41338a0 100644
--- a/scripts/http-vuln-cve2011-3368.nse
+++ b/scripts/http-vuln-cve2011-3368.nse
@@ -125,7 +125,7 @@ servers to remote users who send carefully crafted requests.]],
{ prefix = ":", suffix = ":80"}
}
- -- try a bunch of hosts, and hope we hit one thats
+ -- try a bunch of hosts, and hope we hit one that's
-- not on the network, this will give us the delay we're expecting
local hosts = {
"10.10.10.10",
diff --git a/scripts/http-waf-detect.nse b/scripts/http-waf-detect.nse
index 727815b77..c5bf576ca 100644
--- a/scripts/http-waf-detect.nse
+++ b/scripts/http-waf-detect.nse
@@ -110,7 +110,7 @@ action = function(host, port)
if payload_example and ( string.len(payload_example) > string.len(attack_vectors_n1[i]) ) then
payload_example = attack_vectors_n1[i]
end
- stdnse.print_debug(2, "Payload:%s trigerred the IDS/IPS/WAF", attack_vectors_n1[i])
+ stdnse.print_debug(2, "Payload:%s triggered the IDS/IPS/WAF", attack_vectors_n1[i])
if res.status and res.body then
stdnse.print_debug(3, "Status:%s Body:%s\n", res.status, res.body)
end
diff --git a/scripts/http-waf-fingerprint.nse b/scripts/http-waf-fingerprint.nse
index edf543567..ee9042744 100644
--- a/scripts/http-waf-fingerprint.nse
+++ b/scripts/http-waf-fingerprint.nse
@@ -41,7 +41,7 @@ categories = {"discovery", "intrusive"}
-- Version 0.1:
-- - Initial version based on work done with wafw00f and w3af.
-- - Removed many false positives.
--- - Added fingeprints for WAFs such as Incapsula WAF, Cloudflare, USP-SES,
+-- - Added fingerprints for WAFs such as Incapsula WAF, Cloudflare, USP-SES,
-- Cisco ACE XML Gateway and ModSecurity.
-- - Added fingerprints and version detection for Webknight and BinarySec,
-- Citrix Netscaler and ModSecurity
@@ -342,7 +342,7 @@ netscaler = {
end
if response.header.cneonction == "close" or response.header.nncoection == "close" then
- if not netscaler.detected then stdnse.print_debug("%s Netscaler detected through Cneoction/nnCoection header.", SCRIPT_NAME) end
+ if not netscaler.detected then stdnse.print_debug("%s Netscaler detected through Cneonction/nnCoection header.", SCRIPT_NAME) end
netscaler.detected = true
end
@@ -535,7 +535,7 @@ naxsi = {
end,
intensive = function(host, port, root, responses)
-- Credit to Henri Doreau
- local response = http.get(host, port, root .. "?a=[") -- This shouldn't trigget the rules
+ local response = http.get(host, port, root .. "?a=[") -- This shouldn't trigger the rules
local response2 = http.get(host, port, root .. "?a=[[[]]]][[[]") -- This should trigger the score based rules
if response.status ~= response2.status then
@@ -595,9 +595,9 @@ local send_requests = function(host, port, root)
all = http.pipeline_add(root, nil, all, "GET")
table.insert(requests,"normal")
- -- Normal inexisting
+ -- Normal nonexistent
all = http.pipeline_add(root .. "asofKlj", nil, all, "GET")
- table.insert(requests,"inexisting")
+ table.insert(requests,"nonexistent")
-- Invalid Method
all = http.pipeline_add(root, nil, all, "ASDE")
diff --git a/scripts/http-wordpress-brute.nse b/scripts/http-wordpress-brute.nse
index 48ada5d6e..52b48ed88 100644
--- a/scripts/http-wordpress-brute.nse
+++ b/scripts/http-wordpress-brute.nse
@@ -79,7 +79,7 @@ Driver = {
end,
connect = function( self )
- -- This will cause problems, as ther is no way for us to "reserve"
+ -- This will cause problems, as there is no way for us to "reserve"
-- a socket. We may end up here early with a set of credentials
-- which won't be guessed until the end, due to socket exhaustion.
return true
diff --git a/scripts/http-wordpress-plugins.nse b/scripts/http-wordpress-plugins.nse
index 0a630722f..316d82683 100644
--- a/scripts/http-wordpress-plugins.nse
+++ b/scripts/http-wordpress-plugins.nse
@@ -11,7 +11,7 @@ description = [[
Tries to obtain a list of installed WordPress plugins by brute force
testing for known plugins.
-The script will brute force the /wp-content/plugins/ folder with a dictionnary
+The script will brute force the /wp-content/plugins/ folder with a dictionary
of 14K (and counting) known WP plugins. Anything but a 404 means that a given
plugin directory probably exists, so the plugin probably also does.
diff --git a/scripts/ip-geolocation-maxmind.nse b/scripts/ip-geolocation-maxmind.nse
index b42eba5c6..fa57f1d52 100644
--- a/scripts/ip-geolocation-maxmind.nse
+++ b/scripts/ip-geolocation-maxmind.nse
@@ -566,7 +566,7 @@ local GeoIP = {
x[i] = x[i] + bit.lshift(buf:byte((self._recordLength * i + j) +1 ), j*8)
end
end
- -- Gotta test this out thorougly because of the ipnum
+ -- Gotta test this out thoroughly because of the ipnum
if bit.band(ipnum, bit.lshift(1,depth)) ~= 0 then
if x[1] >= self._databaseSegments then
return x[1]
diff --git a/scripts/ipidseq.nse b/scripts/ipidseq.nse
index 9f623636c..ef712a585 100644
--- a/scripts/ipidseq.nse
+++ b/scripts/ipidseq.nse
@@ -10,7 +10,7 @@ Classifies a host's IP ID sequence (test for susceptibility to idle
scan).
Sends six probes to obtain IP IDs from the target and classifies them
-similiarly to Nmap's method. This is useful for finding suitable zombies
+similarly to Nmap's method. This is useful for finding suitable zombies
for Nmap's idle scan (-sI) as Nmap itself doesn't provide a way to scan
for these hosts.
]]
diff --git a/scripts/ipv6-ra-flood.nse b/scripts/ipv6-ra-flood.nse
index e9b5ca0b5..523240bc6 100644
--- a/scripts/ipv6-ra-flood.nse
+++ b/scripts/ipv6-ra-flood.nse
@@ -110,7 +110,7 @@ local function build_router_advert(mac_src,prefix,prefix_len,valid_time,preferre
local prefix_option_msg = string.char(prefix_len, 0xc0) .. --flags: Onlink, Auto
packet.set_u32("....", 0, valid_time) .. -- valid lifetime
- packet.set_u32("....", 0, preferred_time) .. -- preffered lifetime
+ packet.set_u32("....", 0, preferred_time) .. -- preferred lifetime
string.char(0,0,0,0) .. --unknown
prefix
@@ -145,7 +145,7 @@ local function broadcast_on_interface(iface)
--- maximum possible value of 4-byte integer
local valid_time = tonumber(0xffffffff)
- local preffered_time = tonumber(0xffffffff)
+ local preferred_time = tonumber(0xffffffff)
local mtu = 1500
@@ -165,7 +165,7 @@ local function broadcast_on_interface(iface)
packet.ip_bin_src = src_ip6_addr
packet.ip_bin_dst = dst_ip6_addr
- local icmpv6_payload = build_router_advert(src_mac, prefix, prefix_len, valid_time, preffered_time, mtu)
+ local icmpv6_payload = build_router_advert(src_mac, prefix, prefix_len, valid_time, preferred_time, mtu)
packet:build_icmpv6_header(134, 0, icmpv6_payload)
packet:build_ipv6_packet()
packet:build_ether_frame()
diff --git a/scripts/irc-unrealircd-backdoor.nse b/scripts/irc-unrealircd-backdoor.nse
index 58e990711..1d33639e5 100644
--- a/scripts/irc-unrealircd-backdoor.nse
+++ b/scripts/irc-unrealircd-backdoor.nse
@@ -72,7 +72,7 @@ action = function(host, port)
local delay = 8
-- If the command takes (delay - delay_fudge) or more seconds, the server is vulnerable.
- -- I defined the furdge as 1 second, for now, just because of rounding issues. In practice,
+ -- I defined the fudge as 1 second, for now, just because of rounding issues. In practice,
-- the actual delay should never be shorter than the given delay, only longer.
local delay_fudge = 1
diff --git a/scripts/krb5-enum-users.nse b/scripts/krb5-enum-users.nse
index 0d67187e0..b4c4f5b43 100644
--- a/scripts/krb5-enum-users.nse
+++ b/scripts/krb5-enum-users.nse
@@ -10,7 +10,7 @@ local unpwdb = require "unpwdb"
description = [[
Discovers valid usernames by brute force querying likely usernames against a Kerberos service.
-When an invalid username is requested the server will responde using the
+When an invalid username is requested the server will respond using the
Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine
that the user name was invalid. Valid user names will illicit either the
TGT in a AS-REP response or the error KRB5KDC_ERR_PREAUTH_REQUIRED, signaling
diff --git a/scripts/ldap-novell-getpass.nse b/scripts/ldap-novell-getpass.nse
index e929d93e3..23f51021b 100644
--- a/scripts/ldap-novell-getpass.nse
+++ b/scripts/ldap-novell-getpass.nse
@@ -119,7 +119,7 @@ function action(host,port)
local respname = ( #response >= 5 ) and response[5]
if ( rescode ~= 0 ) then
- local errmsg = ( #response >= 4 ) and response[4] or "An unknown error occured"
+ local errmsg = ( #response >= 4 ) and response[4] or "An unknown error occurred"
return "\n ERROR: " .. errmsg
end
diff --git a/scripts/ldap-search.nse b/scripts/ldap-search.nse
index 64cc9b0af..559e823c7 100644
--- a/scripts/ldap-search.nse
+++ b/scripts/ldap-search.nse
@@ -84,7 +84,7 @@ anonymous bind will be used as a last attempt.
-- Created 01/12/2010 - v0.1 - created by Patrik Karlsson
-- Revised 01/20/2010 - v0.2 - added SSL support
-- Revised 01/26/2010 - v0.3 - Changed SSL support to comm.tryssl, prefixed arguments with ldap, changes in determination of namingContexts
--- Revised 02/17/2010 - v0.4 - Added dependencie to ldap-brute and the abilitity to check for ldap accounts (credentials) stored in nmap registry
+-- Revised 02/17/2010 - v0.4 - Added dependency to ldap-brute and the abilitity to check for ldap accounts (credentials) stored in nmap registry
-- Capped output to 20 entries, use ldap.maxObjects to override
-- Revised 07/16/2010 - v0.5 - Fixed bug with empty contexts, added objectClass person to qfilter users, add error msg for invalid credentials
-- Revised 09/05/2011 - v0.6 - Added support for saving searches to a file via argument ldap.savesearch
diff --git a/scripts/llmnr-resolve.nse b/scripts/llmnr-resolve.nse
index 15a6ac485..0f4d46813 100644
--- a/scripts/llmnr-resolve.nse
+++ b/scripts/llmnr-resolve.nse
@@ -122,7 +122,7 @@ local llmnrListen = function(interface, timeout, result)
-- Now, answer record
local response, alen = {}
index, alen = bin.unpack(">C", llmnr, index)
- -- Extract hostname with the correct case sensivity.
+ -- Extract hostname with the correct case sensitivity.
index, response.hostname = bin.unpack(">A".. alen, llmnr, index)
-- skip null byte, type, class, ttl, dlen
diff --git a/scripts/maxdb-info.nse b/scripts/maxdb-info.nse
index 391051034..015de42a7 100644
--- a/scripts/maxdb-info.nse
+++ b/scripts/maxdb-info.nse
@@ -91,7 +91,7 @@ end
-- Parses and decodes the raw version response from the server
-- @param data string containing the raw response
--- @return version_info table containining a number of dynamic fields based on
+-- @return version_info table containing a number of dynamic fields based on
-- the response from the server. The fields typically include:
-- VERSION, BUILD, OS,
-- INSTROOT,LOGON, CODE,
diff --git a/scripts/mcafee-epo-agent.nse b/scripts/mcafee-epo-agent.nse
index 09f879cc0..a33aa9e74 100644
--- a/scripts/mcafee-epo-agent.nse
+++ b/scripts/mcafee-epo-agent.nse
@@ -5,7 +5,7 @@
-- History:
-- 2012/05/31: Start
-- 2012/06/01: extracting data from XML; tested with ePO 4.5 and 4.6
--- 2012/06/05: V0.0.2 convertion to version script by Daniel Miller
+-- 2012/06/05: V0.0.2 conversion to version script by Daniel Miller
-- 2012/06/20: new portrule by Daniel Miller
description = [[
diff --git a/scripts/metasploit-info.nse b/scripts/metasploit-info.nse
index 342d59aa6..3e61ab0df 100644
--- a/scripts/metasploit-info.nse
+++ b/scripts/metasploit-info.nse
@@ -76,13 +76,13 @@ local encode_auth = function(username, password)
return bin.pack("C",0x93) .. bin.pack("C",0xaa) .. method .. get_prefix(username) .. username .. get_prefix(password) .. password
end
--- returns a msgpacked data for any method without exstra parameters
+-- returns a msgpacked data for any method without extra parameters
local encode_noparam = function(token,method)
-- token is always the same length
return bin.pack("C",0x92) .. get_prefix(method) .. method .. bin.pack("H","da0020") .. token
end
--- does the actuall call with specified, pre-packed data
+-- does the actual call with specified, pre-packed data
-- and returns the response
local msgrpc_call = function(host, port, msg)
local data
@@ -98,7 +98,7 @@ local msgrpc_call = function(host, port, msg)
return nil
end
--- auth.login wraper, returns the auth token
+-- auth.login wrapper, returns the auth token
local login = function(username, password,host,port)
local data = msgrpc_call(host, port, encode_auth(username,password))
@@ -107,7 +107,7 @@ local login = function(username, password,host,port)
local start = string.find(data,"success")
if start > -1 then
-- get token
- local token = string.sub(string.sub(data,start),17) -- "manualy" unpack token
+ local token = string.sub(string.sub(data,start),17) -- "manually" unpack token
return true, token
else
return false, nil
@@ -117,7 +117,7 @@ local login = function(username, password,host,port)
return false, nil
end
--- core.version wraper, returns version info, and sets the OS type
+-- core.version wrapper, returns version info, and sets the OS type
-- so we can decide which commands to send later
local get_version = function(host, port, token)
local msg = encode_noparam(token,"core.version")
@@ -160,7 +160,7 @@ local get_version = function(host, port, token)
return nil
end
--- console.create wraper, returns console_id
+-- console.create wrapper, returns console_id
-- which we can use to interact with metasploit further
local create_console = function(host,port,token)
local msg = encode_noparam(token,"console.create")
@@ -181,7 +181,7 @@ local create_console = function(host,port,token)
end
--- console.read wraper
+-- console.read wrapper
local read_console = function(host,port,token,console_id)
local msg = encode_console_read("console.read",token,console_id)
local data = msgrpc_call(host, port, msg)
@@ -204,7 +204,7 @@ local read_console = function(host,port,token,console_id)
end
end
--- console.write wraper
+-- console.write wrapper
local write_console = function(host,port,token,console_id,command)
local msg = encode_console_write("console.write",token,console_id,command .. "\n")
local data = msgrpc_call(host, port, msg)
@@ -215,7 +215,7 @@ local write_console = function(host,port,token,console_id,command)
return false
end
--- console.destroy wraper, just to be nice, we don't want console to hang ...
+-- console.destroy wrapper, just to be nice, we don't want console to hang ...
local destroy_console = function(host,port,token,console_id)
local msg = encode_console_read("console.destroy",token,console_id)
local data = msgrpc_call(host, port, msg)
diff --git a/scripts/metasploit-msgrpc-brute.nse b/scripts/metasploit-msgrpc-brute.nse
index b2ef018a2..993abec58 100644
--- a/scripts/metasploit-msgrpc-brute.nse
+++ b/scripts/metasploit-msgrpc-brute.nse
@@ -17,7 +17,7 @@ Metasploit msgrpc interface.
-- nmap --script metasploit-msgrpc-brute -p 55553
--
-- This script uses brute library to perform password
--- guessing agains Metasploit's msgrpc interface.
+-- guessing against Metasploit's msgrpc interface.
--
--
-- @output
diff --git a/scripts/mmouse-brute.nse b/scripts/mmouse-brute.nse
index a5942972d..35d356599 100644
--- a/scripts/mmouse-brute.nse
+++ b/scripts/mmouse-brute.nse
@@ -74,7 +74,7 @@ Driver = {
return true, brute.Account:new("", password, creds.State.VALID)
end
- local err = brute.Error:new("An unexpected error occured, retrying ...")
+ local err = brute.Error:new("An unexpected error occurred, retrying ...")
err:setRetry(true)
return false, err
end,
diff --git a/scripts/mongodb-databases.nse b/scripts/mongodb-databases.nse
index b3fd6b078..53f8b2953 100644
--- a/scripts/mongodb-databases.nse
+++ b/scripts/mongodb-databases.nse
@@ -64,7 +64,7 @@ function action(host,port)
try( socket:connect(host, port) )
- -- uglyness to allow creds.mongodb to work, as the port is not recognized
+ -- ugliness to allow creds.mongodb to work, as the port is not recognized
-- as mongodb, unless a service scan was run
local ps = port.service
port.service = 'mongodb'
diff --git a/scripts/mongodb-info.nse b/scripts/mongodb-info.nse
index e5e7cbb91..f1b201e42 100644
--- a/scripts/mongodb-info.nse
+++ b/scripts/mongodb-info.nse
@@ -81,7 +81,7 @@ function action(host,port)
local req, statusresponse, buildinfo, err
- -- uglyness to allow creds.mongodb to work, as the port is not recognized
+ -- ugliness to allow creds.mongodb to work, as the port is not recognized
-- as mongodb, unless a service scan was run
local ps = port.service
port.service = 'mongodb'
diff --git a/scripts/mrinfo.nse b/scripts/mrinfo.nse
index 32ce66847..1bbdf8c6b 100644
--- a/scripts/mrinfo.nse
+++ b/scripts/mrinfo.nse
@@ -111,8 +111,8 @@ local mrinfoParse = function(data)
address.ip = ipOps.fromdword(address.ip)
-- Link metric
index, address.metric = bin.unpack(">C", data, index)
- -- Treshold
- index, address.treshold= bin.unpack(">C", data, index)
+ -- Threshold
+ index, address.threshold= bin.unpack(">C", data, index)
-- Flags
index, address.flags = bin.unpack(">C", data, index)
-- Number of neighbors
diff --git a/scripts/ms-sql-info.nse b/scripts/ms-sql-info.nse
index 2ab52b005..080feb85d 100644
--- a/scripts/ms-sql-info.nse
+++ b/scripts/ms-sql-info.nse
@@ -31,7 +31,7 @@ Additionally, it provides imprecise version information.
* Sending a probe to the instance, causing the instance to respond with
information including the exact version number. This is the same method that
Nmap uses for service versioning; however, this script can also do the same for
-instances accessiable via Windows named pipes, and can target all of the
+instances accessible via Windows named pipes, and can target all of the
instances listed by the SQL Server Browser service.
In the event that the script can connect to the SQL Server Browser service
diff --git a/scripts/mtrace.nse b/scripts/mtrace.nse
index 58592c1f5..9bca98bf0 100644
--- a/scripts/mtrace.nse
+++ b/scripts/mtrace.nse
@@ -214,7 +214,7 @@ local traceParse = function(data)
if index >= #data then
break
elseif #data - index < 31 then
- stdnse.print_verbose("%s malformated traceroute response.", SCRIPT_NAME)
+ stdnse.print_verbose("%s malformed traceroute response.", SCRIPT_NAME)
return
end
diff --git a/scripts/mysql-databases.nse b/scripts/mysql-databases.nse
index 75480c141..4856c4d5d 100644
--- a/scripts/mysql-databases.nse
+++ b/scripts/mysql-databases.nse
@@ -71,7 +71,7 @@ action = function( host, port )
end
--
- -- Iterates over credentials, breaks once it successfully recieves results
+ -- Iterates over credentials, breaks once it successfully receives results
--
for username, password in pairs(users) do
diff --git a/scripts/mysql-enum.nse b/scripts/mysql-enum.nse
index 19f03168c..f0731f284 100644
--- a/scripts/mysql-enum.nse
+++ b/scripts/mysql-enum.nse
@@ -14,7 +14,7 @@ Performs valid-user enumeration against MySQL server using a bug
discovered and published by Kingcope
(http://seclists.org/fulldisclosure/2012/Dec/9).
-Server version 5.x are succeptible to an user enumeration
+Server version 5.x are susceptible to an user enumeration
attack due to different messages during login when using
old authentication mechanism from versions 4.x and earlier.
diff --git a/scripts/mysql-users.nse b/scripts/mysql-users.nse
index 2687e7b16..cea20fa54 100644
--- a/scripts/mysql-users.nse
+++ b/scripts/mysql-users.nse
@@ -74,7 +74,7 @@ action = function( host, port )
end
--
- -- Iterates over credentials, breaks once it successfully recieves results
+ -- Iterates over credentials, breaks once it successfully receives results
--
for username, password in pairs(users) do
diff --git a/scripts/mysql-variables.nse b/scripts/mysql-variables.nse
index 33addb210..92564a5c3 100644
--- a/scripts/mysql-variables.nse
+++ b/scripts/mysql-variables.nse
@@ -83,7 +83,7 @@ action = function( host, port )
end
--
- -- Iterates over credentials, breaks once it successfully recieves results
+ -- Iterates over credentials, breaks once it successfully receives results
--
for username, password in pairs(users) do
diff --git a/scripts/nat-pmp-info.nse b/scripts/nat-pmp-info.nse
index 4c22f001f..5bd08afa6 100644
--- a/scripts/nat-pmp-info.nse
+++ b/scripts/nat-pmp-info.nse
@@ -4,7 +4,7 @@ local shortport = require "shortport"
local stdnse = require "stdnse"
description = [[
-Get's the routers WAN IP using the NAT Port Mapping Protocol (NAT-PMP).
+Gets the routers WAN IP using the NAT Port Mapping Protocol (NAT-PMP).
The NAT-PMP protocol is supported by a broad range of routers including:
- Apple AirPort Express
- Apple AirPort Extreme
diff --git a/scripts/nat-pmp-mapport.nse b/scripts/nat-pmp-mapport.nse
index 898b0d528..b9b82a76e 100644
--- a/scripts/nat-pmp-mapport.nse
+++ b/scripts/nat-pmp-mapport.nse
@@ -34,7 +34,7 @@ o unmapall - unmaps all previously mapped ports for the requesting IP
-- choose another port, create the mapping and return the resulting port.
--
-- @args nat-pmp-mapport.privport the internal port of the calling IP to map requests
--- to. This port will recieve all requests coming in to the external port on the
+-- to. This port will receive all requests coming in to the external port on the
-- router.
--
-- @args nat-pmp-mapport.protocol the protocol to map, can be either tcp or udp.
diff --git a/scripts/nbstat.nse b/scripts/nbstat.nse
index 244f7269d..9176a669d 100644
--- a/scripts/nbstat.nse
+++ b/scripts/nbstat.nse
@@ -80,7 +80,7 @@ owns.
author = "Brandon Enright, Ron Bowes"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
--- Current version of this script was based entirly on Implementing CIFS, by
+-- Current version of this script was based entirely on Implementing CIFS, by
-- Christopher R. Hertel.
categories = {"default", "discovery", "safe"}
diff --git a/scripts/nessus-brute.nse b/scripts/nessus-brute.nse
index c61228f26..c7b911602 100644
--- a/scripts/nessus-brute.nse
+++ b/scripts/nessus-brute.nse
@@ -110,7 +110,7 @@ Driver =
end
-- we force a brief incorrect statement just to get an error message to
- -- confirm that we've succesfully authenticated to the server
+ -- confirm that we've successfully authenticated to the server
local bad_cli_pref = "CLIENT <|> PREFERENCES <|>\n<|> CLIENT\n"
status = self.socket:send(bad_cli_pref)
if ( not(status) ) then
diff --git a/scripts/ntp-monlist.nse b/scripts/ntp-monlist.nse
index 2268e9669..f95618693 100644
--- a/scripts/ntp-monlist.nse
+++ b/scripts/ntp-monlist.nse
@@ -39,8 +39,8 @@ the NTP service.
It should be noted that the very nature of the NTP monitor data means that the
Mode 7 commands sent by this script are recorded by the target (and will often
appear in these results). Since the monitor data is a MRU list, it is probable
-that you can overwrite the record of the Mode 7 command by sending an innoccuous
-looking Client Mode request. This can be acheived easily using Nmap:
+that you can overwrite the record of the Mode 7 command by sending an innocuous
+looking Client Mode request. This can be achieved easily using Nmap:
nmap -sU -pU:123 -Pn -n --max-retries=0
Notes:
@@ -509,7 +509,7 @@ function check(status, response, track)
else -- seq <= hseq !duplicate!
track.evil_pkts = track.evil_pkts+1
stdnse.print_debug(1,
- 'Response from %s had a duplcate sequence number - dropping it.',
+ 'Response from %s had a duplicate sequence number - dropping it.',
track.target
)
return nil
diff --git a/scripts/oracle-brute-stealth.nse b/scripts/oracle-brute-stealth.nse
index fbb503e55..d3dd079aa 100644
--- a/scripts/oracle-brute-stealth.nse
+++ b/scripts/oracle-brute-stealth.nse
@@ -95,7 +95,7 @@ Driver =
end
status, data = self.helper:Connect()
if ( not(status) ) then
- stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occured", SCRIPT_NAME, data)
+ stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occurred", SCRIPT_NAME, data)
self.helper:Close()
else
break
diff --git a/scripts/oracle-brute.nse b/scripts/oracle-brute.nse
index cc98e0ea8..e6d67979c 100644
--- a/scripts/oracle-brute.nse
+++ b/scripts/oracle-brute.nse
@@ -111,7 +111,7 @@ Driver =
end
status, data = self.helper:Connect()
if ( not(status) ) then
- stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occured", SCRIPT_NAME, data)
+ stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occurred", SCRIPT_NAME, data)
self.helper:Close()
else
break
diff --git a/scripts/p2p-conficker.nse b/scripts/p2p-conficker.nse
index 0851d1a9d..3b8cfb7bd 100644
--- a/scripts/p2p-conficker.nse
+++ b/scripts/p2p-conficker.nse
@@ -240,7 +240,7 @@ local function prng_generate_ports(ip, seed)
end
until(is_blacklisted_port(ports[1]) == false and is_blacklisted_port(ports[2]) == false and ports[1] ~= ports[2])
- -- Update the accumlator with the seed
+ -- Update the accumulator with the seed
v1 = bit.bxor(v1, seed)
-- Loop 10 more times to generate the second pair of ports
@@ -292,7 +292,7 @@ local function p2p_checksum(data)
end
---Encrypt/decrypt the buffer with a simple xor-based symmetric encryption. It uses a 64-bit key, represented
--- by key1:key2, that is transmited in plain text. Since sniffed packets can be decrypted, this is a
+-- by key1:key2, that is transmitted in plain text. Since sniffed packets can be decrypted, this is a
-- simple obfuscation technique.
--
--@param packet The packet to encrypt (before the key and optional length are prepended).
diff --git a/scripts/path-mtu.nse b/scripts/path-mtu.nse
index 9c6cbbfcf..63d3de339 100644
--- a/scripts/path-mtu.nse
+++ b/scripts/path-mtu.nse
@@ -314,7 +314,7 @@ action = function(host)
-- Since we're sending potentially large amounts of data per packet,
-- simply bump up the host's calculated timeout value. Most replies
-- should come from routers along the path, fragmentation reassembly
- -- times isn't an issue and the large amount of data is only travelling
+ -- times isn't an issue and the large amount of data is only traveling
-- in one direction; still, we want a response from the target so call
-- it 1.5*timeout to play it safer.
pcap:set_timeout(1.5 * host.times.timeout * 1000)
diff --git a/scripts/pgsql-brute.nse b/scripts/pgsql-brute.nse
index 93b820754..f0a7ee966 100644
--- a/scripts/pgsql-brute.nse
+++ b/scripts/pgsql-brute.nse
@@ -114,7 +114,7 @@ action = function( host, port )
break
end
- -- SSL failed, this can occure due to:
+ -- SSL failed, this can occur due to:
-- 1. The server does not do SSL
-- 2. SSL was denied on a per host or network level
--
diff --git a/scripts/rdp-vuln-ms12-020.nse b/scripts/rdp-vuln-ms12-020.nse
index 331633be5..6143414da 100644
--- a/scripts/rdp-vuln-ms12-020.nse
+++ b/scripts/rdp-vuln-ms12-020.nse
@@ -176,7 +176,7 @@ action = function(host, port)
-- Sleep for 0.2 seconds to make sure the script works even with SYN scan.
-- Posible reason for this is that Windows resets the connection if we try to
- -- reconect too fast to the same port after doing a SYN scan and not completing the
+ -- reconnect too fast to the same port after doing a SYN scan and not completing the
-- handshake. In my tests, sleep values above 0.1s prevent the connection reset.
stdnse.sleep(0.2)
@@ -191,11 +191,11 @@ action = function(host, port)
end
status, err = socket:send(connectInitial)
status, err = socket:send(userRequest) -- send attach user request
- status, response = socket:receive_bytes(0) -- recieve attach user confirm
+ status, response = socket:receive_bytes(0) -- receive attach user confirm
pos,user1 = bin.unpack(">S",response:sub(10,11)) -- user_channel-1001 - see http://msdn.microsoft.com/en-us/library/cc240918%28v=prot.10%29.aspx
status, err = socket:send(userRequest) -- send another attach user request
- status, response = socket:receive_bytes(0) -- recieve another attach user confirm
+ status, response = socket:receive_bytes(0) -- receive another attach user confirm
pos,user2 = bin.unpack(">S",response:sub(10,11)) -- second user's channel - 1001
user2 = user2+1001 -- second user's channel
local data4 = bin.pack(">SS",user1,user2)
@@ -204,7 +204,7 @@ action = function(host, port)
status, err = socket:send(channelJoinRequest) -- bogus channel join request user1 requests channel of user2
status, response = socket:receive_bytes(0)
if response:sub(8,9) == bin.pack("H","3e00") then
- -- 3e00 indicates a successfull join
+ -- 3e00 indicates a successful join
-- see http://msdn.microsoft.com/en-us/library/cc240911%28v=prot.10%29.aspx
-- service is vulnerable
-- send a valid request to prevent the BSoD
diff --git a/scripts/redis-brute.nse b/scripts/redis-brute.nse
index 964fecb5e..a0ea0f3ea 100644
--- a/scripts/redis-brute.nse
+++ b/scripts/redis-brute.nse
@@ -48,7 +48,7 @@ Driver = {
login = function( self, username, password )
local status, response = self.helper:reqCmd("AUTH", password)
- -- some error occured, attempt to retry
+ -- some error occurred, attempt to retry
if ( status and response.type == redis.Response.Type.ERROR and
"-ERR invalid password" == response.data ) then
return false, brute.Error:new( "Incorrect password" )
diff --git a/scripts/rpc-grind.nse b/scripts/rpc-grind.nse
index d173ba07f..1836bafd3 100644
--- a/scripts/rpc-grind.nse
+++ b/scripts/rpc-grind.nse
@@ -199,7 +199,7 @@ local rpcGrinder = function(host, port, iterator, result)
if type(response) == 'table' then
if xid ~= response.xid then
-- Shouldn't happen.
- stdnse.print_debug("%s: XID mismtach.", SCRIPT_NAME)
+ stdnse.print_debug("%s: XID mismatch.", SCRIPT_NAME)
end
-- Look at accept state
-- Not supported version means that we used the right program number
diff --git a/scripts/rpcap-brute.nse b/scripts/rpcap-brute.nse
index bceb992fc..51ec51b06 100644
--- a/scripts/rpcap-brute.nse
+++ b/scripts/rpcap-brute.nse
@@ -69,7 +69,7 @@ local function validateAuth(host, port)
if ( status ) then
return false, "Authentication not required"
elseif ( not(status) and
- "Authentication failed; NULL autentication not permitted." == result ) then
+ "Authentication failed; NULL authentication not permitted." == result ) then
return true
end
return status, result
diff --git a/scripts/rtsp-url-brute.nse b/scripts/rtsp-url-brute.nse
index a35250d61..f44d360a9 100644
--- a/scripts/rtsp-url-brute.nse
+++ b/scripts/rtsp-url-brute.nse
@@ -26,7 +26,7 @@ Attempts to enumerate RTSP media URLS by testing for common paths on devices suc
-- on which it determines whether the URL is valid or not.
--
-- @args rtsp-url-brute.urlfile sets an alternate URL dictionary file
--- @args rtsp-url-brute.threads sets the maximum number of parallell threads to run
+-- @args rtsp-url-brute.threads sets the maximum number of parallel threads to run
--
-- Version 0.1
@@ -135,9 +135,9 @@ action = function(host, port)
-- urls that could not be retrieved due to low level errors, such as
-- failure in socket send or receive
- local failure_urls = { name='An error occured while testing the following URLs' }
+ local failure_urls = { name='An error occurred while testing the following URLs' }
- -- urls that illicited a 200 OK response
+ -- urls that elicited a 200 OK response
local success_urls = { name='Discovered URLs' }
-- urls requiring authentication
diff --git a/scripts/samba-vuln-cve-2012-1182.nse b/scripts/samba-vuln-cve-2012-1182.nse
index 3ed7b0932..6a96d4ad0 100644
--- a/scripts/samba-vuln-cve-2012-1182.nse
+++ b/scripts/samba-vuln-cve-2012-1182.nse
@@ -17,12 +17,12 @@ CVE-2012-1182 marks multiple heap overflow vulnerabilities located in
PIDL based autogenerated code. This check script is based on PoC by ZDI
marked as ZDI-CAN-1503. Vulnerability lies in ndr_pull_lsa_SidArray
function where an attacker is under control of num_sids and can cause
-insuficient memory to be allocated, leading to heap buffer overflow
-and posibility of remote code execution.
+insufficient memory to be allocated, leading to heap buffer overflow
+and possibility of remote code execution.
-Script builds a malitious packet and makes a SAMR GetAliasMembership
+Script builds a malicious packet and makes a SAMR GetAliasMembership
call which triggers the vulnerability. On the vulnerable system,
-connection is droped and result is "Failed to receive bytes after 5 attempts".
+connection is dropped and result is "Failed to receive bytes after 5 attempts".
On patched system, samba throws an error and result is "MSRPC call
returned a fault (packet type)".
@@ -121,7 +121,7 @@ from an anonymous connection.
status, result = msrpc.samr_getaliasmembership(smbstate,marshaledHandle, data)
stdnse.print_debug(2, "msrpc.samr_getaliasmembership: %s, '%s'", status, result)
if(status == false and string.find(result,"Failed to receive bytes after 5 attempts") ~= nil) then
- samba_cve.state = vulns.STATE.VULN -- connection droped, server crashed
+ samba_cve.state = vulns.STATE.VULN -- connection dropped, server crashed
end
return report:make_output(samba_cve)
diff --git a/scripts/sip-brute.nse b/scripts/sip-brute.nse
index 46afdb392..aeb450e36 100644
--- a/scripts/sip-brute.nse
+++ b/scripts/sip-brute.nse
@@ -74,7 +74,7 @@ Driver = {
-- Function used to check if we can distinguish existing from non-existing
-- accounts. In order to do so we send a semi-random username and password
-- and interpret the response. Some servers will respond as if the login
--- was successful which makes it impossible to tell successfull logins
+-- was successful which makes it impossible to tell successful logins
-- from non-existing accounts apart.
local function checkBadUser(host, port)
local user = "baduser-" .. math.random(10000)
@@ -98,7 +98,7 @@ action = function(host, port)
local status = checkBadUser(host, port)
if ( status ) then
return "\nERROR: Cannot detect non-existing user accounts, this will result in:\n" ..
- " * Non-exisiting accounts being detected as found\n" ..
+ " * Non-existing accounts being detected as found\n" ..
" * Passwords for existing accounts being correctly detected\n\n" ..
"Supply the sip-brute.force argument to override"
end
diff --git a/scripts/sip-enum-users.nse b/scripts/sip-enum-users.nse
index 965e64f5f..516ff5abe 100644
--- a/scripts/sip-enum-users.nse
+++ b/scripts/sip-enum-users.nse
@@ -180,7 +180,7 @@ Driver = {
login = function( self, username, password)
-- We are using the "password" values instead of the "username" so we
- -- could benifit from brute.lua passonly option and setPasswordIterator
+ -- could benefit from brute.lua passonly option and setPasswordIterator
-- function, as we are doing usernames enumeration only and not
-- credentials brute forcing.
local status, response, responsecode
diff --git a/scripts/smb-brute.nse b/scripts/smb-brute.nse
index d690c0662..c32077a1b 100644
--- a/scripts/smb-brute.nse
+++ b/scripts/smb-brute.nse
@@ -49,7 +49,7 @@ to perform their checks.
The blank password is always tried first, followed by "special passwords" (such as the username
and the username reversed). Once those are exhausted, the unpwdb password list is used.
-One major goal of this script is to avoid accout lockouts. This is done in a few ways. First,
+One major goal of this script is to avoid account lockouts. This is done in a few ways. First,
when a lockout is detected, unless you user specifically overrides it with the smblockout
argument, the scan stops. Second, all usernames are checked with the most common passwords first,
so with not-too-strict lockouts (10 invalid attempts), the 10 most common passwords will still
@@ -468,7 +468,7 @@ local function convert_case(str, num)
end
---Attempts to determine the case of a password. This is done by trying every possible combination of upper and lowercase
--- characters in the password, in the most efficient possible ordering, until the corerct case is found.
+-- characters in the password, in the most efficient possible ordering, until the correct case is found.
--
-- A session has to be active when this function is called.
--
diff --git a/scripts/smb-check-vulns.nse b/scripts/smb-check-vulns.nse
index 3e98340f4..310219e36 100644
--- a/scripts/smb-check-vulns.nse
+++ b/scripts/smb-check-vulns.nse
@@ -53,7 +53,7 @@ This check WILL crash the service, if it's vulnerable, and requires a guest acco
or higher to work. It is considered unsafe.
SMBv2 DoS. Performs a denial-of-service against the vulnerability disclosed in
-CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista
+CVE-2009-3103. Checks if the server went offline. This works against Windows Vista
and some versions of Windows 7, and causes a bluescreen if successful. The
proof-of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used,
with one small change.
@@ -64,7 +64,7 @@ getting information from the Remote Access and Routing service. RASRPC can be
accessed using either "\ROUTER" SMB pipe or the "\SRVSVC" SMB pipe (usually on Windows XP machines).
This is in RPC world known as "ncan_np" RPC transport. RasRpcSumbitRequest()
method is a generic method which provides different functionalities according
-to the RequestBuffer structure and particulary the RegType field within that
+to the RequestBuffer structure and particularly the RegType field within that
structure. RegType field is of enum ReqTypes type. This enum type lists all
the different available operation that can be performed using the RasRpcSubmitRequest()
RPC method. The one particular operation that this vuln targets is the REQTYPE_GETDEVCONFIG
@@ -627,7 +627,7 @@ action = function(host)
end
end
- -- Check for SMBv2 vulnerablity
+ -- Check for SMBv2 vulnerability
status, result = check_smbv2_dos(host)
if(status == false) then
table.insert(response, get_response("SMBv2 DoS (CVE-2009-3103)", "ERROR", result, 0, 1))
diff --git a/scripts/smb-enum-shares.nse b/scripts/smb-enum-shares.nse
index d949082ba..00a7c8608 100644
--- a/scripts/smb-enum-shares.nse
+++ b/scripts/smb-enum-shares.nse
@@ -11,7 +11,7 @@ to those functions is denied, a list of common share names are checked.
Finding open shares is useful to a penetration tester because there may be private files
shared, or, if it's writable, it could be a good place to drop a Trojan or to infect a file
that's already there. Knowing where the share is could make those kinds of tests more useful,
-except that determiing where the share is requires administrative privileges already.
+except that determining where the share is requires administrative privileges already.
Running NetShareEnumAll will work anonymously against Windows 2000, and
requires a user-level account on any other Windows version. Calling NetShareGetInfo
diff --git a/scripts/smb-os-discovery.nse b/scripts/smb-os-discovery.nse
index 46d522900..db7054c2d 100644
--- a/scripts/smb-os-discovery.nse
+++ b/scripts/smb-os-discovery.nse
@@ -14,7 +14,7 @@ a difference); in response to a session starting, the server will send back all
information.
The following fields may be included in the output, depending on the
-cirumstances (e.g. the workgroup name is mutually exclusive with domain and forest
+circumstances (e.g. the workgroup name is mutually exclusive with domain and forest
names) and the information available:
* OS
* Computer name
diff --git a/scripts/smb-print-text.nse b/scripts/smb-print-text.nse
index 4d62c4bd7..011aeea27 100644
--- a/scripts/smb-print-text.nse
+++ b/scripts/smb-print-text.nse
@@ -12,7 +12,7 @@ In order to use the script, at least one printer needs to be shared
over SMB. If no printer is specified, script tries to enumerate existing
ones by calling LANMAN API which might not be always available.
LANMAN is available by default on Windows XP, but not on Vista or Windows 7
-for example. In that case, you need to specify printer share name manualy
+for example. In that case, you need to specify printer share name manually
using printer script argument. You can find out available shares
by using smb-enum-shares script.
@@ -101,7 +101,7 @@ action = function(host,port)
end
end
if not printer then
- stdnse.print_debug("No printer found, system may be unpached but it needs at least one printer shared to be vulnerable.")
+ stdnse.print_debug("No printer found, system may be unpatched but it needs at least one printer shared to be vulnerable.")
return false
end
stdnse.print_debug("Using %s as printer.",printer)
diff --git a/scripts/smb-psexec.nse b/scripts/smb-psexec.nse
index bb01ebdce..38eb77f74 100644
--- a/scripts/smb-psexec.nse
+++ b/scripts/smb-psexec.nse
@@ -886,7 +886,7 @@ local function get_config(host, config)
mod.name = mod.name or (string.format("%s %s", mod.program, mod.args or ""))
mod.maxtime = mod.maxtime or 1
- -- Check if they forgot the uploadbility
+ -- Check if they forgot the uploadibility
if(mod.upload == nil) then
enabled = false
mod.disabled_message = string.format("Configuration error: '%s': 'upload' field is required", mod.name)
diff --git a/scripts/smb-vuln-ms10-054.nse b/scripts/smb-vuln-ms10-054.nse
index 563a2de2c..0df61cd52 100644
--- a/scripts/smb-vuln-ms10-054.nse
+++ b/scripts/smb-vuln-ms10-054.nse
@@ -17,7 +17,7 @@ Either with guest credentials or with specified username/password.
---
-- @usage nmap -p 445 --script=smb-vuln-ms10-054 --script-args unsafe
--
--- @args unsafe Required to run the script, "safty swich" to prevent running it by accident
+-- @args unsafe Required to run the script, "safety swich" to prevent running it by accident
-- @args smb-vuln-ms10-054.share Share to connect to (defaults to SharedDocs)
-- @output
-- Host script results:
diff --git a/scripts/smb-vuln-ms10-061.nse b/scripts/smb-vuln-ms10-061.nse
index 681345ac5..f2f4cb8e7 100644
--- a/scripts/smb-vuln-ms10-061.nse
+++ b/scripts/smb-vuln-ms10-061.nse
@@ -133,7 +133,7 @@ aka "Print Spooler Service Impersonation Vulnerability."
end
end
if not printer then
- stdnse.print_debug("No printer found, system may be unpached but it needs at least one printer shared to be vulnerable.")
+ stdnse.print_debug("No printer found, system may be unpatched but it needs at least one printer shared to be vulnerable.")
return false
end
stdnse.print_debug("Using %s as printer.",printer)
@@ -162,7 +162,7 @@ aka "Print Spooler Service Impersonation Vulnerability."
if stdnse.tohex(write_result) == "00000000" then -- patched version would report 4 bytes written
ms10_061.state = vulns.STATE.VULN -- identified by diffing patched an unpatched version
end
- -- call abort_printer to stop the actuall printing in case the remote system is not vulnerable
+ -- call abort_printer to stop the actual printing in case the remote system is not vulnerable
-- we care about the environment and don't want to spend more paper then needed :)
status,result = msrpc.spoolss_abort_printer(smbstate,printer_handle)
diff --git a/scripts/smtp-enum-users.nse b/scripts/smtp-enum-users.nse
index 02cdb7556..9ab0f66b1 100644
--- a/scripts/smtp-enum-users.nse
+++ b/scripts/smtp-enum-users.nse
@@ -12,7 +12,7 @@ commands. The goal of this script is to discover all the user accounts in the re
system.
The script will output the list of user names that were found. The script will stop
-querying the SMTP server if authentication is enforced. If an error occurrs while testing
+querying the SMTP server if authentication is enforced. If an error occurs while testing
the target host, the error will be printed with the list of any combinations that were
found prior to the error.
@@ -65,7 +65,7 @@ STATUS_CODES = {
}
---Counts the number of occurrences in a table. Helper function
--- from LUA documentation http://lua-users.org/wiki/TableUtils.
+-- from Lua documentation http://lua-users.org/wiki/TableUtils.
--
-- @param from Source table
-- @param what What element to count
@@ -82,7 +82,7 @@ function table_count(from, what)
end
---Creates a new table from a source without the duplicates. Helper
--- function from LUA documentation http://lua-users.org/wiki/TableUtils.
+-- function from Lua documentation http://lua-users.org/wiki/TableUtils.
--
-- @param from Source table
-- @return New table without the duplicates
diff --git a/scripts/smtp-open-relay.nse b/scripts/smtp-open-relay.nse
index bd759232e..f2b288c48 100644
--- a/scripts/smtp-open-relay.nse
+++ b/scripts/smtp-open-relay.nse
@@ -18,7 +18,7 @@ hardcoded in the source file. The script will output all the working combination
server allows if nmap is in verbose mode otherwise the script will print the number of
successful tests. The script will not output if the server requires authentication.
-If debug is enabled and an error occurrs while testing the target host, the error will be
+If debug is enabled and an error occurs while testing the target host, the error will be
printed with the list of any combinations that were found prior to the error.
]]
diff --git a/scripts/smtp-vuln-cve2010-4344.nse b/scripts/smtp-vuln-cve2010-4344.nse
index 3667f735d..ff8ea4611 100644
--- a/scripts/smtp-vuln-cve2010-4344.nse
+++ b/scripts/smtp-vuln-cve2010-4344.nse
@@ -21,7 +21,7 @@ user to gain root privileges by specifying an alternate configuration
file using the -C option (CVE-2010-4345).
The smtp-vuln-cve2010-4344.exploit script argument will make
-the script try to exploit the vulnerabilties, by sending more than 50MB of
+the script try to exploit the vulnerabilities, by sending more than 50MB of
data, it depends on the message size limit configuration option of the
Exim server. If the exploit succeed the exploit.cmd or
smtp-vuln-cve2010-4344.cmd script arguments can be used to
@@ -155,11 +155,11 @@ local function escalate_privs(socket, smtp_opts)
return exploited, results
end
--- Tries to exploit the heap overflow and the priviled escalation
+-- Tries to exploit the heap overflow and the privilege escalation
-- Returns true, exploit_status, possible values:
-- nil Not vulnerable
-- "heap" Vulnerable to the heap overflow
--- "heap-exploited" The heap overflow vulenrability was exploited
+-- "heap-exploited" The heap overflow vulnerability was exploited
local function exploit_heap(socket, smtp_opts)
local exploited, ret = false, ""
diff --git a/scripts/smtp-vuln-cve2011-1764.nse b/scripts/smtp-vuln-cve2011-1764.nse
index d1b1d8032..0662b51be 100644
--- a/scripts/smtp-vuln-cve2011-1764.nse
+++ b/scripts/smtp-vuln-cve2011-1764.nse
@@ -80,7 +80,7 @@ local function get_exim_banner(response)
end
-- Sends the mail with the evil DKIM-Signatures header.
--- Returns true, true if the Exim server is vulnrable
+-- Returns true, true if the Exim server is vulnerable
local function check_dkim(socket, smtp_opts)
local killed = false
diff --git a/scripts/sniffer-detect.nse b/scripts/sniffer-detect.nse
index cfaa32963..d1beec564 100644
--- a/scripts/sniffer-detect.nse
+++ b/scripts/sniffer-detect.nse
@@ -74,7 +74,7 @@ do_test = function(dnet, pcap, host, test)
-- so that 1 would mean (0-10ms), 2=(10-40ms) and 3=(40ms-90ms)
-- but when we're running this tests on macs, first test is always 2.
-- which means that the first answer is dropped.
- -- for now, just return 1 if test was successfull, it's easier
+ -- for now, just return 1 if test was successful, it's easier
-- return(i)
return(1)
end
@@ -91,7 +91,7 @@ action = function(host)
['1_____1_'] = false, -- MacOSX(Tiger.Panther)/Linux/ ?Win98/ WinXP sp2(no pcap)
['1_______'] = false, -- Old Apple/SunOS/3Com
['1___1_1_'] = false, -- MacOSX(Tiger)
- ['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt )
+ ['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscuous openwrt )
['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below)
['111___1_'] = true, -- WinXP sp2 promisc
--['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed*
diff --git a/scripts/snmp-brute.nse b/scripts/snmp-brute.nse
index edc033d86..1c71d4a8a 100644
--- a/scripts/snmp-brute.nse
+++ b/scripts/snmp-brute.nse
@@ -27,7 +27,7 @@ this wordlist does not exist, the script falls back to
No output is reported if no valid account is found.
]]
--- 2008-07-03 Philip Pickering, basic verstion
+-- 2008-07-03 Philip Pickering, basic version
-- 2011-07-17 Gorjan Petrovski, Patrik Karlsson, optimization and creds
-- accounts, rejected use of the brute library because of
-- implementation using unconnected sockets.
@@ -180,7 +180,7 @@ local sniff_snmp_responses = function(host, port, lport, result)
-- last_run indicated whether there will be only one more receive
local last_run = false
- -- receive even when status=false untill all the probes are sent
+ -- receive even when status=false until all the probes are sent
while true do
local status, plen, l2, l3, _ = pcap:pcap_receive()
@@ -287,7 +287,7 @@ action = function(host, port)
-- return output
return tostring(c)
else
- stdnse.print_debug("An error occured: "..result.msg)
+ stdnse.print_debug("An error occurred: "..result.msg)
end
end
diff --git a/scripts/snmp-interfaces.nse b/scripts/snmp-interfaces.nse
index f945fb23c..3606b7e32 100644
--- a/scripts/snmp-interfaces.nse
+++ b/scripts/snmp-interfaces.nse
@@ -41,7 +41,7 @@ dependencies = {"snmp-brute"}
-- code borrowed heavily from Patrik Karlsson's excellent snmp scripts
-- Created 03/03/2010 - v0.1 - created by Thomas Buchanan
--- Revised 03/05/2010 - v0.2 - Reworked output slighty, moved iana_types to script scope. Suggested by David Fifield
+-- Revised 03/05/2010 - v0.2 - Reworked output slightly, moved iana_types to script scope. Suggested by David Fifield
-- Revised 04/11/2010 - v0.2 - moved snmp_walk to snmp library
-- Revised 08/10/2010 - v0.3 - prerule; add interface addresses to Nmap's target list (Kris Katterjohn)
-- Revised 05/27/2011 - v0.4 - action; add MAC addresses to nmap.registry[host.ip]["mac-geolocation"] (Gorjan Petrovski)
@@ -423,7 +423,7 @@ action = function(host, port)
socket:set_timeout(5000)
try(socket:connect(srvhost, srvport, "udp"))
- -- retreive network interface information from IF-MIB
+ -- retrieve network interface information from IF-MIB
status, interfaces = snmp.snmpWalk( socket, if_oid )
socket:close()
@@ -436,7 +436,7 @@ action = function(host, port)
-- build a table of network interfaces from the IF-MIB table
interfaces = process_interfaces( interfaces )
- -- retreive IP address information from IP-MIB
+ -- retrieve IP address information from IP-MIB
try(socket:connect(srvhost, srvport, "udp"))
status, ips = snmp.snmpWalk( socket, ip_oid )
diff --git a/scripts/snmp-ios-config.nse b/scripts/snmp-ios-config.nse
index 67b0f4b02..5708ab32b 100644
--- a/scripts/snmp-ios-config.nse
+++ b/scripts/snmp-ios-config.nse
@@ -89,7 +89,7 @@ action = function(host, port)
local status, tftpserver, _, _, _ = socket:get_info()
if( not(status) ) then
- return "ERROR: Failed to determin local ip"
+ return "ERROR: Failed to determine local ip"
end
-- build a SNMP v1 packet
diff --git a/scripts/snmp-processes.nse b/scripts/snmp-processes.nse
index 98aa1d7da..95e320019 100644
--- a/scripts/snmp-processes.nse
+++ b/scripts/snmp-processes.nse
@@ -38,7 +38,7 @@ dependencies = {"snmp-brute"}
-- Version 0.4
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
--- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist
+-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist
-- Revised 01/19/2010 - v0.3 - removed debugging output and renamed file
-- Revised 04/11/2010 - v0.4 - moved snmp_walk to snmp library
diff --git a/scripts/snmp-win32-services.nse b/scripts/snmp-win32-services.nse
index 22e2f6b65..d672ed1cb 100644
--- a/scripts/snmp-win32-services.nse
+++ b/scripts/snmp-win32-services.nse
@@ -32,7 +32,7 @@ dependencies = {"snmp-brute"}
-- Version 0.3
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
--- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist
+-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist
-- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library
diff --git a/scripts/snmp-win32-shares.nse b/scripts/snmp-win32-shares.nse
index dc66091e2..93784783f 100644
--- a/scripts/snmp-win32-shares.nse
+++ b/scripts/snmp-win32-shares.nse
@@ -25,7 +25,7 @@ dependencies = {"snmp-brute"}
-- Version 0.3
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
--- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist
+-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist
-- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library
diff --git a/scripts/snmp-win32-software.nse b/scripts/snmp-win32-software.nse
index e225ef843..3920bd9e4 100644
--- a/scripts/snmp-win32-software.nse
+++ b/scripts/snmp-win32-software.nse
@@ -27,7 +27,7 @@ dependencies = {"snmp-brute"}
-- Version 0.3
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
--- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist
+-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist
-- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library
diff --git a/scripts/snmp-win32-users.nse b/scripts/snmp-win32-users.nse
index f0a94c1d1..57d4a0e4a 100644
--- a/scripts/snmp-win32-users.nse
+++ b/scripts/snmp-win32-users.nse
@@ -29,7 +29,7 @@ dependencies = {"snmp-brute"}
-- Version 0.3
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson
--- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist
+-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist
-- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library
diff --git a/scripts/socks-brute.nse b/scripts/socks-brute.nse
index 9edc12fc8..1927cb39b 100644
--- a/scripts/socks-brute.nse
+++ b/scripts/socks-brute.nse
@@ -51,7 +51,7 @@ Driver = {
return false, brute.Error:new( "Login failed" )
end
- -- something else happend, let's retry
+ -- something else happened, let's retry
local err = brute.Error:new( err )
err:setRetry( true )
return false, err
diff --git a/scripts/targets-ipv6-multicast-slaac.nse b/scripts/targets-ipv6-multicast-slaac.nse
index 65cc23b23..8fbb92e65 100644
--- a/scripts/targets-ipv6-multicast-slaac.nse
+++ b/scripts/targets-ipv6-multicast-slaac.nse
@@ -58,7 +58,7 @@ end
--- Get a Unique-local Address with random global ID.
-- @param local_scope The scope of the address, local or reserved.
-- @return A 16-byte string of IPv6 address, and the length of the prefix.
-local function get_radom_ula_prefix(local_scope)
+local function get_random_ula_prefix(local_scope)
local ula_prefix
math.randomseed(os.time())
local global_id = string.char(math.random(256)-1,math.random(256)-1,math.random(256)-1,math.random(256)-1,math.random(256)-1)
@@ -145,7 +145,7 @@ local function single_interface_broadcast(if_nfo, results)
pcap:pcap_open(if_nfo.device, 128, true, "src ::0/128 and dst net ff02::1:0:0/96 and icmp6 and ip6[6:1] = 58 and ip6[40:1] = 135")
local actual_prefix = string.sub(src_ip6,1,8)
- local ula_prefix, prefix_len = get_radom_ula_prefix()
+ local ula_prefix, prefix_len = get_random_ula_prefix()
-- preferred_lifetime <= valid_lifetime.
-- Nmap will get the whole IPv6 addresses of each host if the two parameters are both longer than 5 seconds.
diff --git a/scripts/ventrilo-info.nse b/scripts/ventrilo-info.nse
index 5ed628d2f..e73f2c438 100644
--- a/scripts/ventrilo-info.nse
+++ b/scripts/ventrilo-info.nse
@@ -24,7 +24,7 @@ package since version 2.1.2 when the UDP status service was implemented.
When run as a version detection script (-sV), the script will report on the
server version, name, uptime, authentication scheme, and OS. When run
explicitly (--script ventrilo-info), the script will additionally report on the
-server name phonetic pronounciation string, the server comment, maximum number
+server name phonetic pronunciation string, the server comment, maximum number
of clients, voice codec, voice format, channel and client counts, and details
about channels and currently connected clients.
@@ -228,7 +228,7 @@ local crypt_crc = {
0x6e17,0x7e36,0x4e55,0x5e74,0x2e93,0x3eb2,0x0ed1,0x1ef0
}
--- The probe payload is static as it has proven to be unecessary to forge a new
+-- The probe payload is static as it has proven to be unnecessary to forge a new
-- one every time. The data used includes the following parameters:
-- cmd = 2, password = 0, header len = 20, data len = 16, totlen = 36
-- static 2 byte status request id (time(NULL) in the original protocol)
diff --git a/scripts/whois-domain.nse b/scripts/whois-domain.nse
index c57b1e06e..d1de4e92a 100644
--- a/scripts/whois-domain.nse
+++ b/scripts/whois-domain.nse
@@ -5,10 +5,10 @@ Attempts to retrieve information about the domain name of the target
---
-- @usage nmap --script whois-domain.nse
--
--- This script starts by quering the whois.iana.org (which is the root of the
+-- This script starts by querying the whois.iana.org (which is the root of the
-- whois servers). Using some patterns the script can determine if the response
--- represents a refferal to a record hosted elsewhere. If that's the case it will
--- query that refferal. The script keeps repeating this until the response don't
+-- represents a referral to a record hosted elsewhere. If that's the case it will
+-- query that referral. The script keeps repeating this until the response don't
-- match with any of the patterns, meaning that there are no other referrals and
-- prints the output.
--
diff --git a/scripts/whois-ip.nse b/scripts/whois-ip.nse
index 48062db6e..5a9a8c83f 100644
--- a/scripts/whois-ip.nse
+++ b/scripts/whois-ip.nse
@@ -976,7 +976,7 @@ end
-- @param db String id of the service from which the response was obtained.
-- @param ip String representing the Target's IP address.
-- @param meta Table, nmap.registry.whois.whoisdb[db] where db is either the service queried or a mirrored service.
--- @return String containing the most specific part of the response (or the entire response if only one inetneum object is present).
+-- @return String containing the most specific part of the response (or the entire response if only one inetnum object is present).
-- @return Number position of the start of the most specific part of the response.
-- @see smallest_range
@@ -1873,7 +1873,7 @@ function file_exists( file )
elseif err then
return false, err
else
- return false, ( "unforseen error while checking " .. file )
+ return false, ( "unforeseen error while checking " .. file )
end
end
diff --git a/scripts/wsdd-discover.nse b/scripts/wsdd-discover.nse
index 6c62c32c8..5b23363fb 100644
--- a/scripts/wsdd-discover.nse
+++ b/scripts/wsdd-discover.nse
@@ -38,7 +38,7 @@ categories = {"safe", "discovery", "default"}
portrule = shortport.portnumber(3702, "udp", {"open", "open|filtered"})
--- function used for running several discovery threads in parallell
+-- function used for running several discovery threads in parallel
--
-- @param funcname string containing the name of the function to run
-- the name should be one of the discovery functions in wsdd.Helper
diff --git a/scripts/xmpp-brute.nse b/scripts/xmpp-brute.nse
index fd493a2c8..e3d9647c9 100644
--- a/scripts/xmpp-brute.nse
+++ b/scripts/xmpp-brute.nse
@@ -114,7 +114,7 @@ action = function(host, port)
local mechs = helper:getAuthMechs()
if ( not(mechs) ) then
- return "\n ERROR: Failed to retreive authentication mechs from XMPP server"
+ return "\n ERROR: Failed to retrieve authentication mechs from XMPP server"
end
local mech_prio = stdnse.get_script_args("xmpp-brute.auth")
diff --git a/scripts/xmpp-info.nse b/scripts/xmpp-info.nse
index 98beb80f3..d2f50128d 100644
--- a/scripts/xmpp-info.nse
+++ b/scripts/xmpp-info.nse
@@ -88,14 +88,14 @@ local known_features = {
['ver'] = true
}
-local check_citadele = function(id1, id2)
+local check_citadel = function(id1, id2)
stdnse.print_debug("CHECK")
local i1 = tonumber(id1, 16)
local i2 = tonumber(id2, 16)
return i2 - i1 < 20 and i2 > i1
end
--- Be carefull while adding fingerprints into the table - it must be well sorted
+-- Be careful while adding fingerprints into the table - it must be well sorted
-- as some fingerprints are actually supersetted by another...
local id_database = {
{
@@ -113,8 +113,8 @@ local id_database = {
{
regexp1 = '^' .. string.rep('[0-9a-f]', 8) .. '$',
regexp2 = '^' .. string.rep('[0-9a-f]', 8) .. '$',
- name = 'Citidel',
- check = check_citadele
+ name = 'Citadel',
+ check = check_citadel
},
{