diff --git a/nselib/afp.lua b/nselib/afp.lua index 5ee74078e..7b559067b 100644 --- a/nselib/afp.lua +++ b/nselib/afp.lua @@ -57,7 +57,7 @@ -- -- -- The next step needed to be performed is to authenticate to the server. We need to do this even for --- functions that are available publically. In order to authenticate as the public user simply +-- functions that are available publicly. In order to authenticate as the public user simply -- authenticate using nil for both username and password. This can be achieved by calling the Login method -- without any parameters, like this: -- @@ -76,7 +76,7 @@ -- status, shares = helper:ListShares() -- -- --- Once we're finnished, we need to logout and close the AFP session this is done by calling the +-- Once we're finished, we need to logout and close the AFP session this is done by calling the -- following two methods of the Helper class: -- -- status, response = helper:Logout() @@ -107,7 +107,7 @@ -- Revised 03/05/2010 - v0.4 - changed output table of Helper:Dir to include type and ID -- - added support for --without-openssl -- --- Revised 03/09/2010 - v0.5 - documentation, documenation and more documentation +-- Revised 03/09/2010 - v0.5 - documentation, documentation and more documentation -- Revised 04/03/2011 - v0.6 - add support for getting file- sizes, dates and Unix ACLs -- - moved afp.username & afp.password arguments to library @@ -337,7 +337,7 @@ local ERROR_MSG = { [ERROR.FPBadUAM]="Specified UAM is unknown", [ERROR.FPBadVersNum]="Server does not support the specified AFP version", [ERROR.FPBitmapErr]="Attempt was made to get or set a parameter that cannot be obtained or set with this command, or a required bitmap is null", - [ERROR.FPCantMove]="Attempt was made to move a directory into one of its descendent directories.", + [ERROR.FPCantMove]="Attempt was made to move a directory into one of its descendant directories.", [ERROR.FPEOFErr]="No more matches or end of fork reached.", [ERROR.FPLockErr]="Some or all of the requested range is locked by another user; a lock range conflict exists.", [ERROR.FPMiscErr]="Non-AFP error occurred.", @@ -385,7 +385,7 @@ Response = { if self.error_msg then return self.error_msg else - return ERROR_MSG[self.error_code] or ("Unknown error (%d) occured"):format(self.error_code) + return ERROR_MSG[self.error_code] or ("Unknown error (%d) occurred"):format(self.error_code) end end, @@ -566,11 +566,11 @@ Proto = { -- -- @param src_vol number containing the ID of the src file volume -- @param srd_did number containing the directory id of the src file - -- @param src_path string containingt the file path/name of the src file + -- @param src_path string containing the file path/name of the src file -- @param dst_vol number containing the ID of the dst file volume -- @param dst_did number containing the id of the dest. directory -- @param dst_path string containing the dest path (can be nil or "") - -- @param new_name string containign the new name of the destination + -- @param new_name string containing the new name of the destination -- @return Response object fp_copy_file = function(self, src_vol, src_did, src_path, dst_vol, dst_did, dst_path, new_name ) local pad, data_offset = 0, 0 @@ -643,7 +643,7 @@ Proto = { offsets.directory_names_count, offsets.utf8_server_name = bin.unpack(">SSSS", packet.data, pos) - -- this sets up all the server flaqs in the response table as booleans + -- this sets up all the server flags in the response table as booleans result.flags.SuperClient = flag_is_set(result.flags.raw, SERVERFLAGS.SuperClient) result.flags.UUIDs = flag_is_set(result.flags.raw, SERVERFLAGS.UUIDs) result.flags.UTF8ServerName = flag_is_set(result.flags.raw, SERVERFLAGS.UTF8ServerName) @@ -848,7 +848,7 @@ Proto = { data = response:getPacketData() pos, parms.server_time, parms.vol_count = bin.unpack("IC", data) - -- we should now be at the leading zero preceeding the first volume name + -- we should now be at the leading zero preceding the first volume name -- next is the length of the volume name, move pos there pos = pos + 1 @@ -875,7 +875,7 @@ Proto = { -- o DHCAST128 -- -- The DHCAST128 UAM should work against most servers even though it's - -- superceeded by the DHX2 UAM. + -- superceded by the DHX2 UAM. -- -- @param afp_version string (AFP3.3|AFP3.2|AFP3.1) -- @param uam string containing authentication information @@ -1350,8 +1350,8 @@ Helper = { --- Connects to the remote server and establishes a new AFP session -- - -- @param host table as recieved by the action function of the script - -- @param port table as recieved by the action function of the script + -- @param host table as received by the action function of the script + -- @param port table as received by the action function of the script -- @return status boolean -- @return string containing error message (if status is false) OpenSession = function( self, host, port ) @@ -1386,7 +1386,7 @@ Helper = { return status, packet end, - --- Terminates the connection, withou closing the AFP session + --- Terminates the connection, without closing the AFP session -- -- @return status (always true) -- @return string (always "") @@ -1904,7 +1904,7 @@ Util = --- Converts a numeric acl to string -- - -- @param acls number containig acls as recieved from fp_get_file_dir_parms + -- @param acls number containing acls as received from fp_get_file_dir_parms -- @return table of long ACLs acls_to_long_string = function( acls ) @@ -2066,7 +2066,7 @@ Util = local offset, p, name pos, offset = bin.unpack(">S", data, pos) - -- TODO: This really needs to be adressed someway + -- TODO: This really needs to be addressed someway -- Barely, never, ever happens, which makes it difficult to pin down -- http://developer.apple.com/mac/library/documentation/Networking/Reference/ -- AFP_Reference/Reference/reference.html#//apple_ref/doc/uid/TP40003548-CH3-CHDBEHBG [URL is wrapped] diff --git a/nselib/ajp.lua b/nselib/ajp.lua index becd4c964..cd5d26a7e 100644 --- a/nselib/ajp.lua +++ b/nselib/ajp.lua @@ -286,7 +286,7 @@ Comm = { -- Sends a request to the server -- -- @param req instance of object that can be serialized with tostring - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return err string containing error message on failure send = function(self, req) return self.socket:send(tostring(req)) @@ -294,7 +294,7 @@ Comm = { -- Receives an AJP response from the server -- - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table containing the following fields, or string -- containing error message on failure -- status - status of response (see HTTP status codes) @@ -380,7 +380,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure request = function(self, method, url, headers, attributes, options) @@ -437,7 +437,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure get = function(self, url, headers, attributes, options) @@ -450,7 +450,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure head = function(self, url, headers, attributes, options) @@ -463,7 +463,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure trace = function(self, url, headers, attributes, options) @@ -476,7 +476,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure put = function(self, url, headers, attributes, options) @@ -489,7 +489,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure delete = function(self, url, headers, attributes, options) @@ -502,7 +502,7 @@ Helper = { -- @param headers table containing optional headers -- @param attributes table containing optional attributes -- @param options table with request specific options - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response table (@see Comm.receive), or string containing error -- message on failure options = function(self, url, headers, attributes, options) diff --git a/nselib/asn1.lua b/nselib/asn1.lua index 2dc7f0f22..a62589264 100644 --- a/nselib/asn1.lua +++ b/nselib/asn1.lua @@ -171,7 +171,7 @@ ASN1Decoder = { end, -- Decode one component of an OID from a byte string. 7 bits of the component - -- are stored in each octet, most significant first, with the eigth bit set in + -- are stored in each octet, most significant first, with the eighth bit set in -- all octets but the last. These encoding rules come from -- http://luca.ntop.org/Teaching/Appunti/asn1.html, section 5.9 OBJECT -- IDENTIFIER. @@ -324,7 +324,7 @@ ASN1Encoder = { registerBaseEncoders = function(self) self.encoder = {} - -- Bolean encoder + -- Boolean encoder self.encoder['boolean'] = function( self, val ) if val then return bin.pack('H','01 01 FF') @@ -362,7 +362,7 @@ ASN1Encoder = { end, -- Encode one component of an OID as a byte string. 7 bits of the component are - -- stored in each octet, most significant first, with the eigth bit set in all + -- stored in each octet, most significant first, with the eighth bit set in all -- octets but the last. These encoding rules come from -- http://luca.ntop.org/Teaching/Appunti/asn1.html, section 5.9 OBJECT -- IDENTIFIER. diff --git a/nselib/base32.lua b/nselib/base32.lua index dd4e9fd53..562cdd6c3 100644 --- a/nselib/base32.lua +++ b/nselib/base32.lua @@ -28,7 +28,7 @@ local b32standard = { 'Y', 'Z', '2', '3', '4', '5', '6', '7', } -local b32dcstandard = {} -- efficency +local b32dcstandard = {} -- efficiency b32dcstandard['A'] = '00000' b32dcstandard['B'] = '00001' b32dcstandard['C'] = '00010' @@ -69,7 +69,7 @@ local b32hexExtend = { 'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', } -local b32dchexExtend = {} -- efficency +local b32dchexExtend = {} -- efficiency b32dchexExtend['0'] = '00000' b32dchexExtend['1'] = '00001' b32dchexExtend['2'] = '00010' diff --git a/nselib/base64.lua b/nselib/base64.lua index 20601c428..25da8cc1a 100644 --- a/nselib/base64.lua +++ b/nselib/base64.lua @@ -26,7 +26,7 @@ local b64table = { '4', '5', '6', '7', '8', '9', '+', '/' } -local b64dctable = {} -- efficency +local b64dctable = {} -- efficiency b64dctable['A'] = '000000' b64dctable['B'] = '000001' b64dctable['C'] = '000010' diff --git a/nselib/bittorrent.lua b/nselib/bittorrent.lua index c9389ca62..2bf648514 100644 --- a/nselib/bittorrent.lua +++ b/nselib/bittorrent.lua @@ -410,7 +410,7 @@ end --- This thread sends a DHT find_node query to every node in -- pnt.nodes_find_node, after which every node is moved to pnt.nodes_get_peers -- to be processed by the get_peers_thread() function. The responses to these --- queries contain adresses of other DHT nodes (usually 8) which are added to +-- queries contain addresses of other DHT nodes (usually 8) which are added to -- the pnt.nodes_find_node list. This action is done for a timeout with a -- default value of 30 seconds. local find_node_thread = function(pnt, timeout) @@ -430,7 +430,7 @@ local find_node_thread = function(pnt, timeout) -- standard bittorrent protocol specified find_node query with y = q (query), -- q = "find_node" (type of query), - -- find_node Query = {"t":, "y":"q", "q":"find_node", "a": {"id":, "target":}} + -- find_node Query = {"t":, "y":"q", "q":"find_node", "a": {"id":, "target":}} local find_node_query = "d1:ad2:id20:" .. pnt.node_id .. "6:target20:" .. pnt.info_hash .. "e1:q9:find_node1:t2:" .. openssl.rand_bytes(2) .. "1:y1:qe" @@ -1173,7 +1173,7 @@ Torrent = -- the action in the response has to be 0 too if not r_action == "00000000" then - return false, "Wrong action field, usualy caused by an erroneous request" + return false, "Wrong action field, usually caused by an erroneous request" end -- established a connection, and now for an announce message, to which a diff --git a/nselib/bjnp.lua b/nselib/bjnp.lua index f9a0ac2a8..a7f76e876 100644 --- a/nselib/bjnp.lua +++ b/nselib/bjnp.lua @@ -284,7 +284,7 @@ Helper = { -- @return attribs table containing device attributes when status is true -- errmsg string containing the error message when status is false getDeviceIdentity = function(self, devtype) - -- Were currenlty only decoding this as I don't know what the other cruft is + -- Were currently only decoding this as I don't know what the other cruft is local attrib_names = { ["scanner"] = { { ['MFG'] = "Manufacturer" }, diff --git a/nselib/brute.lua b/nselib/brute.lua index 5265fa6a9..bb4235564 100644 --- a/nselib/brute.lua +++ b/nselib/brute.lua @@ -2,7 +2,7 @@ -- The brute library is an attempt to create a common framework for performing -- password guessing against remote services. -- --- The library currently attempts to parallellize the guessing by starting +-- The library currently attempts to parallelize the guessing by starting -- a number of working threads. The number of threads can be defined using -- the brute.threads argument, it defaults to 10. -- @@ -73,7 +73,7 @@ -- The connect method provides the framework with the ability to -- ensure that the thread can run once it has been dispatched a set of -- credentials. As the sockets in NSE are limited we want to limit the risk of --- a thread blocking, due to insufficient free sockets, after it has aquired a +-- a thread blocking, due to insufficient free sockets, after it has acquired a -- username and password pair. -- -- The following sample code illustrates how to implement a sample @@ -141,7 +141,7 @@ -- @args brute.passonly iterate over passwords only for services that provide -- only a password for authentication. (default: false) -- @args brute.retries the number of times to retry if recoverable failures --- occure. (default: 3) +-- occur. (default: 3) -- @args brute.delay the number of seconds to wait between guesses (default: 0) -- @args brute.threads the number of initial worker threads, the number of -- active threads will be automatically adjusted. @@ -214,7 +214,7 @@ _ENV = stdnse.module("brute", stdnse.seeall) -- * mode - can be set to either cred, user or pass and controls -- whether the engine should iterate over users, passwords -- or fetch a list of credentials from a single file. --- (can be set using script-arg brut.mode) +-- (can be set using script-arg brute.mode) -- * title - changes the title of the result table where the -- passwords are returned. -- * nostore - don't store the results in the credential library @@ -502,7 +502,7 @@ Engine = local driver = self.driver:new( self.host, self.port, self.driver_options ) status = driver:connect() - -- Did we succesfully connect? + -- Did we successfully connect? if ( status ) then if ( not(username) and not(password) ) then repeat @@ -545,7 +545,7 @@ Engine = retries = retries - 1 -- End if: - -- * The guess was successfull + -- * The guess was successful -- * The response was not set to retry -- * We've reached the maximum retry attempts until( status or ( response and not( response:isRetry() ) ) or retries == 0) @@ -621,7 +621,7 @@ Engine = stdnse.print_debug(2, "threads=%d,tps=%d", self:activeThreads(), tps ) end - -- if delay was speciefied, do sleep + -- if delay was specified, do sleep if ( self.options.delay > 0 ) then stdnse.sleep( self.options.delay ) end end condvar "signal" @@ -775,7 +775,7 @@ Engine = result = ( #result ) and stdnse.format_output( true, result ) or "" - -- Did any error occure? If so add this to the result. + -- Did any error occur? If so add this to the result. if ( self.error ) then result = result .. (" \n ERROR: %s"):format( self.error ) return false, result diff --git a/nselib/cassandra.lua b/nselib/cassandra.lua index 1c612c874..a08d35005 100644 --- a/nselib/cassandra.lua +++ b/nselib/cassandra.lua @@ -102,7 +102,7 @@ function sendcmd (socket, command, cnt) response = response .. resp2 end - -- magic response starts at 5th byte for 4 bytes, 4 byte for length + length of string commmand + -- magic response starts at 5th byte for 4 bytes, 4 byte for length + length of string command if (string.sub(response,5,8+4+string.len(command)) ~= CASSANDRARESP..pack4str(command)) then return false, "protocol response error" end diff --git a/nselib/creds.lua b/nselib/creds.lua index bffb32a4e..fc6078a0e 100644 --- a/nselib/creds.lua +++ b/nselib/creds.lua @@ -72,7 +72,7 @@ -- -- -- Supported output formats are CSV, verbose and plain. In both verbose and plain --- records are seperated by colons. The difference between the two is that verbose +-- records are separated by colons. The difference between the two is that verbose -- includes the credential state. The file extension is automatically added to -- the filename based on the type requested. -- diff --git a/nselib/dhcp.lua b/nselib/dhcp.lua index 37a9f1f86..e6df6cbec 100644 --- a/nselib/dhcp.lua +++ b/nselib/dhcp.lua @@ -11,7 +11,7 @@ -- 2011-12-28 - Revised by Patrik Karlsson -- o Split dhcp_send into dhcp_send, dhcp_receive -- o Added basic support for adding options to requests --- o Added possibility to ovverride transaction id +-- o Added possibility to override transaction id -- o Added WPAD action local bin = require "bin" diff --git a/nselib/dhcp6.lua b/nselib/dhcp6.lua index ac7e9cd8e..6c94faa43 100644 --- a/nselib/dhcp6.lua +++ b/nselib/dhcp6.lua @@ -581,7 +581,7 @@ Helper = { self.__index = self local info, err = nmap.get_interface_info(iface) - -- if we faile to get interface info, don't return a helper + -- if we fail to get interface info, don't return a helper -- this is true on OS X for interfaces like: p2p0 and vboxnet0 if ( not(info) and err ) then return @@ -593,7 +593,7 @@ Helper = { return o end, - -- Sends a DHCP6 Solicit message to the server, essentiall requesting a new + -- Sends a DHCP6 Solicit message to the server, essentially requesting a new -- IPv6 non-temporary address -- @return table of results suitable for use with -- stdnse.format_output diff --git a/nselib/dns.lua b/nselib/dns.lua index fbafdabfc..de47e3026 100644 --- a/nselib/dns.lua +++ b/nselib/dns.lua @@ -167,7 +167,7 @@ local function sendPacketsTCP(data, host, port, timeout) end --- --- Call appropriate protocol handeler +-- Call appropriate protocol handler -- @param data Data to be sent. -- @param host Host to connect to. -- @param port Port to connect to. @@ -682,7 +682,7 @@ additionalFetcher[types.TXT] = function(dec, retAll) if not retAll and dec.add[1].data then return true, string.sub(dec.add[1].data, 2) elseif not retAll then - stdnse.print_debug(1, "dns.aditionalFetcher found no records of the required type: TXT") + stdnse.print_debug(1, "dns.additionalFetcher found no records of the required type: TXT") return false, "No Answers" else for _, v in ipairs(dec.add) do @@ -1413,7 +1413,7 @@ local function encodeOPT_Z(flags) end --- --- Adds an client-subnet paylod to the OPT packet +-- Adds an client-subnet payload to the OPT packet -- implementing http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00 -- @param pkt Table representing DNS packet. -- @param Z Table of Z flags. Only DO is supported. @@ -1431,7 +1431,7 @@ function addClientSubnet(pkt,Z,subnet) end --- --- Adds an NSID paylod to the OPT packet +-- Adds an NSID payload to the OPT packet -- @param pkt Table representing DNS packet. -- @param Z Table of Z flags. Only DO is supported. function addNSID (pkt,Z) diff --git a/nselib/dnsbl.lua b/nselib/dnsbl.lua index 833ca4291..9668f2099 100644 --- a/nselib/dnsbl.lua +++ b/nselib/dnsbl.lua @@ -102,7 +102,7 @@ SERVICES = { local rev_ip = dns.reverse(self.ip):match("^(.*)%.in%-addr%.arpa$") return ("%s.spam.dnsbl.sorbs.net"):format(rev_ip) end, - -- This function parses the response and supports borth long and + -- This function parses the response and supports both long and -- short mode. resp_parser = function(self, r) local responses = { @@ -384,7 +384,7 @@ SERVICES = { local octet1, octet2, octet3, octet4 = table.unpack(parts) if ( octet1 ~= 127 ) then - -- This should'nt happen :P + -- This shouldn't happen :P stdnse.print_debug( "The request made to dnsbl.httpbl.org was considered invalid (%i)", octet1) diff --git a/nselib/dnssd.lua b/nselib/dnssd.lua index 3376b5a5e..375ba8ada 100644 --- a/nselib/dnssd.lua +++ b/nselib/dnssd.lua @@ -3,7 +3,7 @@ -- The library supports -- * Unicast and Multicast requests -- * Decoding responses --- * Running requests in parallell using Lua coroutines +-- * Running requests in parallel using Lua coroutines -- -- The library contains the following classes -- * Comm @@ -14,15 +14,15 @@ -- * Util -- ** The Util class contains a number of static functions mainly used to convert data. -- --- The following code snipplet queries all mDNS resolvers on the network for a --- full list of their supported services and returns the formated output: +-- The following code snippet queries all mDNS resolvers on the network for a +-- full list of their supported services and returns the formatted output: -- -- local helper = dnssd.Helper:new( ) -- helper:setMulticast(true) -- return stdnse.format_output(helper:queryServices()) -- -- --- This next snipplet queries a specific host for the same information: +-- This next snippet queries a specific host for the same information: -- -- local helper = dnssd.Helper:new( host, port ) -- return stdnse.format_output(helper:queryServices()) @@ -86,7 +86,7 @@ Util = { local services = {} -- Create unique table of services for _, r in ipairs( response ) do - -- do we really have mutliple responses? + -- do we really have multiple responses? if ( not(r.output) ) then return end for _, svc in ipairs(r.output ) do services[svc] = services[svc] or {} @@ -116,7 +116,7 @@ Util = { return services end, - --- Returns the amount of currenlty active threads + --- Returns the amount of currently active threads -- -- @param threads table containing the list of threads -- @return count number containing the number of non-dead threads diff --git a/nselib/drda.lua b/nselib/drda.lua index f9ebee571..867d5e1eb 100644 --- a/nselib/drda.lua +++ b/nselib/drda.lua @@ -634,9 +634,9 @@ Helper = { -- At this point we have a few differences in behaviour -- * DB2 has told us earlier if the DB does not exist -- * Apache Derby will do so here, regardless of the login was - -- successfull or not + -- successful or not -- * Informix will tell us that the DB does not exist IF the - -- login was successfull + -- login was successful -- -- Therefore the order of these checks are important!! if ( packet:getDRDAByCodePoint( CodePoint.ACCRDBRM ) ) then @@ -778,7 +778,7 @@ StringUtil = -- -- @param str string to pad -- @param chr char to pad with - -- @param len the total length of the finnished string + -- @param len the total length of the finished string -- @return str string containing the padded string padWithChar = function( str, chr, len ) if ( len < #str ) then diff --git a/nselib/eigrp.lua b/nselib/eigrp.lua index 6014933f5..f5c6bd284 100644 --- a/nselib/eigrp.lua +++ b/nselib/eigrp.lua @@ -88,7 +88,7 @@ EIGRP = { return o end, - --- Parses a raw eigrp packet and returns a structred response. + --- Parses a raw eigrp packet and returns a structured response. -- @param eigrp_raw string EIGRP Raw packet. -- @return response table Structured eigrp packet. parse = function(eigrp_raw) diff --git a/nselib/giop.lua b/nselib/giop.lua index 0dacc2107..17ece68dd 100644 --- a/nselib/giop.lua +++ b/nselib/giop.lua @@ -95,8 +95,8 @@ Packet.GIOP = { --- Creates a Packet.GIOP -- - -- @param msgtype number containing the messaget type - -- @param data string conatining the message data + -- @param msgtype number containing the message type + -- @param data string containing the message data -- @return obj a new Packet.GIOP instance new = function( self, msgtype, data ) local o = {} @@ -422,7 +422,7 @@ MessageDecoder = { --- Decodes a get response -- - -- @param packet the GIOP packet as recieved by the comm + -- @param packet the GIOP packet as received by the comm -- exchGIOPPacket function -- @return status true on success, false on failure -- @return table containing ip and ctx @@ -445,7 +445,7 @@ MessageDecoder = { --- Decodes a _is_a response (not implemented) -- - -- @param packet the GIOP packet as recieved by the comm + -- @param packet the GIOP packet as received by the comm -- exchGIOPPacket function -- @return status, always true ["_is_a"] = function( packet ) @@ -454,7 +454,7 @@ MessageDecoder = { --- Decodes a list response -- - -- @param packet the GIOP packet as recieved by the comm + -- @param packet the GIOP packet as received by the comm -- exchGIOPPacket function -- @return status true on success, false on failure -- @return table containing id, kind and @@ -509,7 +509,7 @@ Comm = { return o end, - --- Sends and recieves a GIOP packet + --- Sends and receives a GIOP packet -- -- @param packet containing a Packet.* object, the object must -- implement the __tostring meta method diff --git a/nselib/gps.lua b/nselib/gps.lua index b47005178..68c17b8a1 100644 --- a/nselib/gps.lua +++ b/nselib/gps.lua @@ -72,7 +72,7 @@ NMEA = { return true end, - -- Parses a GPS sentence using the apropriate parser + -- Parses a GPS sentence using the appropriate parser -- -- @param str containing the GPS sentence -- @return entry table containing the parsed response or diff --git a/nselib/http.lua b/nselib/http.lua index 88d16dfc5..1169c2818 100644 --- a/nselib/http.lua +++ b/nselib/http.lua @@ -620,7 +620,7 @@ local function recv_body(s, response, method, partial) end -- 4. If the message uses the media type "multipart/byteranges", and the - -- ransfer-length is not otherwise specified, then this self- elimiting + -- transfer-length is not otherwise specified, then this self-delimiting -- media type defines the transfer-length. [sic] -- Case 4 is unhandled. @@ -998,7 +998,7 @@ local function lookup_cache (method, host, port, path, options) end local function response_is_cacheable(response) - -- if response.status is nil, then an error must have occured during the request + -- if response.status is nil, then an error must have occurred during the request -- and we probably don't want to cache the response if not response.status then return false @@ -1444,7 +1444,7 @@ local function get_redirect_ok(host, port, options) end ---Fetches a resource with a GET request and returns the result as a table. This is a simple --- wraper around generic_request, with the added benefit of having local caching +-- wrapper around generic_request, with the added benefit of having local caching -- and support for HTTP redirects. Redirects are followed only if they pass all the -- validation rules of the redirect_ok function. This function may be overridden by supplying -- a custom function in the redirect_ok field of the options array. The default @@ -1621,7 +1621,7 @@ end -- -- @param path The path to retrieve. -- @param options [optional] A table that lets the caller control socket timeouts, HTTP headers, and other parameters. For full documentation, see the module documentation (above). --- @param all_requests [optional] The current pipeline queue (retunred from a previous add_pipeline call), or nil if it's the first call. +-- @param all_requests [optional] The current pipeline queue (returned from a previous add_pipeline call), or nil if it's the first call. -- @param method [optional] The HTTP method ('GET', 'HEAD', 'POST', etc). Default: 'GET'. -- @return Table with the pipeline get requests (plus this new one) -- @see http.pipeline_go diff --git a/nselib/httpspider.lua b/nselib/httpspider.lua index 79e0c4331..08b439d2d 100644 --- a/nselib/httpspider.lua +++ b/nselib/httpspider.lua @@ -41,16 +41,16 @@ -- For advanced use, the library currently supports a number of closures (withinhost, -- withindomain, doscraping). Please note, that withinhost and withindomain options also -- support boolean values. You will want to override them only for advanced use. You can --- define them using the following ultities: +-- define them using the following utilities: -- -- * iswithinhost --- ** You can use this ultity to check if the resource exists within the host. +-- ** You can use this utility to check if the resource exists within the host. -- -- * iswithindomain --- ** You can use this ultity to check if the resource exists within the domain. +-- ** You can use this utility to check if the resource exists within the domain. -- -- * isresource --- ** You can use this ultity to check the type of the resource (for example "js"). +-- ** You can use this utility to check the type of the resource (for example "js"). -- ** A third option may hold a number of signs that may exist after the extension -- ** of the resource. By default, these are [#, ?]. For example, if we want to return -- only php resources, the function will also return example.php?query=foo or @@ -506,7 +506,7 @@ UrlQueue = { return o end, - -- get's the next available url in the queue + -- gets the next available url in the queue getNext = function(self) return table.remove(self.urls,1) end, @@ -548,7 +548,7 @@ Crawler = { removewww = function(url) return string.gsub(url, "^www%.", "") end, - -- An ultity when defining closures. Checks if the resource exists within host. + -- An utility when defining closures. Checks if the resource exists within host. -- @param u URL that points to the resource we want to check. iswithinhost = function(self, u) local parsed_u = url.parse(tostring(u)) @@ -565,7 +565,7 @@ Crawler = { return true end, - -- An ultity when defining closures. Checks if the resource exists within domain. + -- An utility when defining closures. Checks if the resource exists within domain. -- @param u URL that points to the resource we want to check. iswithindomain = function(self, u) local parsed_u = url.parse(tostring(u)) @@ -581,7 +581,7 @@ Crawler = { return true end, - -- An ultity when defining closures. Checks the type of the resource. + -- An utility when defining closures. Checks the type of the resource. -- @param u URL that points to the resource we want to check. -- @param ext the extension of the resource. -- @param signs table of signs that may exist after the extension of the resource. @@ -663,12 +663,12 @@ Crawler = { o.options.timeout = o.options.timeout or 10000 o.processed = {} - -- script arguments have precedense + -- script arguments have precedence if ( not(o.options.maxdepth) ) then o.options.maxdepth = tonumber(stdnse.get_script_args("httpspider.maxdepth")) end - -- script arguments have precedense + -- script arguments have precedence if ( not(o.options.maxpagecount) ) then o.options.maxpagecount = tonumber(stdnse.get_script_args("httpspider.maxpagecount")) end @@ -678,7 +678,7 @@ Crawler = { end if ( o.options.useheadfornonwebfiles ) then - -- Load web files extensitons from a file in nselib/data folder. + -- Load web files extensions from a file in nselib/data folder. -- For more information on individual file formats, see -- http://en.wikipedia.org/wiki/List_of_file_formats. o.web_files_extensions = {} diff --git a/nselib/iax2.lua b/nselib/iax2.lua index 4f8f2f273..f42ec63d1 100644 --- a/nselib/iax2.lua +++ b/nselib/iax2.lua @@ -269,7 +269,7 @@ Helper = { end, -- Request a session release - -- @param username string containing the extention (username) + -- @param username string containing the extension (username) -- @param password string containing the password regRelease = function(self, username, password) diff --git a/nselib/ike.lua b/nselib/ike.lua index b916b0ae9..05bca7ac4 100644 --- a/nselib/ike.lua +++ b/nselib/ike.lua @@ -11,7 +11,7 @@ local io = require "io" description = [[ A very basic IKE library. -The current funcionality includes: +The current functionality includes: 1. Generating a Main or Aggressive Mode IKE request packet with a variable amount of transforms and a vpn group. 2. Sending a packet 3. Receiving the response @@ -271,7 +271,7 @@ local function lookup(vendor_ids) if row.category == 'vid_ordering' and all_vids:find(row.fingerprint) then - -- Use ordering information if there where no vendor matches from prevoius step + -- Use ordering information if there where no vendor matches from previous step if info.vendor == nil then info.vendor = row @@ -489,7 +489,7 @@ end -- Generate multiple transforms --- Input nust be a table of complete transforms +-- Input must be a table of complete transforms -- local function generate_transforms(transform_table) local transforms = '' @@ -504,7 +504,7 @@ end -- Create a request packet -- Support for multiple transforms, which minimizes the --- the amount of traffic/packets needed to be sendt +-- the amount of traffic/packets needed to be sent -- function request(port, proto, mode, transforms, diffie, id) local payload_after_sa, str_aggressive, l, l_sa, l_pro diff --git a/nselib/imap.lua b/nselib/imap.lua index 37f3fbbee..bd869def9 100644 --- a/nselib/imap.lua +++ b/nselib/imap.lua @@ -8,7 +8,7 @@ -- interface for script writers, and the IMAP class providing -- all protocol-level functionality. -- --- The following example illustrates the reommended use of the library: +-- The following example illustrates the recommended use of the library: -- -- local helper = imap.Helper:new(host, port) -- helper:connect() @@ -130,7 +130,7 @@ IMAP = { status, data = self.socket:send("TlRMTVNTUAABAAAAB7IIogYABgA3AAAADwAPACgAAAAFASgKAAAAD0FCVVNFLUFJUi5MT0NBTERPTUFJTg==\r\n") if ( not(status) ) then return false, "ERROR: Failed to send NTLM packet" end status, data = self:receive() - if ( not(status) ) then return false, "ERROR: Failed to receieve NTLM challenge" end + if ( not(status) ) then return false, "ERROR: Failed to receive NTLM challenge" end end if ( data:match(("^A%04d "):format(self.counter-1)) ) then @@ -245,7 +245,7 @@ Helper = { return self.client:connect() end, - --- Login to the server using eithe plain-text or using the authentication + --- Login to the server using either plain-text or using the authentication -- mechanism provided in the mech argument. -- -- @param username string containing the username diff --git a/nselib/informix.lua b/nselib/informix.lua index b06bba005..0605fb835 100644 --- a/nselib/informix.lua +++ b/nselib/informix.lua @@ -372,7 +372,7 @@ MessageDecoders = { _, len = bin.unpack(">S", data ) -- For some *@#! reason the SQ_DONE packet sometimes contains an - -- length exeeding the length of the packet by one. Attempt to + -- length exceeding the length of the packet by one. Attempt to -- detect this and fix. status, data = socket:receive_buf(match.numbytes(len), true) _, tmp = bin.unpack(">S", data, len - 2) @@ -471,7 +471,7 @@ MessageDecoders = { -- -- @param socket already connected to the Informix database server -- @param info table containing the following fields: - -- metadata as recieved from SQ_DESCRIBE + -- metadata as received from SQ_DESCRIBE -- rows containing already retrieved rows -- id containing the statement id as sent to SQ_ID -- @return status true on success, false on failure @@ -1026,7 +1026,7 @@ Packet.Connect = { pos, tmp = bin.unpack(">S", data, pos) if ( 108 ~= tmp ) then - return false, "Connect recieved unexpected response" + return false, "Connect received unexpected response" end pos = pos + 12 @@ -1058,7 +1058,7 @@ Packet.Connect = { pos, tmp = bin.unpack(">S", data, pos) if ( tmp ~= 102 ) then - return false, "Connect recieved unexpected response" + return false, "Connect received unexpected response" end pos = pos + 6 @@ -1066,7 +1066,7 @@ Packet.Connect = { pos, self.oserror = bin.unpack(">s", data, pos ) if ( self.svcerror ~= 0 ) then - self.errmsg = Constants.ErrorMsg[self.svcerror] or ("Unknown error %d occured"):format( self.svcerror ) + self.errmsg = Constants.ErrorMsg[self.svcerror] or ("Unknown error %d occurred"):format( self.svcerror ) end return true @@ -1204,7 +1204,7 @@ Helper = { --- Attempts to login to the Informix database server -- The optional parameters parameter takes any informix specific parameters - -- used to connect to the database. In case it's ommited a set of default + -- used to connect to the database. In case it's omitted a set of default -- parameters are set. Parameters should be past as key, value pairs inside -- of a table array as the following example: -- diff --git a/nselib/ipp.lua b/nselib/ipp.lua index 296f6f190..b6b6047d3 100644 --- a/nselib/ipp.lua +++ b/nselib/ipp.lua @@ -398,7 +398,7 @@ Helper = { for _, ag in ipairs(response:getAttributeGroups(IPP.Attribute.IPP_TAG_JOB)) do local uri = ag:getAttributeValue("printer-uri") local printer = uri:match(".*/(.*)$") or "Unknown" - -- some jobs have mutlitple state attributes, so far the ENUM ones have been correct + -- some jobs have multiple state attributes, so far the ENUM ones have been correct local state = ag:getAttributeValue("job-state", IPP.Attribute.IPP_TAG_ENUM) or ag:getAttributeValue("job-state") -- some jobs have multiple id tag, so far the INTEGER type have shown the correct ID local id = ag:getAttributeValue("job-id", IPP.Attribute.IPP_TAG_INTEGER) or ag:getAttributeValue("job-id") diff --git a/nselib/isns.lua b/nselib/isns.lua index 00fb12fc0..0e018c1ce 100644 --- a/nselib/isns.lua +++ b/nselib/isns.lua @@ -261,7 +261,7 @@ Request = { -- @param func_id number containing the function ID of the message -- @param flags number containing the message flags -- @param data string containing the opaque raw data - -- @param auth string containing the opaqur raw auth data + -- @param auth string containing the opaque raw auth data -- @param trans_id number containing the transaction id -- @param seq_id number containing the sequence id -- @return o new instance of Request @@ -452,7 +452,7 @@ Helper = { -- -- Lists portals -- @return status true on success, false on failure - -- @return resulst list of iSCSI nodes, err string on failure + -- @return results list of iSCSI nodes, err string on failure listPortals = function(self) local attribs, name = Attributes:new(), "iqn.control.node\0por" @@ -510,7 +510,7 @@ Helper = { -- -- Lists iSCSI nodes -- @return status true on success, false on failure - -- @return resulst list of iSCSI nodes, err string on failure + -- @return results list of iSCSI nodes, err string on failure listISCINodes = function(self) local attribs = Attributes:new() local name = "iqn.control.node\0por" diff --git a/nselib/jdwp.lua b/nselib/jdwp.lua index d880b0a83..2542b95c4 100644 --- a/nselib/jdwp.lua +++ b/nselib/jdwp.lua @@ -1,14 +1,14 @@ --- JDWP (Java Debug Wire Protocol) library implementing a set of commands needed to -- use remote debugging port and inject java bytecode. -- --- There are two basic packet types in JDWP protool. +-- There are two basic packet types in JDWP protocol. -- Command packet and reply packet. Command packets are sent by -- a debugger to a remote port which replies with a reply packet. -- -- Simple handshake is needed to start the communication. -- The debugger sends a "JDWP-Handshake" string and gets the same as a reply. -- Each (command and reply packet) has an id field since communication can be asynchronous. --- Packet id can be monothonicaly increasing. +-- Packet id can be monotonicaly increasing. -- Although communication can be asynchronous, it is not (at least in my tests) so the same -- packet id can be used for all communication. -- @@ -128,13 +128,13 @@ JDWPCommandPacket = { end, -- Packs command packet as a string od bytes, ready to be sent - -- to the target debugee. + -- to the target debuggee. pack = function(self) local packed_packet if self.data == nil then - packed_packet = bin.pack(">I",11) -- lenght - minimal header is 11 bytes + packed_packet = bin.pack(">I",11) -- length - minimal header is 11 bytes else - packed_packet = bin.pack(">I",11 + #self.data) -- lenght with data + packed_packet = bin.pack(">I",11 + #self.data) -- length with data end packed_packet = packed_packet .. bin.pack(">I",self.id) packed_packet = packed_packet .. bin.pack(">C",0) -- flag @@ -182,7 +182,7 @@ JDWPReplyPacket = { } ---- Negotiates the initial debugger-debugee handshake. +--- Negotiates the initial debugger-debuggee handshake. -- --@param host Host to connect to. --@param port Port to connect to. @@ -217,14 +217,14 @@ end --- Helper function to pack regular string into UTF-8 string. -- --@param data String to pack into UTF-8. ---@return utf8_string UTF-8 packed string. Four bytes lenght followed by the string its self. +--@return utf8_string UTF-8 packed string. Four bytes length followed by the string its self. function toUTF8(data) local utf8_string = bin.pack(">i",#data) .. data return utf8_string end --- Helper function to read all Reply packed data which might be fragmented --- over multipe packets. +-- over multiple packets. -- --@param socket Socket to receive from. --@return (status,data) If status is false, error string is returned, else data contains read ReplyPacket bytes. @@ -238,7 +238,7 @@ function receive_all(socket) while expected_length > #data do -- read until we get all the ReplyPacket data status,result = socket:receive() if not status then - return true, data -- if somethign is wrong,return partial data + return true, data -- if something is wrong, return partial data end data = data .. result end @@ -251,7 +251,7 @@ end -- --@param data Data from which to extract the string. --@param pos Offset into data string where to begin. ---@return (pos,ascii_string) Returns position where the string extraction ended and actuall ascii string. +--@return (pos,ascii_string) Returns position where the string extraction ended and actual ascii string. local function extract_string(data,pos) local string_size if pos > #data then @@ -281,7 +281,7 @@ function executeCommand(socket,command) if not status then return false, reply_packet end - if not (reply_packet.error_code == 0) then -- we have a packet with error , error code 0 means no error occured + if not (reply_packet.error_code == 0) then -- we have a packet with error , error code 0 means no error occurred return false, ERROR_CODES[reply_packet.error_code] end local data = reply_packet.data @@ -289,7 +289,7 @@ function executeCommand(socket,command) end --- VirtualMachine Command Set (1) --- Commands targeted at the debugggee virtual machine. +-- Commands targeted at the debuggee virtual machine. -- http://docs.oracle.com/javase/1.5.0/docs/guide/jpda/jdwp/jdwp-protocol.html#JDWP_VirtualMachine @@ -297,7 +297,7 @@ end -- Returns the JDWP version implemented by the target VM as a table. -- -- Returns a table with following values: --- * 'description' Debugge vm verbose description. +-- * 'description' Debugger vm verbose description. -- * 'jdwpMajor' Number representing major JDWP version. -- * 'jdwpMinor' Number representing minor JDWP version. -- * 'vmVersion' String representing version of the debuggee VM. @@ -376,7 +376,7 @@ end -- --@param socket Socket to use to send the command. --@param id Packet id. ---@return (status, threads) If status is false threads contains an error string, else it conatins a list of all threads in the debuggee VM. +--@return (status, threads) If status is false threads contains an error string, else it contains a list of all threads in the debuggee VM. function getAllThreads(socket,id) local command = JDWPCommandPacket:new(id,1,4,nil) local status, data = executeCommand(socket,command) @@ -567,7 +567,7 @@ end --@numberOfArguments Number of method arguments. --@arguments Already packed arguments. --@options Invocation options. ---@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manualy. +--@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manually. function invokeStaticMethod(socket,id,classID,methodID,numberOfArguments,arguments,options) local params if numberOfArguments == 0 then @@ -685,7 +685,7 @@ end --@param methodID ID of the method to invoke. --@param numberOfArguments Number of method arguments. --@arguments Already packed arguments. ---@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manualy. +--@return (status, data) If status is false data contains an error string, else it contains a reply data and needs to be parsed manually. function invokeObjectMethod(socket,id,objectID,threadID,classID,methodID,numberOfArguments,arguments) local params @@ -922,7 +922,7 @@ end -- -- Returns a table containing following fields: -- * 'id' Injected class reference ID. --- * 'instance' Inected calss' instance reference ID. +-- * 'instance' Injected calss' instance reference ID. -- * 'thread' Thread in which the class was injected and instantiated. -- -- @param socket Socket to use for communication. @@ -944,7 +944,7 @@ function injectClass(socket,class_bytes) end end if byteArrayID == nil then - stdnse.print_debug("finding byte arrray id failed") + stdnse.print_debug("finding byte array id failed") return false end stdnse.print_debug("Found byte[] id %d",byteArrayID) diff --git a/nselib/json.lua b/nselib/json.lua index 88607b163..fa8c88ab2 100644 --- a/nselib/json.lua +++ b/nselib/json.lua @@ -21,7 +21,7 @@ -- Heavily modified 02/22/2010 - v0.3. Rewrote the parser into an OO-form, to not have to handle -- all kinds of state with parameters and return values. -- Modified 02/27/2010 - v0.4 Added unicode handling (written by David Fifield). Renamed toJson --- and fromJson intogenerate() and parse(), implemented more proper numeric parsing and added some more error checking. +-- and fromJson into generate() and parse(), implemented more proper numeric parsing and added some more error checking. local bit = require "bit" local nmap = require "nmap" @@ -404,7 +404,7 @@ function Json:parseUnicodeEscape() end -- Encode a Unicode code point to UTF-8. See RFC 3629. --- Does not check that cp is a real charaacter; that is, doesn't exclude the +-- Does not check that cp is a real character; that is, doesn't exclude the -- surrogate range U+D800 - U+DFFF and a handful of others. local function utf8_enc(cp) local bytes = {} diff --git a/nselib/ldap.lua b/nselib/ldap.lua index 3102d2940..132589475 100644 --- a/nselib/ldap.lua +++ b/nselib/ldap.lua @@ -29,7 +29,7 @@ _ENV = stdnse.module("ldap", stdnse.seeall) local ldapMessageId = 1 ERROR_MSG = {} -ERROR_MSG[1] = "Intialization of LDAP library failed." +ERROR_MSG[1] = "Initialization of LDAP library failed." ERROR_MSG[4] = "Size limit exceeded." ERROR_MSG[13] = "Confidentiality required" ERROR_MSG[32] = "No such object" @@ -367,7 +367,7 @@ function bindRequest( socket, params ) response.protocolOp = asn1.intToBER( tmp ) if response.protocolOp.number ~= APPNO.BindResponse then - return false, string.format("Recieved incorrect Op in packet: %d, expected %d", response.protocolOp.number, APPNO.BindResponse) + return false, string.format("Received incorrect Op in packet: %d, expected %d", response.protocolOp.number, APPNO.BindResponse) end pos, response.resultCode = decode( packet, pos ) @@ -378,7 +378,7 @@ function bindRequest( socket, params ) pos, response.errorMessage = decode( packet, pos ) error_msg = ERROR_MSG[response.resultCode] return false, string.format("\n Error: %s\n Details: %s", - error_msg or "Unknown error occured (code: " .. response.resultCode .. + error_msg or "Unknown error occurred (code: " .. response.resultCode .. ")", response.errorMessage or "" ) else return true, "Success" @@ -643,7 +643,7 @@ function searchResultToFile( searchEntries, filename ) end end - -- write the new, fully populuated table out to CSV + -- write the new, fully populated table out to CSV -- initialize header row local output = "\"name\"" @@ -710,7 +710,7 @@ function convertADTimeStamp(timestamp) if (timestamp and timestamp > 0) then -- The result value was 3036 seconds off what Microsoft says it should be. - -- I have been unable to find an explaination for this, and have resorted to + -- I have been unable to find an explanation for this, and have resorted to -- manually adjusting the formula. result = ( timestamp / 10000000 ) - 3036 @@ -728,7 +728,7 @@ end -- For example 20110904003302.0Z becomes 2001/09/04 00:33:02 UTC -- -- --- @param timestamp in Zulu format without seperators +-- @param timestamp in Zulu format without separators -- @return string containing human readable form function convertZuluTimeStamp(timestamp) diff --git a/nselib/match.lua b/nselib/match.lua index ab1a70d13..d039d7c18 100644 --- a/nselib/match.lua +++ b/nselib/match.lua @@ -9,7 +9,7 @@ local pcre = require "pcre" local stdnse = require "stdnse" _ENV = stdnse.module("match", stdnse.seeall) ---various functions for use with nse's nsock:receive_buf - function +--various functions for use with NSE's nsock:receive_buf - function -- e.g. -- sock:receive_buf(regex("myregexpattern"), true) - does a match using pcre diff --git a/nselib/membase.lua b/nselib/membase.lua index 33170c47b..5664d6c9b 100644 --- a/nselib/membase.lua +++ b/nselib/membase.lua @@ -97,7 +97,7 @@ TAP = { -- Creates a new instance of the request -- @param username string containing the username -- @param password string containing the password - -- @param mech string containing the SASL mechanism, currently suppored: + -- @param mech string containing the SASL mechanism, currently supported: -- PLAIN - plain-text authentication -- @return o instance of request new = function(self, username, password, mech) @@ -315,7 +315,7 @@ Helper = { -- @param password string containing the password -- @param mech string containing the SASL mechanism to use -- @return status true on success, false on failure - -- @return respons string containing "Auth failure" on failure + -- @return response string containing "Auth failure" on failure login = function(self, username, password, mech) mech = mech or self.mech or "PLAIN" local status, response = self:exch(TAP.Request.Authenticate:new(username, password, mech)) diff --git a/nselib/mobileme.lua b/nselib/mobileme.lua index ed43b4266..20311ccf1 100644 --- a/nselib/mobileme.lua +++ b/nselib/mobileme.lua @@ -46,7 +46,7 @@ MobileMe = { -- Sends a message to an iOS device -- @param devid string containing the device id to which the message should -- be sent - -- @param subject string containing the messsage subject + -- @param subject string containing the message subject -- @param message string containing the message body -- @param alarm boolean true if alarm should be sounded, false if not -- @return status true on success, false on failure @@ -116,7 +116,7 @@ MobileMe = { if ( response.status == 401 ) then return false, "Authentication failed" elseif ( response.status ~= 200 and response.status ~= 330 ) then - return false, "An unexpected error occured" + return false, "An unexpected error occurred" end retries = retries - 1 @@ -229,7 +229,7 @@ Helper = { -- -- @param devid string containing the device id to which the message should -- be sent - -- @param subject string containing the messsage subject + -- @param subject string containing the message subject -- @param message string containing the message body -- @param alarm boolean true if alarm should be sounded, false if not -- @return status true on success, false on failure diff --git a/nselib/mongodb.lua b/nselib/mongodb.lua index d98c21c11..1a8178345 100644 --- a/nselib/mongodb.lua +++ b/nselib/mongodb.lua @@ -325,7 +325,7 @@ Standard message header : struct { int32 messageLength; // total size of the message, including the 4 bytes of length int32 requestID; // client or database-generated identifier for this message - int32 responseTo; // requestID from the original request (used in reponses from db) + int32 responseTo; // requestID from the original request (used in responses from db) int32 opCode; // request type - see table below } @@ -573,7 +573,7 @@ function query(socket, data) data = data .. try( socket:receive() ) isComplete, pSize = isPacketComplete(data) end - -- All required data shold be read now + -- All required data should be read now local packetData = data:sub(1,pSize) local residualData = data:sub(pSize+1) local responseHeader = parseResponseHeader(packetData) @@ -629,8 +629,8 @@ function login(socket, db, username, password) end ---- Converts a quert result as received from MongoDB query into nmap "result" table --- @param resultTable table as returned from a quer +--- Converts a query result as received from MongoDB query into nmap "result" table +-- @param resultTable table as returned from a query -- @return table suitable for stdnse.format_output function queryResultToTable( resultTable ) diff --git a/nselib/msrpc.lua b/nselib/msrpc.lua index 8dc42c715..36ef66eaf 100644 --- a/nselib/msrpc.lua +++ b/nselib/msrpc.lua @@ -130,7 +130,7 @@ local LSA_GROUPSIZE = 20 -- up. Raising this could find more users, but at the expense of more packets. local LSA_MINEMPTY = 10 ----Mapping between well known MSRPC UUIDs and coresponding exe/service +---Mapping between well known MSRPC UUIDs and corresponding exe/service local UUID2EXE = { ["1ff70682-0a51-30e8-076d-740be8cee98b"] = "mstask.exe atsvc interface (Scheduler service)", ["3faf4738-3a21-4307-b46c-fdda9bb8c0d5"] = "AudioSrv AudioSrv interface (Windows Audio service)", @@ -279,13 +279,13 @@ function bind(smbstate, interface_uuid, interface_version, transfer_syntax) parameters = result['parameters'] data = result['data'] - -- Extract the first part from the resposne + -- Extract the first part from the response pos, result['version_major'], result['version_minor'], result['packet_type'], result['packet_flags'], result['data_representation'], result['frag_length'], result['auth_length'], result['call_id'] = bin.unpack("IIwinreg_openhku provides a useable key, for example. +--@param handle A handle to hive or key. winreg_openhku provides a usable key, for example. --@param index The index of the key to return. Generally you'll start at 0 and increment until -- an error is returned. --@param name The name buffer. This should be set to the empty string; however, setting to 'nil' can have @@ -2647,7 +2647,7 @@ end --- Calls the function OpenKey, which obtains a handle to a named key. -- --@param smbstate The SMB state table ---@param handle A handle to hive or key. winreg_openhku provides a useable key, for example. +--@param handle A handle to hive or key. winreg_openhku provides a usable key, for example. --@param keyname The name of the key to open. --@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most -- useful one being 'handle', which is a handle to the newly opened key. @@ -4059,7 +4059,7 @@ function get_user_list(host) return true, response, names end ----Retrieve information about a domain. This is done by three seperate calls to samr_querydomaininfo2() to get all +---Retrieve information about a domain. This is done by three separate calls to samr_querydomaininfo2() to get all -- possible information. smbstate has to be in the proper state for this to work. local function get_domain_info(host, domain) local result = {} @@ -4649,7 +4649,7 @@ function get_server_stats(host) stats['bytessent'] = bit.bor(bit.lshift(stats['bytessent_high'], 32), stats['bytessent_low']) stats['bytesrcvd'] = bit.bor(bit.lshift(stats['bytesrcvd_high'], 32), stats['bytesrcvd_low']) - -- Sidestep divide-by-zero errors (probabyl won't come up, but I'd rather be safe) + -- Sidestep divide-by-zero errors (probably won't come up, but I'd rather be safe) if(stats['period'] == 0) then stats['period'] = 1 end @@ -4687,7 +4687,7 @@ function enum_shares(host) return false, bind_result end - -- Call netsharenumall + -- Call netshareenumall status, netshareenumall_result = srvsvc_netshareenumall(smbstate, host.ip) if(status == false) then smb.stop(smbstate) diff --git a/nselib/msrpcperformance.lua b/nselib/msrpcperformance.lua index 17021a4cc..31409ca31 100644 --- a/nselib/msrpcperformance.lua +++ b/nselib/msrpcperformance.lua @@ -344,7 +344,7 @@ end -- // for each instance. -- // -- // If (PERF_DATA_BLOCK.NumInstances < 0) then the counter definition --- // strucutre above will be followed by only a PERF_COUNTER_BLOCK and the +-- // structure above will be followed by only a PERF_COUNTER_BLOCK and the -- // counter data for that COUNTER. -- typedef struct _PERF_INSTANCE_DEFINITION { -- DWORD ByteLength; // Length in bytes of this structure, diff --git a/nselib/msrpctypes.lua b/nselib/msrpctypes.lua index 2d752424d..b230cb637 100644 --- a/nselib/msrpctypes.lua +++ b/nselib/msrpctypes.lua @@ -16,9 +16,9 @@ -- Strings are a little bit trickier. A string is preceded by three 32-bit values: the max length, the offset, and -- the length. Additionally, strings may or may not be null terminated, depending on where they're being used. For -- more information on strings, see the comments on marshall_unicode. The functions marshall_unicode --- and unmarshall_unicode can be used to mashall/unmarshall strings. +-- and unmarshall_unicode can be used to marshall/unmarshall strings. -- --- Pointers also have interesting properties. A pointer is preceeded by a 4-byte value called (at least by Wireshark) +-- Pointers also have interesting properties. A pointer is preceded by a 4-byte value called (at least by Wireshark) -- the "referent id". For a valid pointer, this can be anything except 0 (I use 'NMAP' for it). If it's '0', then -- it's a null pointer and the data doesn't actually follow. To help clarify, a pointer to the integer '4' could be -- marshalled as the hex string 78 56 34 12 04 00 00 00 (the referent_id is 0x12345678 and the integer @@ -33,7 +33,7 @@ -- -- So far, this is fairly straight forward. Arrays are where everything falls apart. -- --- An array of basic types is simply the types themselves, preceeded by the "max length" of the array (which can be +-- An array of basic types is simply the types themselves, preceded by the "max length" of the array (which can be -- longer than the actual length). When pointers are used in an array, however, things get hairy. The 'referent_id's -- of the pointers are all put at the start of the array, along with the base types. Then, the data is put at the -- end of the array, for all the referent_ids that aren't null. Let's say you have four strings, "abc", "def", null, and @@ -83,12 +83,12 @@ -- function the same way unmarshall_array would. This is a bit of a kludge, but it's the best I could come up -- with. -- --- There are different sections in here, which correspond to "families" of types. I modelled these after Samba's .idl files. +-- There are different sections in here, which correspond to "families" of types. I modeled these after Samba's .idl files. -- MISC corresponds to misc.idl, LSA to lsa.idl, etc. Each of these sections has possible dependencies; for example, SAMR -- functions use LSA strings, and everything uses SECURITY and MISC. So the order is important -- dependencies have to go -- above the module. -- --- The datatypes used here are modelled after the datatypes used by Microsoft's functions. Each function that represents +-- The datatypes used here are modeled after the datatypes used by Microsoft's functions. Each function that represents -- a struct will have the struct definition in its comment; and that struct (or the closest representation to it) will be -- returned. Often, this requires scripts to access something like result['names']['names'][0]['name'], which is -- rather unwieldy, but I decided that following Microsoft's definitions was the most usable way for many reasons. I find @@ -148,7 +148,7 @@ function string_to_unicode(string, do_null) result = result .. string.sub(string, i, i) .. string.char(0) end - -- Add a null, if the caller requestd it + -- Add a null, if the caller requested it if(do_null == true) then result = result .. string.char(0) .. string.char(0) end @@ -230,7 +230,7 @@ end -- When marshalling the body, the function func is called, which is passed as -- a parameter, with the arguments args. This function has to return a marshalled -- parameter, but other than that it can be any marshalling function. The 'value' parameter --- simply determined whether or not it's a null pointer, and will probably be a repease of +-- simply determined whether or not it's a null pointer, and will probably be a repeat of -- one of the arguments. -- -- Note that the function func doesn't have to conform to any special prototype, @@ -572,7 +572,7 @@ function marshall_unicode(str, do_null, max_length) return result end ---- Marshall a null-teriminated ascii string, with the length/maxlength prepended. Very similar +--- Marshall a null-terminated ascii string, with the length/maxlength prepended. Very similar -- to marshall_unicode, except it's ascii and the null terminator is always used. -- --@param str The string to marshall. @@ -1154,7 +1154,7 @@ function marshall_NTTIME(time) return result end ----Unmarshalles an NTTIME. See marshall_NTTIME for more information. +---Unmarshalls an NTTIME. See marshall_NTTIME for more information. -- --@param data The data packet. --@param pos The position within the data. @@ -1190,7 +1190,7 @@ function marshall_NTTIME_ptr(time) return result end ----Unmarshalles an NTTIME*. +---Unmarshalls an NTTIME*. -- --@param data The data packet. --@param pos The position within the data. @@ -1935,7 +1935,7 @@ end --@param sid_type The sid_type value (I don't know what this means) --@param rid The rid (a number representing the user) --@param sid_index The sid_index value (I don't know what this means, either) ---@param unknown An unknown value (is normaly 0). +--@param unknown An unknown value (is normally 0). --@return A string representing the marshalled data. local function marshall_lsa_TranslatedSid2(location, sid_type, rid, sid_index, unknown) local result = "" @@ -2760,7 +2760,7 @@ function unmarshall_winreg_StringBuf_ptr(data, pos) end ---- A winreg_String has the same makup as a winreg_StringBuf, as far as I can tell, so delegate to that function. +--- A winreg_String has the same makeup as a winreg_StringBuf, as far as I can tell, so delegate to that function. -- --@param table The table representing the String. --@param max_length [optional] The maximum size of the buffer, in characters. Defaults to the length of the string, including the null. @@ -2775,7 +2775,7 @@ function marshall_winreg_String(table, max_length) return result end ----Unmarshall a winreg_String. Since ti has the same makup as winreg_StringBuf, delegate to that. +---Unmarshall a winreg_String. Since it has the same makeup as winreg_StringBuf, delegate to that. -- --@param data The data buffer. --@param pos The position in the data buffer. @@ -4499,19 +4499,19 @@ local atsvc_DaysOfMonth = Fifth = 0x00000010, Sixth = 0x00000020, Seventh = 0x00000040, - Eight = 0x00000080, + Eighth = 0x00000080, Ninth = 0x00000100, Tenth = 0x00000200, Eleventh = 0x00000400, Twelfth = 0x00000800, - Thitteenth = 0x00001000, + Thirteenth = 0x00001000, Fourteenth = 0x00002000, Fifteenth = 0x00004000, Sixteenth = 0x00008000, Seventeenth = 0x00010000, Eighteenth = 0x00020000, Ninteenth = 0x00040000, - Twentyth = 0x00080000, + Twentieth = 0x00080000, Twentyfirst = 0x00100000, Twentysecond = 0x00200000, Twentythird = 0x00400000, diff --git a/nselib/mssql.lua b/nselib/mssql.lua index 1369d6275..e4d9bbb26 100644 --- a/nselib/mssql.lua +++ b/nselib/mssql.lua @@ -50,11 +50,11 @@ -- -- -- Known limitations: --- * The library does not support SSL. The foremost reason being the akward choice of implementation where the SSL handshake is performed within the TDS data block. By default, servers support connections over non SSL connections though. +-- * The library does not support SSL. The foremost reason being the awkward choice of implementation where the SSL handshake is performed within the TDS data block. By default, servers support connections over non SSL connections though. -- * Version 7 and ONLY version 7 of the protocol is supported. This should cover Microsoft SQL Server 7.0 and later. -- * TDS Responses contain one or more response tokens which are parsed based on their type. The supported tokens are listed in the TokenType table and their respective parsers can be found in the Token class. Note that some token parsers are not fully implemented and simply move the offset the right number of bytes to continue processing of the response. -- * The library only supports a limited subsets of datatypes and will abort execution and return an error if it detects an unsupported type. The supported data types are listed in the DataTypes table. In order to add additional data types a parser function has to be added to both the ColumnInfo and ColumnData class. --- * No functionality for languages, localization or characted codepages has been considered or implemented. +-- * No functionality for languages, localization or character codepages has been considered or implemented. -- * The library does database authentication only. No OS authentication or use of the integrated security model is supported. -- * Queries using SELECT, INSERT, DELETE and EXEC of procedures have been tested while developing scripts. -- @@ -78,7 +78,7 @@ -- @args mssql.instance-port The port of the instance to connect to. -- -- @args mssql.instance-all Targets all SQL server instances discovered --- throught the browser service. +-- through the browser service. -- -- @args mssql.domain The domain against which to perform integrated -- authentication. When set, the scripts assume integrated authentication @@ -267,9 +267,9 @@ SqlServerVersionInfo = minor = nil, -- The minor version (e.g. 0) build = nil, -- The build number (e.g. 2047) subBuild = nil, -- The sub-build number (e.g. 0) - productName = nil, -- The prodcut name (e.g. "SQL Server 2005") + productName = nil, -- The product name (e.g. "SQL Server 2005") brandedVersion = nil, -- The branded version of the product (e.g. "2005") - servicePackLevel = nil, -- The service pack leve (e.g. "SP1") + servicePackLevel = nil, -- The service pack level (e.g. "SP1") patched = nil, -- Whether patches have been applied since SP installation (true/false/nil) source = nil, -- The source of the version info (e.g. "SSRP", "SSNetLib") @@ -513,7 +513,7 @@ SSRP = --- Parses an SSRP string and returns a table containing one or more -- SqlServerInstanceInfo objects created from the parsed string. _ParseSsrpString = function( host, ssrpString ) - -- It would seem easier to just capture (.-;;) repeateadly, since + -- It would seem easier to just capture (.-;;) repeatedly, since -- each instance ends with ";;", but ";;" can also occur within the -- data, signifying an empty field (e.g. "...bv;;@COMPNAME;;tcp;1433;;..."). -- So, instead, we'll split up the string ahead of time. @@ -743,7 +743,7 @@ for i, v in pairs(LoginErrorType) do LoginErrorMessage[v] = i end --- "static" ColumInfo parser class +-- "static" ColumnInfo parser class ColumnInfo = { @@ -879,7 +879,7 @@ ColumnInfo = } --- "static" ColumData parser class +-- "static" ColumnData parser class ColumnData = { Parse = { @@ -1326,7 +1326,7 @@ Token = return pos, token end, - --- Parses a DoneProc token recieved after executing a SP + --- Parses a DoneProc token received after executing a SP -- -- @param data string containing "raw" data -- @param pos number containing offset into data @@ -1341,7 +1341,7 @@ Token = end, - --- Parses a DoneInProc token recieved after executing a SP + --- Parses a DoneInProc token received after executing a SP -- -- @param data string containing "raw" data -- @param pos number containing offset into data @@ -1834,7 +1834,7 @@ LoginPacket = -- offset to auth info data = data .. bin.pack("stdnse.output_result -- - -- @param tbl as recieved by Helper.Query + -- @param tbl as received by Helper.Query -- @param with_headers boolean true if output should contain column headers -- @return table suitable for stdnse.output_result FormatOutputTable = function ( tbl, with_headers ) diff --git a/nselib/mysql.lua b/nselib/mysql.lua index 1c56740dc..cc92bb98b 100644 --- a/nselib/mysql.lua +++ b/nselib/mysql.lua @@ -19,7 +19,7 @@ _ENV = stdnse.module("mysql", stdnse.seeall) -- -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson -- Revised 01/23/2010 - v0.2 - added query support, cleanup, documentation --- Revised 08/24/2010 - v0.3 - added error handling for recieveGreeting +-- Revised 08/24/2010 - v0.3 - added error handling for receiveGreeting -- fixed a number of incorrect receives and changed -- them to receive_bytes instead. @@ -97,7 +97,7 @@ local function decodeHeader( data, pos ) return pos, response end ---- Recieves the server greeting upon intial connection +--- Receives the server greeting upon initial connection -- -- @param socket already connected to the remote server -- @return status true on success, false on failure @@ -188,7 +188,7 @@ end -- currently only post41 authentication is supported -- @param username string containing the username of the user that is authenticating -- @param password string containing the users password or nil if empty --- @param salt string containing the servers salt as recieved from receiveGreeting +-- @param salt string containing the servers salt as received from receiveGreeting -- @return status boolean -- @return response table or error message on failure function loginRequest( socket, params, username, password, salt ) @@ -489,7 +489,7 @@ end -- @param socket socket already connected to mysql -- @param query string containing the sql query -- @return status true on success, false on failure --- @return rows table containing row tabels as decoded by decodeDataPackets +-- @return rows table containing row tables as decoded by decodeDataPackets function sqlQuery( socket, query ) local catch = function() socket:close() stdnse.print_debug("sqlQuery(): failed") end @@ -548,7 +548,7 @@ end -- @param rs table as returned from sqlQuery -- @param options table containing additional options, currently: -- - noheaders - does not include column names in result --- @return string containing the formated resultset table +-- @return string containing the formatted resultset table function formatResultset(rs, options) options = options or {} if ( not(rs) or not(rs.cols) or not(rs.rows) ) then diff --git a/nselib/ncp.lua b/nselib/ncp.lua index dc12b4808..cb610c012 100644 --- a/nselib/ncp.lua +++ b/nselib/ncp.lua @@ -26,7 +26,7 @@ -- server. -- -- * Helper --- - The prefered script interface to the library containing functions +-- - The preferred script interface to the library containing functions -- that wrap functions from the NCP class using more descriptive names -- and easier interface. -- diff --git a/nselib/ndmp.lua b/nselib/ndmp.lua index c7911cd58..e079f7ec8 100644 --- a/nselib/ndmp.lua +++ b/nselib/ndmp.lua @@ -278,7 +278,7 @@ Comm = { -- Creates new Comm instance -- @param host table as received by the action method - -- @param port table as receuved by the action method + -- @param port table as received by the action method -- @return o new instance of Comm new = function(self, host, port) local o = { diff --git a/nselib/nmap.luadoc b/nselib/nmap.luadoc index 509fe7149..d7cf6ad35 100644 --- a/nselib/nmap.luadoc +++ b/nselib/nmap.luadoc @@ -713,7 +713,7 @@ function pcap_close() -- -- It also has the following member functions: -- --- * digest(algorithm) returns the digest of the certificate using the given digest algorithm, which is any of the strings returned by openssl.supported_digests, typicaly something like "md5" or "sha1". +-- * digest(algorithm) returns the digest of the certificate using the given digest algorithm, which is any of the strings returned by openssl.supported_digests, typically something like "md5" or "sha1". -- -- The "subject" and "issuer" fields hold each -- distinguished name. Fields with an unknown OID are represented as an array diff --git a/nselib/nrpc.lua b/nselib/nrpc.lua index bfe2f91a0..9f0fccdcf 100644 --- a/nselib/nrpc.lua +++ b/nselib/nrpc.lua @@ -82,8 +82,8 @@ Helper = { --- Creates a new Helper instance -- - -- @param host table as recieved by the script action method - -- @param port table as recieved by the script action method + -- @param host table as received by the script action method + -- @param port table as received by the script action method new = function(self, host, port) local o = {} setmetatable(o, self) diff --git a/nselib/openssl.luadoc b/nselib/openssl.luadoc index bf2558ac7..c6c0f0d6a 100644 --- a/nselib/openssl.luadoc +++ b/nselib/openssl.luadoc @@ -85,7 +85,7 @@ function bignum_rand(bits) --- Returns a pseudorandom bignum. -- @param bits Size of the returned bignum in bits. --- @return Pseudoandom bignum. +-- @return Pseudorandom bignum. function bignum_pseudo_rand(bits) --- Returns the bignum which is the result of a^p mod diff --git a/nselib/packet.lua b/nselib/packet.lua index 7d926dbb9..ed96694a5 100644 --- a/nselib/packet.lua +++ b/nselib/packet.lua @@ -110,7 +110,7 @@ function in_cksum(b) sum = bit.rshift(sum, 16) + bit.band(sum, 0xffff) sum = sum + bit.rshift(sum, 16) sum = bit.bnot(sum) - sum = bit.band(sum, 0xffff) -- trunctate to 16 bits + sum = bit.band(sum, 0xffff) -- truncate to 16 bits return sum end @@ -361,7 +361,7 @@ end -- @param mac_src six-byte string of source MAC address. -- @param mac_dst sis-byte string of destination MAC address. -- @param ip_bin_src 16-byte string of source IPv6 address. --- @param ip_bin_dst 16-byte string of destinatiion IPv6 address. +-- @param ip_bin_dst 16-byte string of destination IPv6 address. -- @param id integer that represents Echo ID. -- @param sequence integer that represents Echo sequence. -- @param data string of Echo data. @@ -453,7 +453,7 @@ end -- @param mac_src six-byte string of source MAC address. -- @param mac_dst sis-byte string of destination MAC address. -- @param ip_bin_src 16-byte string of source IPv6 address. --- @param ip_bin_dst 16-byte string of destinatiion IPv6 address. +-- @param ip_bin_dst 16-byte string of destination IPv6 address. -- @param id integer that represents Echo ID. -- @param seq integer that represents Echo sequence. -- @param data string of Echo data. @@ -505,7 +505,7 @@ function ip6tobin(str) local dot_count = stdnse.strsplit("%.", str) if #dot_count == 4 then -- It might be IPv4-compatible IPv6 address. local ip64 = stdnse.strsplit(":", str) - local ip4_str = ip64[#ip64] -- Get the embeded IPv4 address string. + local ip4_str = ip64[#ip64] -- Get the embedded IPv4 address string. ip4_bin = iptobin(ip4_str) if not ip4_bin then return nil @@ -626,7 +626,7 @@ function Packet:u32(index) end --- Return part of the packet contents as a byte string. -- @param index The beginning of the part of the packet to extract. The index --- is 0-based. If omitted the default value is 0 (begining of the string) +-- is 0-based. If omitted the default value is 0 (beginning of the string) -- @param length The length of the part of the packet to extract. If omitted -- the remaining contents from index to the end of the string are returned. -- @return A string. diff --git a/nselib/pgsql.lua b/nselib/pgsql.lua index dd5696ea7..d9d6e1647 100644 --- a/nselib/pgsql.lua +++ b/nselib/pgsql.lua @@ -22,7 +22,7 @@ _ENV = stdnse.module("pgsql", stdnse.seeall) -- Version 0.3 -- Created 02/05/2010 - v0.1 - created by Patrik Karlsson --- Revised 02/20/2010 - v0.2 - added detectVersion to automaticaly detect and return +-- Revised 02/20/2010 - v0.2 - added detectVersion to automatically detect and return -- the correct version class -- Revised 03/04/2010 - v0.3 - added support for trust authentication method @@ -68,7 +68,7 @@ v2 = --- Decodes an Auth Request packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding, -1 on error @@ -100,7 +100,7 @@ v2 = --- Decodes an Error packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding @@ -212,7 +212,7 @@ v2 = -- @param params table containing any additional parameters authtype, version -- @param username string containing the username to use for authentication -- @param password string containing the password to use for authentication - -- @param salt string containing the crypthographic salt value + -- @param salt string containing the cryptographic salt value -- @return status true on success, false on failure -- @return result table containing parameter status information, -- result string containing an error message if login fails @@ -261,7 +261,7 @@ v3 = --- Decodes an Auth Request packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding, -1 on error @@ -292,7 +292,7 @@ v3 = --- Decodes an ParameterStatus packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding @@ -308,7 +308,7 @@ v3 = --- Decodes an Error packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding @@ -345,7 +345,7 @@ v3 = --- Decodes the BackendKeyData packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding, -1 on error @@ -364,7 +364,7 @@ v3 = --- Decodes an ReadyForQuery packet -- - -- @param data string containing raw data recieved from socket + -- @param data string containing raw data received from socket -- @param len number containing the length as retrieved from the header -- @param pos number containing the offset into the data buffer -- @return pos number containing the offset after decoding, -1 on error @@ -468,7 +468,7 @@ v3 = -- @param params table containing any additional parameters authtype, version -- @param username string containing the username to use for authentication -- @param password string containing the password to use for authentication - -- @param salt string containing the crypthographic salt value + -- @param salt string containing the cryptographic salt value -- @return status true on success, false on failure -- @return result table containing parameter status information, -- result string containing an error message if login fails diff --git a/nselib/pppoe.lua b/nselib/pppoe.lua index 11aae5aee..fccd4403f 100644 --- a/nselib/pppoe.lua +++ b/nselib/pppoe.lua @@ -822,7 +822,7 @@ Helper = { retries = retries - 1 until( pado.tags or retries == 0 ) if ( not(pado.tags) ) then - return false, "PADO response containined no tags" + return false, "PADO response contained no tags" end local pado_host_unique diff --git a/nselib/proxy.lua b/nselib/proxy.lua index 59714d283..c476965ac 100644 --- a/nselib/proxy.lua +++ b/nselib/proxy.lua @@ -15,7 +15,7 @@ _ENV = stdnse.module("proxy", stdnse.seeall) -- Start of local functions ---- check function, makes checkings for all valid returned status +--- check function, checks for all valid returned status --- If any of the HTTP status below is found, the proxy is potentially open --- The script tries to split header from body before checking for status --@param result connection result @@ -225,7 +225,7 @@ function socksHandshake(socket, version, hostname) if(r2 ~= 0x00) then stdnse.print_debug("Socks5: Authentication required") else - -- If no Auth is required, try to estabilish connection + -- If no Auth is required, try to establish connection stdnse.print_debug("Socks5: No authentication required") -- Socks5 second payload: Version, Command, Null, Address type, Ip-Address, Port number paystring = '05 01 00 01 ' .. sip .. '00 50' @@ -264,7 +264,7 @@ end -- if true, the proxy server might be redirecting the requests -- to a default page -- --- Functions slipts body from head before comparing, to avoid session +-- Functions splits body from head before comparing, to avoid session -- variables, cookies... -- -- @param resp1 A string with the response for the first request diff --git a/nselib/rmi.lua b/nselib/rmi.lua index 86d9fc4b1..d23e2e34b 100644 --- a/nselib/rmi.lua +++ b/nselib/rmi.lua @@ -24,7 +24,7 @@ -- -- If you want to add calls to classes you know of, you can use e.g Jode to decompile the -- stub-class or skeleton class and find out the details that are needed to perform an --- RMI method invokation. Those are +-- RMI method invocation. Those are -- Class hashcode -- Method number (each method gets a number) -- Arguments f @@ -78,7 +78,7 @@ end -- local breader= BufferedReader:new(socket) -- -- bWriter.pack('>i', integer) --- bWrier.flush() -- sends the data +-- bWriter.flush() -- sends the data -- -- if bsocket:canRead(4) then -- Waits until four bytes can be read -- local packetLength = bsocket:unpack('i') -- Read the four bytess @@ -142,7 +142,7 @@ BufferedWriter = { -- local breader= BufferedReader:new(socket) -- -- bWriter.pack('>i', integer) --- bWrier.flush() -- sends the data +-- bWriter.flush() -- sends the data -- -- if bsocket:canRead(4) then -- Waits until four bytes can be read -- local packetLength = bsocket:unpack('i') -- Read the four bytess @@ -161,7 +161,7 @@ BufferedReader = { end, --- -- This method blocks until the specified number of bytes - -- have been read from the socket and are avaiable for + -- have been read from the socket and are available for -- the caller to read, e.g via the unpack function canRead= function(self,count) local status, data @@ -257,7 +257,7 @@ local JavaTypes = { --- -- The JavaDOS classes -- The JavaDOS class is an approximation of a java DataOutputStream. It provides convenience functions --- for writing java types toan underlying BufferedWriter +-- for writing java types to an underlying BufferedWriter -- -- When used in conjunction with the BufferedX- classes, they handle the availability- -- checks transparently, i.e the caller does not have to check if enough data is available @@ -335,7 +335,7 @@ JavaDIS = { return o end, - -- This closure method generates all reader methods (except unstandard ones) on the fly + -- This closure method generates all reader methods (except nonstandard ones) on the fly -- according to the definitions in JavaTypes. _generateReaderFunc = function(self, javatype) local functionName = 'read'..javatype.name @@ -349,7 +349,7 @@ JavaDIS = { end self[functionName] = newFunc end, - -- This is a bit special, since we do not know beforehand how many bytes must be read. Therfore + -- This is a bit special, since we do not know beforehand how many bytes must be read. Therefore -- this cannot be generated on the fly like the others. readUTF = function(self, text) -- First, we need to read the length, 2 bytes @@ -703,7 +703,7 @@ RmiDataStream = { ---- -- Connects to a remote service. The connection process creates a --- socket and does some handshaking. If this is successfull, +-- socket and does some handshaking. If this is successful, -- we are definitely talking to an RMI service. function RmiDataStream:connect(host, port) local status, err @@ -752,7 +752,7 @@ function RmiDataStream:connect(host, port) return true end --- Reads a DgcAck message, which is sent during conection handshake +-- Reads a DgcAck message, which is sent during connection handshake --@param dis - a JavaDIS to read from --@return status --@return error message @@ -1216,7 +1216,7 @@ function readNonProxyDesc(dis) if ( TypeDecoders[fieldType] ) then status, value= TypeDecoders[fieldType](dis) else - dbg("ellol reading".. RMIUtils.tcString(fieldType)) + dbg("error reading".. RMIUtils.tcString(fieldType)) return end dbg("Read fieldvalue ".. tostring(value) .. " for field ".. tostring(fields[i])) @@ -1460,7 +1460,7 @@ function Registry:lookup(name) end ---- -- Arguments class --- This class is meant to handle arguments which is sent to a mehtod invoked +-- This class is meant to handle arguments which is sent to a method invoked -- remotely. It is mean to contain functionality to add java primitive datatypes, -- such as pushInt, pushString, pushLong etc. All of these are not implemented -- currently diff --git a/nselib/rpc.lua b/nselib/rpc.lua index 04e0ead6b..36b64879e 100644 --- a/nselib/rpc.lua +++ b/nselib/rpc.lua @@ -9,7 +9,7 @@ -- The library contains the following classes: -- * Comm -- ** Handles network connections. --- ** Handles low-level packet sending, recieving, decoding and encoding. +-- ** Handles low-level packet sending, receiving, decoding and encoding. -- ** Stores rpc programs info: socket, protocol, program name, id and version. -- ** Used by Mount, NFS, RPC and Portmap. -- * Portmap @@ -1668,7 +1668,7 @@ NFS = { pos, lookup.attributes = Util.unmarshall_nfsattr(data, pos, comm.version) else - stdnse.pritn_debug("NFS.LookUpDecode: NFS unsupported version %d", comm.version) + stdnse.print_debug("NFS.LookUpDecode: NFS unsupported version %d", comm.version) return -1, nil end diff --git a/nselib/rpcap.lua b/nselib/rpcap.lua index a8b0fa7a5..41f0c146b 100644 --- a/nselib/rpcap.lua +++ b/nselib/rpcap.lua @@ -1,6 +1,6 @@ --- -- This library implements the fundamentals needed to communicate with the --- WinPcap Remote Capture Deamon. It currently supports authenticating to +-- WinPcap Remote Capture Daemon. It currently supports authenticating to -- the service using either NULL-, or Password-based authentication. -- In addition it has the capabilities to list the interfaces that may be -- used for sniffing. @@ -10,7 +10,7 @@ -- handled by the Comm class, and the main interface for script -- writers is kept under the Helper class. -- --- The following code snipplet illustrates how to connect to the service and +-- The following code snippet illustrates how to connect to the service and -- extract information about network interfaces: -- -- local helper = rpcap.Helper:new(host, port) @@ -388,7 +388,7 @@ Helper = { -- @param username [optional] -- @param password [optional] -- @return status true on success, false on failure - -- @return err string containing error mesage on failure + -- @return err string containing error message on failure login = function(self, username, password) local auth diff --git a/nselib/rsync.lua b/nselib/rsync.lua index 4ef87a93d..d32f84a4a 100644 --- a/nselib/rsync.lua +++ b/nselib/rsync.lua @@ -31,7 +31,7 @@ Helper = { -- Handles send and receive of control messages -- @param data string containing the command to send - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return data containing the response from the server -- err string, if status is false ctrl_exch = function(self, data) @@ -103,7 +103,7 @@ Helper = { end if ( data == "@RSYNCD: OK" ) then - return true, "Authentication successfull" + return true, "Authentication successful" end return false, "Authentication failed" end, diff --git a/nselib/rtsp.lua b/nselib/rtsp.lua index 216387bd1..f742ad5f4 100644 --- a/nselib/rtsp.lua +++ b/nselib/rtsp.lua @@ -105,7 +105,7 @@ Response = { local tmp = stdnse.strsplit("\r\n", data) if ( not(tmp) ) then return nil end - -- we should have atleas one entry + -- we should have atleast one entry if ( #tmp > 1 ) then o.headers = {} for i=2, #tmp do @@ -207,15 +207,15 @@ Client = { repeat local err status, err = self.socket:send( tostring(req) ) - -- check if send was successfull, in case it wasn't AND + -- check if send was successful, in case it wasn't AND -- this is our last retry, ABORT if ( not(status) and 0 == retries - 1 ) then stdnse.print_debug(2, "Failed to send request to server (%s)", err) return false, ("Failed to send request to server (%s)"):format(err) - -- if send was successfull, attempt to receive the response + -- if send was successful, attempt to receive the response elseif ( status ) then status, data = self.socket:receive() - -- if we got the response allright, break out of retry loop + -- if we got the response all right, break out of retry loop if ( status ) then break end end -- if either send or receive fails, re-connect the socket diff --git a/nselib/sasl.lua b/nselib/sasl.lua index 7c94aafb5..6e5d5bd3f 100644 --- a/nselib/sasl.lua +++ b/nselib/sasl.lua @@ -6,7 +6,7 @@ -- The DigestMD5 class contains all code necessary to calculate -- a DIGEST-MD5 response based on the servers challenge and the other -- necessary arguments (@see DigestMD5.new). --- It can be called throught the SASL helper or directly like this: +-- It can be called through the SASL helper or directly like this: -- -- local dmd5 = DigestMD5:new(chall, user, pass, "AUTHENTICATE", nil, "imap") -- local digest = dmd5:calcDigest() @@ -21,7 +21,7 @@ -- local response = ntlm:calcResponse() -- -- --- The Helper class contains the high level methodes: +-- The Helper class contains the high level methods: -- * new: This is the SASL object constructor. -- * set_mechanism: Sets the authentication mechanism to use. -- * set_callback: Sets the encoding function to use. @@ -37,7 +37,7 @@ -- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html -- Version 0.2 --- Created 07/17/2011 - v0.1 - Created by Djalal Harouini +-- Created 07/17/2011 - v0.1 - Created by Djalal Harouni -- Revised 07/18/2011 - v0.2 - Added NTLM, DIGEST-MD5 classes @@ -80,7 +80,7 @@ if HAVE_SSL then end, -- parses a challenge received from the server - -- takes care of both quoted and unqoted identifiers + -- takes care of both quoted and unquoted identifiers -- regardless of what RFC says parseChallenge = function(self) local results = {} @@ -190,7 +190,7 @@ if HAVE_SSL then return o end, - --- Converst str to "unicode" (adds null bytes for every other byte) + --- Converts str to "unicode" (adds null bytes for every other byte) -- @param str containing string to convert -- @return unicode string containing the unicoded str to_unicode = function(str) @@ -442,7 +442,7 @@ Helper = { --- Resets all the data of the SASL object. -- - -- This methode will clear the specified SASL mechanism. + -- This method will clear the specified SASL mechanism. reset = function(self) self:set_mechanism() end, diff --git a/nselib/shortport.lua b/nselib/shortport.lua index f6a23f7f7..bc9db6c8d 100644 --- a/nselib/shortport.lua +++ b/nselib/shortport.lua @@ -12,7 +12,7 @@ _ENV = stdnse.module("shortport", stdnse.seeall) --- -- See if a table contains a value. --- @param t A table repesenting a set. +-- @param t A table representing a set. -- @param value The value to check for. -- @return True if t contains value, false otherwise. local function includes(t, value) diff --git a/nselib/sip.lua b/nselib/sip.lua index 800922246..c153df824 100644 --- a/nselib/sip.lua +++ b/nselib/sip.lua @@ -175,7 +175,7 @@ Session = { end local status, lhost, lport, rhost, rport = self.conn.socket:get_info() if ( not(status) ) then - return false, "Failed to retreive socket information" + return false, "Failed to retrieve socket information" end self.sessdata:setClient(lhost, lport) self.sessdata:setServer(rhost, rport) @@ -741,7 +741,7 @@ SipAuth = { end, --- Calculates the authentication response - -- @return reponse string containing the authentication response + -- @return response string containing the authentication response calculateResponse = function(self) if ( not(self.nonce) or not(self.algorithm) or not(self.realm) ) then diff --git a/nselib/smb.lua b/nselib/smb.lua index cde2e47e3..e5d8274ea 100644 --- a/nselib/smb.lua +++ b/nselib/smb.lua @@ -874,8 +874,8 @@ function smb_read(smb, read_data) local result = netbios_data .. smb_data if(#result ~= length) then - stdnse.print_debug(1, "SMB: ERROR: Received wrong number of bytes, there will likely be issues (recieved %d, expected %d)", #result, length) - return false, string.format("SMB: ERROR: Didn't receive the expected number of bytes; recieved %d, expected %d. This will almost certainly cause some errors.", #result, length) + stdnse.print_debug(1, "SMB: ERROR: Received wrong number of bytes, there will likely be issues (received %d, expected %d)", #result, length) + return false, string.format("SMB: ERROR: Didn't receive the expected number of bytes; received %d, expected %d. This will almost certainly cause some errors.", #result, length) end -- Check the message signature (ignoring the first four bytes, which are the netbios header) @@ -956,7 +956,7 @@ end function negotiate_protocol(smb, overrides) local header, parameters, data local pos - local header1, header2, header3, ehader4, command, status, flags, flags2, pid_high, signature, unused, pid, mid + local header1, header2, header3, header4, command, status, flags, flags2, pid_high, signature, unused, pid, mid header = smb_encode_header(smb, command_codes['SMB_COM_NEGOTIATE'], overrides) @@ -991,7 +991,7 @@ function negotiate_protocol(smb, overrides) end -- Parse out the header - local uid, tid, header4 + local uid, tid pos, header1, header2, header3, header4, command, status, flags, flags2, pid_high, signature, unused, tid, pid, uid, mid = bin.unpack("volid - include volume ids in result -- dir - find directories -- archive - find archived files --- @return iterator function retreiving the next result +-- @return iterator function retrieving the next result function find_files(smbstate, fname, options) local TRANS2_FIND_FIRST2, TRANS2_FIND_NEXT2 = 1, 2 options = options or {} @@ -3094,7 +3094,7 @@ function share_get_details(host, share) -- Try and get full details about the share status, result = msrpc.get_share_info(host, share) if(status == false) then - -- We don't stop for this error (it's pretty common since administive privileges are required here) + -- We don't stop for this error (it's pretty common since administrative privileges are required here) stdnse.print_debug(1, "SMB: Failed to get share info for %s: %s", share, result) details['details'] = result else @@ -3423,7 +3423,7 @@ function is_admin(host, username, domain, password, password_hash, hash_type) status, err = negotiate_protocol(smbstate, overrides) if(status == false) then - stdnse.print_debug("SMB; is_admin: Failed to negotiatie protocol: %s [%s]", err, username) + stdnse.print_debug("SMB; is_admin: Failed to negotiate protocol: %s [%s]", err, username) stop(smbstate) return false end diff --git a/nselib/smbauth.lua b/nselib/smbauth.lua index 6bf9b4591..b97f4eadb 100644 --- a/nselib/smbauth.lua +++ b/nselib/smbauth.lua @@ -53,7 +53,7 @@ -- --@args smbusername The SMB username to log in with. The forms "DOMAIN\username" and "username@DOMAIN" -- are not understood. To set a domain, use the smbdomain argument. ---@args smbdomain The domain to log in with. If you aren't in a domained environment, then anything +--@args smbdomain The domain to log in with. If you aren't in a domain environment, then anything -- will (should?) be accepted by the server. --@args smbpassword The password to connect with. Be cautious with this, since some servers will lock -- accounts if the incorrect password is given. Although it's rare that the @@ -770,7 +770,7 @@ function get_host_info_from_security_blob(security_blob) if ( target_info_length > 0 ) then -- Definition of AvId values (IDs for AV_PAIR (attribute-value pair) structures), - -- as definied by the NTLM Authentication Protocol specification [MS-NLMP]. + -- as defined by the NTLM Authentication Protocol specification [MS-NLMP]. local NTLM_AV_ID_VALUES = { MsvAvEOL = 0x0, MsvAvNbComputerName = 0x1, @@ -824,7 +824,7 @@ end ---Create an 8-byte message signature that's sent with all SMB packets. -- ---@param mac_key The key used for authentication. It's the concatination of the session key and the +--@param mac_key The key used for authentication. It's the concatenation of the session key and the -- response hash. --@param data The packet to generate the signature for. This should be the packet that's about to be -- sent, except with the signature slot replaced with the sequence number. diff --git a/nselib/smtp.lua b/nselib/smtp.lua index 607e40132..bf6ddb852 100644 --- a/nselib/smtp.lua +++ b/nselib/smtp.lua @@ -362,7 +362,7 @@ end -- -- @param socket connected to server -- @param domain to use in the EHLO command. --- @return true on sucess, or false on failures. +-- @return true on success, or false on failures. -- @return response returned by the SMTP server on success, or an -- error message on failures. ehlo = function(socket, domain) @@ -640,7 +640,7 @@ login = function(socket, username, password, mech) -- sniffed of the wire, seems to always be the same -- decodes to some NTLMSSP blob greatness status, response = query(socket, "TlRMTVNTUAABAAAAB7IIogYABgA3AAAADwAPACgAAAAFASgKAAAAD0FCVVNFLUFJUi5MT0NBTERPTUFJTg==") - if ( not(status) ) then return false, "ERROR: Failed to receieve NTLM challenge" end + if ( not(status) ) then return false, "ERROR: Failed to receive NTLM challenge" end end diff --git a/nselib/snmp.lua b/nselib/snmp.lua index 6a69aa9a4..26f2a0e6e 100644 --- a/nselib/snmp.lua +++ b/nselib/snmp.lua @@ -81,7 +81,7 @@ local tagDecoder = {} -- IP Address -- Response-PDU --- TOOD: Figure out how to remove these dependancies +-- TOOD: Figure out how to remove these dependencies tagDecoder["A2"] = function( self, encStr, elen, pos ) local seq = {} @@ -483,7 +483,7 @@ function snmpWalk( socket, base_oid ) status, response = socket:receive_bytes(1) if ( not( status ) ) then - -- Unless we don't have a usefull error message, don't report it + -- Unless we have a useful error message, don't report it if ( response ~= "ERROR" ) then stdnse.print_debug("snmp.snmpWalk: Received no answer (%s)", response) return false, response diff --git a/nselib/socks.lua b/nselib/socks.lua index a57b99add..b8d19aa69 100644 --- a/nselib/socks.lua +++ b/nselib/socks.lua @@ -171,7 +171,7 @@ Helper = { -- Create a new instance of the class -- @param host table containing the host table -- @param port table containing the port table - -- @param options table containing library options, currenlty: + -- @param options table containing library options, currently: -- timeout - socket timeout in ms -- @return o instance of Helper new = function(self, host, port, options) @@ -197,7 +197,7 @@ Helper = { -- Connects to the SOCKS server -- @param auth_method table containing the auth. methods to request -- @return status true on success, false on failure - -- @return response table containing the respons or err string on failure + -- @return response table containing the response or err string on failure connect = function(self, auth_method) self.socket = nmap.new_socket() self.socket:set_timeout(self.options.timeout or 10000) @@ -267,7 +267,7 @@ Helper = { end if ( auth:isSuccess() ) then - return true, "Authentication was successfull" + return true, "Authentication was successful" else return false, "Authentication failed" end diff --git a/nselib/srvloc.lua b/nselib/srvloc.lua index 9277199a7..a935f65cd 100644 --- a/nselib/srvloc.lua +++ b/nselib/srvloc.lua @@ -89,7 +89,7 @@ Reply = { end, --- Attempts to create an instance by reading data off the socket - -- @param socket socket conected to the SRVLOC service + -- @param socket socket connected to the SRVLOC service -- @return new instance of the Reply.Service class fromSocket = function(socket) local status, data = socket:receive() @@ -143,7 +143,7 @@ Reply = { end, --- Attempts to create an instance by reading data off the socket - -- @param socket socket conected to the SRVLOC service + -- @param socket socket connected to the SRVLOC service -- @return new instance of the Reply.Attribute class fromSocket = function(socket) local status, data = socket:receive() @@ -295,7 +295,7 @@ Request = { } --- The Helper class serves as primary interface for scripts using the libraryy +-- The Helper class serves as primary interface for scripts using the library Helper = { new = function(self, host, port) diff --git a/nselib/stdnse.lua b/nselib/stdnse.lua index bbeb98b6d..cc80628c8 100644 --- a/nselib/stdnse.lua +++ b/nselib/stdnse.lua @@ -272,7 +272,7 @@ end -- stdnse.tohex(123456, {separator = ":"}) --> "1:e2:40" -- stdnse.tohex(123456, {separator = ":", group = 4}) --> "1:e240" -- @param s String or number to be encoded. --- @param options Table specifiying formatting options. +-- @param options Table specifying formatting options. -- @return String in hexadecimal format. function tohex( s, options ) options = options or EMPTY @@ -702,7 +702,7 @@ end -- occurs. --@param data The table of output. --@param indent Used for indentation on recursive calls; should generally be set to --- nil when callling from a script. +-- nil when calling from a script. -- @return nil, if data is empty, otherwise a -- multiline string. function format_output(status, data, indent) diff --git a/nselib/stun.lua b/nselib/stun.lua index 40a9dcd11..cff953f35 100644 --- a/nselib/stun.lua +++ b/nselib/stun.lua @@ -283,7 +283,7 @@ Comm = { Util = { -- creates a random string - -- @param len number containg the length of the generated random string + -- @param len number containing the length of the generated random string -- @return str containing the random string randomString = function(len) local str = "" @@ -325,7 +325,7 @@ Helper = { -- Get's the external public IP -- @return status true on success, false on failure - -- @return result containing the IP as tring + -- @return result containing the IP as string getExternalAddress = function(self) local trans_id diff --git a/nselib/tftp.lua b/nselib/tftp.lua index d6ad79ea9..8779b41f2 100644 --- a/nselib/tftp.lua +++ b/nselib/tftp.lua @@ -7,11 +7,11 @@ -- * Packet -- ** The Packet classes contain one class for each TFTP operation. -- * File --- ** The File class holds a recieved file including the name and contents +-- ** The File class holds a received file including the name and contents -- * ConnHandler -- ** The ConnHandler class handles and processes incoming connections. -- --- The following code snipplet starts the TFTP server and waits for the file incoming.txt +-- The following code snippet starts the TFTP server and waits for the file incoming.txt -- to be uploaded for 10 seconds: -- -- tftp.start() @@ -192,14 +192,14 @@ local function processConnection( host, port, data ) while( true ) do local status, pdata = socket:receive() if ( not(status) ) then - -- if we're here and havent succesfully read a packet for 5 seconds, abort + -- if we're here and haven't successfully read a packet for 5 seconds, abort if ( os.time() - lastread > 5 ) then coroutine.yield(false) else coroutine.yield(true) end else - -- record last time we had a succesful read + -- record last time we had a successful read lastread = os.time() pos, op = bin.unpack(">S", pdata) if ( OpCode.DATA ~= op ) then @@ -217,7 +217,7 @@ local function processConnection( host, port, data ) break end - -- for every fith block check that we've received the preceeding four + -- for every fifth block check that we've received the preceding four if ( ( #blocks % 5 ) == 0 ) then for b = #blocks - 4, #blocks do if ( not(blocks[b]) ) then @@ -251,7 +251,7 @@ local function processConnection( host, port, data ) end filecontent = filecontent .. blocks[i] end - stdnse.print_debug("Finnished receiving file \"%s\"", filename) + stdnse.print_debug("Finished receiving file \"%s\"", filename) -- Add anew file to the global infiles table table.insert( infiles, File:new(filename, filecontent, host) ) @@ -305,7 +305,7 @@ end local function waitLast() -- The thread that started the server needs to wait here until the rest -- of the scripts finnish running. We know we are done once the state - -- shifts to STOPPED and we get a singla from the condvar in the + -- shifts to STOPPED and we get a signal from the condvar in the -- dispatcher local s_condvar = nmap.condvar(state) while( srvthread == coroutine.running() and state ~= "STOPPED" ) do @@ -316,7 +316,7 @@ end --- Waits for a file with a specific filename for at least the number of -- seconds specified by the timeout parameter. If this function is called -- from the thread that's running the server it will wait until all the --- other threads have finnished executing before returning. +-- other threads have finished executing before returning. -- -- @param filename string containing the name of the file to receive -- @param timeout number containing the minimum number of seconds to wait diff --git a/nselib/tns.lua b/nselib/tns.lua index f6b919e54..21daabb2d 100644 --- a/nselib/tns.lua +++ b/nselib/tns.lua @@ -488,7 +488,7 @@ Packet.PreAuth = { --- Parses the PreAuth packet response and extracts data needed to -- perform authentication -- - -- @param tns Packet.TNS containing the TNS packet recieved from the server + -- @param tns Packet.TNS containing the TNS packet received from the server -- @return table containing the keys and values returned by the server parseResponse = function( self, tns ) local kvps = {} @@ -576,7 +576,7 @@ Packet.Auth = { -- Parses the response of an Auth packet -- - -- @param tns Packet.TNS containing the TNS packet recieved from the server + -- @param tns Packet.TNS containing the TNS packet received from the server -- @return table containing the key pair values from the Auth packet parseResponse = function( self, tns ) local kvps = {} @@ -1084,7 +1084,7 @@ Packet.QueryResponseAck = { -- The mask is used in order to achieve "compression" and is essentially -- at a bit mask that decides what columns should be fetched from the - -- preceeding row. The mask is provided in reverse order and a set bit + -- preceding row. The mask is provided in reverse order and a set bit -- indicates that data is provided while an unset bit indicates that the -- column data should be fetched from the previous row. -- @@ -1319,10 +1319,10 @@ Comm = { return self.socket:send( tostring(tns) ) end, - --- Handles communication when a MARKER packet is recieved and retrieves + --- Handles communication when a MARKER packet is received and retrieves -- the following error message -- - -- @return false always to indicate that an error occured + -- @return false always to indicate that an error occurred -- @return msg containing the error message handleMarker = function( self ) local status, tns = self:recvTNSPacket() @@ -1354,10 +1354,10 @@ Comm = { return false, msg end, - --- Recieves a TNS packet and handles TNS-resends + --- Receives a TNS packet and handles TNS-resends -- -- @return status true on success, false on failure - -- @return tns Packet.TNS containing the recieved packet or err on failure + -- @return tns Packet.TNS containing the received packet or err on failure recvTNSPacket = function( self ) local tns local retries = 5 @@ -1391,9 +1391,9 @@ Comm = { return true, tns end, - --- Sends a TNS packet and recieves (and handles) the response + --- Sends a TNS packet and receives (and handles) the response -- - -- @param pkt containingt the Packet.* to send to the server + -- @param pkt containing the Packet.* to send to the server -- @return status true on success, false on failure -- @return the parsed response as return from the respective parseResponse -- function or error message if status was false @@ -1495,7 +1495,7 @@ Crypt = { -- @param user containing the Oracle user name -- @param pass containing the Oracle user password -- @param srv_sesskey_enc containing the encrypted server session key as - -- recieved from the PreAuth packet + -- received from the PreAuth packet -- @return cli_sesskey_enc the encrypted client session key -- @return auth_pass the encrypted Oracle password Encrypt10g = function( self, user, pass, srv_sesskey_enc ) @@ -1525,8 +1525,8 @@ Crypt = { -- -- @param pass containing the Oracle user password -- @param srv_sesskey_enc containing the encrypted server session key as - -- recieved from the PreAuth packet - -- @param auth_vrfy_data containing the password salt as recieved from the + -- received from the PreAuth packet + -- @param auth_vrfy_data containing the password salt as received from the -- PreAuth packet -- @return cli_sesskey_enc the encrypted client session key -- @return auth_pass the encrypted Oracle password @@ -1672,10 +1672,10 @@ Helper = { end, --- Sends a command to the TNS lsnr - -- It currently accepts and tries to send all commands recieved + -- It currently accepts and tries to send all commands received -- -- @param cmd string containing the command to send to the server - -- @return data string containing the result recieved from the server + -- @return data string containing the result received from the server lsnrCtl = function( self, cmd ) local status, data = self.socket:connect( self.host.ip, self.port.number, "tcp" ) local conn, packet, tns, pkt diff --git a/nselib/upnp.lua b/nselib/upnp.lua index ece197f1c..41d56a231 100644 --- a/nselib/upnp.lua +++ b/nselib/upnp.lua @@ -13,14 +13,14 @@ -- * Util -- ** The Util class contains a number of static functions mainly used to convert and sort data. -- --- The following code snipplet queries all UPnP services on the network: +-- The following code snippet queries all UPnP services on the network: -- -- local helper = upnp.Helper:new() -- helper:setMulticast(true) -- return stdnse.format_output(helper:queryServices()) -- -- --- This next snipplet queries a specific host for the same information: +-- This next snippet queries a specific host for the same information: -- -- local helper = upnp.Helper:new(host, port) -- return stdnse.format_output(helper:queryServices()) diff --git a/nselib/url.lua b/nselib/url.lua index 406ee4e84..93b1b634f 100644 --- a/nselib/url.lua +++ b/nselib/url.lua @@ -197,7 +197,7 @@ end --- -- Rebuilds a parsed URL from its components. -- --- Components are protected if any reserved or unallowed characters are found. +-- Components are protected if any reserved or disallowed characters are found. -- @param parsed Parsed URL, as returned by parse. -- @return A string with the corresponding URL. ----------------------------------------------------------------------------- diff --git a/nselib/vnc.lua b/nselib/vnc.lua index f8f65061d..79b92d373 100644 --- a/nselib/vnc.lua +++ b/nselib/vnc.lua @@ -1,6 +1,6 @@ --- -- The VNC library provides some basic functionality needed in order to --- communicate with VNC servers, and derivates such as Tight- or Ultra- +-- communicate with VNC servers, and derivatives such as Tight- or Ultra- -- VNC. -- -- Summary diff --git a/nselib/vulns.lua b/nselib/vulns.lua index fe5fea25a..6e1341348 100644 --- a/nselib/vulns.lua +++ b/nselib/vulns.lua @@ -8,7 +8,7 @@ -- Each vulnerability must have its own state: -- NOT_VULN: The program was confirmed to be not vulnerable. -- LIKELY_VULN: The program is likely to be vulnerable, --- this can be the case when we do a simple version comparaison. This +-- this can be the case when we do a simple version comparison. This -- state should cover possible false positive situations. -- VULN: The program was confirmed to be vulnerable. -- EXPLOIT: The program was confirmed to be vulnerable and @@ -157,7 +157,7 @@ -- -- -- @args vulns.showall If set, the library will show and report all the --- registred vulnerabilities which includes the +-- registered vulnerabilities which includes the -- NOT VULNERABLE ones. By default the library will only -- report the VULNERABLE entries: VULNERABLE, -- LIKELY VULNERABLE, VULNERABLE (DoS) @@ -336,7 +336,7 @@ local VULNS -- }, -- }, -- --- -- Entries whithout the vulnerability ID are stored here. +-- -- Entries without the vulnerability ID are stored here. -- 'NMAP_ID' = { -- 'XXXXX' = { -- ... @@ -600,7 +600,7 @@ local default_filter = function(vuln_table) return true end -- This function just inserts the callback filters in the filters_db. -- -- @param filters_db The filters database (a table in the registry). --- @param filter_callback The callbackk function. +-- @param filter_callback The callback function. -- @return FID The filter ID associated with the callback function. local register_filter = function(filters_db, filter_callback) if filter_callback and type(filter_callback) == "function" then @@ -683,7 +683,7 @@ local l_update_id = function(fid_table, id_type, id, vuln_table) -- Add the ID vulnerability type if it is missing l_add_id_type(fid_table, id_type) - -- Make sure that we are referecing the correct tables + -- Make sure that we are referencing the correct tables fid_table[id_type][id] = fid_table[id_type][id] or {} fid_table[id_type][id]['ENTRIES'] = fid_table[id_type][id]['ENTRIES'] or {} local push_table = fid_table[id_type][id]['ENTRIES'] @@ -1015,7 +1015,7 @@ local l_add = function(vulndb, vuln_table) -- Search the Filters IDS for the vulnerability for _, fid in ipairs(FIDS) do for id_type, id in pairs(vuln_table.IDS) do - -- Count how many IDs should be refenrecing the vulnerability + -- Count how many IDs should be referencing the vulnerability -- entry in all the FILTERS_IDS tables. ids_count = ids_count + 1 @@ -1564,7 +1564,7 @@ end -- This function can be used to see if there are any references to the -- specified vulnerability in the database, it will return -- True if so which means that one of the scripts has --- attempted to check this vulnerabilty. +-- attempted to check this vulnerability. -- -- Scripts must call vulns.save_reports() function first to -- setup the vulnerability database. @@ -1712,7 +1712,7 @@ end -- -- The selection_filter is an optional table parameter of -- optional fields which can be used to select which vulnerabilities to --- report, if it is not set then all vulnerabilites entries will be +-- report, if it is not set then all vulnerabilities entries will be -- returned. -- -- @usage diff --git a/nselib/vuzedht.lua b/nselib/vuzedht.lua index e08c8c75c..bee10700d 100644 --- a/nselib/vuzedht.lua +++ b/nselib/vuzedht.lua @@ -10,7 +10,7 @@ -- -- o Response - the response class containing all of the response classes. It -- currently contains the Header, PING, FIND_NODE and ERROR --- classs. +-- class. -- -- o Session - a class containing "session state" such as the transaction- and -- instance ID's. @@ -175,7 +175,7 @@ Response = { end }, - -- The reponse header, present in all packets + -- The response header, present in all packets Header = { Vendors = { @@ -503,7 +503,7 @@ Helper = { end, -- Sends a Vuze PING request to the server and parses the response - -- @return status true on succes, false on failure + -- @return status true on success, false on failure -- @return response PING response instance on success, -- err string containing the error message on failure ping = function(self) diff --git a/nselib/wsdd.lua b/nselib/wsdd.lua index fdbf15973..0f6ac978c 100644 --- a/nselib/wsdd.lua +++ b/nselib/wsdd.lua @@ -21,7 +21,7 @@ -- * Decoders -- ** The Decoders class contains static functions used for decoding probe matches -- --- The following code snipplet shows how the library can be used: +-- The following code snippet shows how the library can be used: -- -- local helper = wsdd.Helper:new() -- helper:setMulticast(true) diff --git a/nselib/xdmcp.lua b/nselib/xdmcp.lua index 1b4c89420..51b6a8eca 100644 --- a/nselib/xdmcp.lua +++ b/nselib/xdmcp.lua @@ -286,7 +286,7 @@ Helper = { -- @param host table as received by the action method -- @param port table as received by the action method -- @param options table - -- @retun o new instance of Helper + -- @return o new instance of Helper new = function(self, host, port, options) local o = { host = host, diff --git a/nselib/xmpp.lua b/nselib/xmpp.lua index e47e63f08..8e92a35ad 100644 --- a/nselib/xmpp.lua +++ b/nselib/xmpp.lua @@ -108,8 +108,8 @@ XMPP = { --- Creates a new instance of the XMPP class -- - -- @param host table as receieved by the action function - -- @param port table as receieved by the action function + -- @param host table as received by the action function + -- @param port table as received by the action function -- @param options table containing options, currently supported -- timeout - sets the socket timeout -- servername - sets the server name to use in @@ -215,7 +215,7 @@ XMPP = { status, err = self:send("") if ( not(status) ) then return false, "ERROR: Failed to initiate STARTTLS" end local status, tag = self:receive_tag() - if ( not(status) ) then return false, "ERROR: Failed to recevice from server" end + if ( not(status) ) then return false, "ERROR: Failed to receive from server" end if ( tag.name == "proceed" ) then status, err = self.socket:reconnect_ssl() self.options.starttls = false @@ -364,8 +364,8 @@ XMPP = { Helper = { --- Creates a new Helper instance - -- @param host table as receieved by the action function - -- @param port table as receieved by the action function + -- @param host table as received by the action function + -- @param port table as received by the action function -- @param options table containing options, currently supported -- timeout - sets the socket timeout -- servername - sets the server name to use in diff --git a/scripts/afp-brute.nse b/scripts/afp-brute.nse index 2a2883bea..d963074d3 100644 --- a/scripts/afp-brute.nse +++ b/scripts/afp-brute.nse @@ -6,7 +6,7 @@ local string = require "string" local table = require "table" local unpwdb = require "unpwdb" --- we dont really need openssl here, but let's attempt to load it as a way +-- we don't really need openssl here, but let's attempt to load it as a way -- to simply prevent the script from running, in case we don't have it local openssl = stdnse.silent_require("openssl") @@ -44,7 +44,7 @@ categories = {"intrusive", "brute"} -- Version 0.3 -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson -- Revised 03/09/2010 - v0.2 - changed so that passwords are iterated over users --- - this change makes better sence as guessing is slow +-- - this change makes better sense as guessing is slow -- Revised 09/09/2011 - v0.3 - changed account status text to be more consistent with other *-brute scripts portrule = shortport.port_or_service(548, "afp") diff --git a/scripts/afp-ls.nse b/scripts/afp-ls.nse index 42093d729..01651ad8a 100644 --- a/scripts/afp-ls.nse +++ b/scripts/afp-ls.nse @@ -133,11 +133,11 @@ action = function(host, port) if ( status ) then local status, fsize = afpHelper:GetFileSize( vol, item.name) if ( not(status) ) then - return ("\n\nERROR: Failed to retreive file size for %/%s"):format(vol, item.name) + return ("\n\nERROR: Failed to retrieve file size for %/%s"):format(vol, item.name) end local status, date = afpHelper:GetFileDates( vol, item.name) if ( not(status) ) then - return ("\n\nERROR: Failed to retreive file dates for %/%s"):format(vol, item.name) + return ("\n\nERROR: Failed to retrieve file dates for %/%s"):format(vol, item.name) end tab.addrow(file_tab, result.privs, result.uid, result.gid, fsize, date.create, item.name) @@ -156,7 +156,7 @@ action = function(host, port) status, response = afpHelper:Logout() status, response = afpHelper:CloseSession() - -- stop after first succesfull attempt + -- stop after first successful attempt if ( output and #output > 0 ) then table.insert(output, "") table.insert(output, ("Information retrieved as: %s"):format(username)) diff --git a/scripts/afp-showmount.nse b/scripts/afp-showmount.nse index c16611702..a5da0c932 100644 --- a/scripts/afp-showmount.nse +++ b/scripts/afp-showmount.nse @@ -29,7 +29,7 @@ Shows AFP shares and ACLs. -- Version 0.4 -- Created 01/03/2010 - v0.1 - created by Patrik Karlsson -- Revised 01/13/2010 - v0.2 - Fixed a bug where a single share wouldn't show due to formatting issues --- Revised 01/20/2010 - v0.3 - removed superflous functions +-- Revised 01/20/2010 - v0.3 - removed superfluous functions -- Revised 05/03/2010 - v0.4 - cleaned up and added dependency to afp-brute and added support for credentials -- by argument or registry diff --git a/scripts/asn-query.nse b/scripts/asn-query.nse index 8d78f8832..9a3e1949a 100644 --- a/scripts/asn-query.nse +++ b/scripts/asn-query.nse @@ -65,7 +65,7 @@ end --- -- Cached results are checked before sending a query for the target and extracting the --- relevent information from the response. Mutual exclusion is used so that results can be +-- relevant information from the response. Mutual exclusion is used so that results can be -- cached and so a single thread will be active at any time. -- @param host Host table. -- @return Formatted answers or nil on errors. diff --git a/scripts/backorifice-brute.nse b/scripts/backorifice-brute.nse index 44efd105d..1e3ac8d30 100644 --- a/scripts/backorifice-brute.nse +++ b/scripts/backorifice-brute.nse @@ -117,7 +117,7 @@ local backorifice = -- both are encrypted with the same initial seed, this is -- how we verify we are talking to a BackOrifice service. -- The statement is optimized so as not to decrypt unless - -- comparison of encrypted magicstrings succeds + -- comparison of encrypted magicstrings succeeds if status and response:sub(1,8) == encrypted_ping:sub(1,8) and self:BOcrypt(response,seed):match("!PONG!(1%.20)!.*!") then local BOversion, BOhostname = self:BOcrypt(response,seed):match("!PONG!(1%.20)!(.*)!") diff --git a/scripts/broadcast-dhcp-discover.nse b/scripts/broadcast-dhcp-discover.nse index b6fe2c58c..94327fb17 100644 --- a/scripts/broadcast-dhcp-discover.nse +++ b/scripts/broadcast-dhcp-discover.nse @@ -164,7 +164,7 @@ action = function() local request_type = dhcp.request_types["DHCPDISCOVER"] local ip_address = bin.pack(">I", ipOps.todword("0.0.0.0")) - -- we nead to set the flags to broadcast + -- we need to set the flags to broadcast local request_options, overrides, lease_time = nil, { flags = 0x8000 }, nil local status, packet = dhcp.dhcp_build(request_type, ip_address, mac, nil, request_options, overrides, lease_time, transaction_id) if (not(status)) then return "\n ERROR: Failed to build packet" end diff --git a/scripts/broadcast-eigrp-discovery.nse b/scripts/broadcast-eigrp-discovery.nse index 5d4235cf5..eab97d9aa 100644 --- a/scripts/broadcast-eigrp-discovery.nse +++ b/scripts/broadcast-eigrp-discovery.nse @@ -221,7 +221,7 @@ action = function() -- If an interface was provided, get its information interface = nmap.get_interface_info(interface) if not interface then - return ("\n ERROR: Failed to retreive %s interface information."):format(interface) + return ("\n ERROR: Failed to retrieve %s interface information."):format(interface) end interfaces = {interface} stdnse.print_debug("%s: Will use %s interface.", SCRIPT_NAME, interface.shortname) diff --git a/scripts/broadcast-igmp-discovery.nse b/scripts/broadcast-igmp-discovery.nse index febb3f5ff..b4a4a9001 100644 --- a/scripts/broadcast-igmp-discovery.nse +++ b/scripts/broadcast-igmp-discovery.nse @@ -105,7 +105,7 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} ---- Parses a raw igmp packet and return a structred packet. +--- Parses a raw igmp packet and return a structured packet. -- @param data string IGMP Raw packet. -- @return response table Structured igmp packet. local igmpParse = function(data) @@ -204,7 +204,7 @@ end --- Crafts a raw IGMP packet. -- @param interface Source interface of the packet. --- @param vesion IGMP version. Could be 1, 2 or 3. +-- @param version IGMP version. Could be 1, 2 or 3. -- @return string Raw IGMP packet. local igmpRaw = function(interface, version) -- Only 1, 2 and 3 are valid IGMP versions @@ -247,7 +247,7 @@ end local igmpQuery; --- Sends an IGMP Membership query. -- @param interface Network interface to send on. --- @param vesion IGMP version. Could be 1, 2, 3 or all. +-- @param version IGMP version. Could be 1, 2, 3 or all. igmpQuery = function(interface, version) local srcip = interface.address local dstip = "224.0.0.1" @@ -278,7 +278,7 @@ igmpQuery = function(interface, version) end end --- Function to compare wieght of an IGMP response message. +-- Function to compare weight of an IGMP response message. -- Used to sort elements in responses table. local respCompare = function(a,b) return ipOps.todword(a.src) + a.type + (a.ngroups or ipOps.todword(a.group)) @@ -338,7 +338,7 @@ action = function(host, port) -- Get the interface information interface = nmap.get_interface_info(interface) if not interface then - return ("ERROR: Failed to retreive %s interface information."):format(interface) + return ("ERROR: Failed to retrieve %s interface information."):format(interface) end interfaces = {interface} stdnse.print_debug("%s: Will use %s interface.", SCRIPT_NAME, interface.shortname) diff --git a/scripts/broadcast-pc-duo.nse b/scripts/broadcast-pc-duo.nse index 3cd5003ac..35fef3cac 100644 --- a/scripts/broadcast-pc-duo.nse +++ b/scripts/broadcast-pc-duo.nse @@ -33,7 +33,7 @@ local TIMEOUT = stdnse.parse_timespec(stdnse.get_script_args("broadcast-pc-duo.t prerule = function() return ( nmap.address_family() == "inet") end -- Sends a UDP probe to the server and processes the response --- @param probe table contaning a pc-duo probe +-- @param probe table containing a pc-duo probe -- @param responses table containing the responses local function udpProbe(probe, responses) diff --git a/scripts/broadcast-ping.nse b/scripts/broadcast-ping.nse index d35f9254e..3f6062f29 100644 --- a/scripts/broadcast-ping.nse +++ b/scripts/broadcast-ping.nse @@ -24,7 +24,7 @@ The newtarget script-arg can be used so the script adds the discovered IPs as targets. The timeout of the ICMP probes can be specified using the timeout -script-arg. The default timeout is 3000 ms. A higher number might be necesary +script-arg. The default timeout is 3000 ms. A higher number might be necessary when scanning across larger networks. The number of sent probes can be specified using the num-probes diff --git a/scripts/broadcast-ripng-discover.nse b/scripts/broadcast-ripng-discover.nse index e6a77b869..3de48e91c 100644 --- a/scripts/broadcast-ripng-discover.nse +++ b/scripts/broadcast-ripng-discover.nse @@ -47,7 +47,7 @@ RIPng = { -- @param prefix string containing the ipv6 route prefix -- @param tag number containing the route tag -- @param prefix_len number containing the length in bits of the - -- signifcant part of the prefix + -- significant part of the prefix -- @param metric number containing the current metric for the -- destination new = function(self, prefix, tag, prefix_len, metric) diff --git a/scripts/broadcast-wpad-discover.nse b/scripts/broadcast-wpad-discover.nse index ed09a989f..d9e81fd68 100644 --- a/scripts/broadcast-wpad-discover.nse +++ b/scripts/broadcast-wpad-discover.nse @@ -111,7 +111,7 @@ local function dnsDiscover() local d = domain -- reduce domain until we only have a single dot left -- there is a security problem in querying for wpad.tld like eg - -- wpad.com as this could be a rougue domain. This loop does not + -- wpad.com as this could be a rogue domain. This loop does not -- account for domains with tld's containing two parts e.g. co.uk. -- However, as the script just attempts to download and parse the -- proxy values in the WPAD there should be no real harm here. diff --git a/scripts/broadcast-wsdd-discover.nse b/scripts/broadcast-wsdd-discover.nse index 680dd1f0e..62d35b804 100644 --- a/scripts/broadcast-wsdd-discover.nse +++ b/scripts/broadcast-wsdd-discover.nse @@ -48,7 +48,7 @@ categories = {"broadcast", "safe"} prerule = function() return true end --- function used for running several discovery threads in parallell +-- function used for running several discovery threads in parallel -- -- @param funcname string containing the name of the function to run -- the name should be one of the discovery functions in wsdd.Helper diff --git a/scripts/cassandra-info.nse b/scripts/cassandra-info.nse index cfe8d7d31..c9dcc0ba4 100644 --- a/scripts/cassandra-info.nse +++ b/scripts/cassandra-info.nse @@ -54,7 +54,7 @@ function action(host,port) local results = {} - -- uglyness to allow creds.cassandra to work, as the port is not recognized + -- ugliness to allow creds.cassandra to work, as the port is not recognized -- as cassandra even when service scan was run, taken from mongodb local ps = port.service port.service = 'cassandra' diff --git a/scripts/couchdb-databases.nse b/scripts/couchdb-databases.nse index 700d49173..79323a00f 100644 --- a/scripts/couchdb-databases.nse +++ b/scripts/couchdb-databases.nse @@ -46,7 +46,7 @@ local DISCARD = {} --- Removes uninteresting data from the table -- uses the DISCARD table above to see what -- keys should be omitted from the results --- @param data a table containg data +-- @param data a table containing data --@return another table containing data, with some keys removed local function queryResultToTable(data) local result = {} diff --git a/scripts/couchdb-stats.nse b/scripts/couchdb-stats.nse index 1b51989d6..91aa54fb1 100644 --- a/scripts/couchdb-stats.nse +++ b/scripts/couchdb-stats.nse @@ -59,7 +59,7 @@ local DISCARD = {stddev=1,min=1,max=1, mean=1} --- Removes uninteresting data from the table -- uses the DISCARD table above to see what -- keys should be omitted from the results --- @param data a table containg data +-- @param data a table containing data --@return another table containing data, with some keys removed local function queryResultToTable(data) local result = {} diff --git a/scripts/cvs-brute.nse b/scripts/cvs-brute.nse index cd0396ff1..6757ef5d0 100644 --- a/scripts/cvs-brute.nse +++ b/scripts/cvs-brute.nse @@ -61,7 +61,7 @@ Driver = return true, brute.Account:new(username, password, creds.State.VALID) end - -- This error seems to indicate tha the user does not exist + -- This error seems to indicate that the user does not exist if ( err:match("E PAM start error%: Critical error %- immediate abort\0$") ) then stdnse.print_debug(2, "%s: The user %s does not exist", SCRIPT_NAME, username) local err = brute.Error:new("Account invalid") diff --git a/scripts/daap-get-library.nse b/scripts/daap-get-library.nse index 65e513a69..3aa8a9958 100644 --- a/scripts/daap-get-library.nse +++ b/scripts/daap-get-library.nse @@ -139,7 +139,7 @@ function getRevisionNumber( host, port, sessionid ) return revision end ---- Gets the database identitity for the library +--- Gets the database identity for the library -- -- @param host table containing an ip field. -- @param port table containing number and protocol fields. diff --git a/scripts/db2-das-info.nse b/scripts/db2-das-info.nse index 26372fb2d..397790659 100644 --- a/scripts/db2-das-info.nse +++ b/scripts/db2-das-info.nse @@ -116,7 +116,7 @@ end --- Does *very* basic parsing of a DB2 packet -- -- Due to the limited documentation of the protocol this function is guesswork --- The section called info is essentialy the data part of the db2das data response +-- The section called info is essentially the data part of the db2das data response -- The length of this section is found at offset 158 in the db2das.data section -- -- @@ -156,7 +156,7 @@ end -- The bytes following the header are considered to be the data -- -- Offset 38 of the header contains an integer with the length of the data section --- The length of the data section can unfortunately be of either endianess +-- The length of the data section can unfortunately be of either endianness -- There's -- -- @param socket connected to the server diff --git a/scripts/dns-client-subnet-scan.nse b/scripts/dns-client-subnet-scan.nse index 57b5d10a0..c2214502d 100644 --- a/scripts/dns-client-subnet-scan.nse +++ b/scripts/dns-client-subnet-scan.nse @@ -339,7 +339,7 @@ action = function(host, port) end local nameserver = (host and host.ip) or argNS - -- if we have no nameserver argument and no host, we dont have sufficient + -- if we have no nameserver argument and no host, we don't have sufficient -- information to continue, abort if not nameserver then return nil diff --git a/scripts/dns-nsec3-enum.nse b/scripts/dns-nsec3-enum.nse index 08036cbc8..85aaf67f5 100644 --- a/scripts/dns-nsec3-enum.nse +++ b/scripts/dns-nsec3-enum.nse @@ -80,7 +80,7 @@ portrule = shortport.port_or_service(53, "domain", {"tcp", "udp"}) all_results = {} --- get time (in miliseconds) when the script should finish +-- get time (in milliseconds) when the script should finish local function get_end_time() local t = nmap.timing_level() local limit = stdnse.parse_timespec(stdnse.get_script_args('dns-nsec3-enum.timelimit') or "30m") @@ -230,7 +230,7 @@ local function query_for_hashes(host,subdomain,domain) return ranges end --- does the actuall enumeration +-- does the actual enumeration local function enum(host, port, domain) local seen, seen_subdomain = {}, {} diff --git a/scripts/dns-zone-transfer.nse b/scripts/dns-zone-transfer.nse index a35ee0dee..987f29f66 100644 --- a/scripts/dns-zone-transfer.nse +++ b/scripts/dns-zone-transfer.nse @@ -547,7 +547,7 @@ function parse_records_table(number, data, table, offset) return offset end --- An iterator that breaks up a concatentation of responses. In DNS over TCP, +-- An iterator that breaks up a concatenation of responses. In DNS over TCP, -- each response is prefixed by a two-byte length (RFC 1035 section 4.2.2). -- Responses returned by this iterator include the two-byte length prefix. function responses_iter(data) diff --git a/scripts/drda-brute.nse b/scripts/drda-brute.nse index 5bf3ce0e7..ca6302cb4 100644 --- a/scripts/drda-brute.nse +++ b/scripts/drda-brute.nse @@ -13,7 +13,7 @@ Performs password guessing against databases supporting the IBM DB2 protocol suc --- -- @args drda-brute.threads the amount of accounts to attempt to brute --- force in parallell (default 10). +-- force in parallel (default 10). -- @args drda-brute.dbname the database name against which to guess -- passwords (default "SAMPLE"). -- @@ -33,7 +33,7 @@ categories={"intrusive", "brute"} -- Version 0.5 -- Created 05/08/2010 - v0.1 - created by Patrik Karlsson -- Revised 05/09/2010 - v0.2 - re-wrote as multi-threaded --- Revised 05/10/2010 - v0.3 - revised parallellised design +-- Revised 05/10/2010 - v0.3 - revised parallelised design -- Revised 08/14/2010 - v0.4 - renamed script and library from db2* to drda* -- Revised 09/09/2011 - v0.5 - changed account status text to be more consistent with other *-brute scripts @@ -60,8 +60,8 @@ end --- Iterates over the password list and guesses passwords -- --- @param host table with information as recieved by action --- @param port table with information as recieved by action +-- @param host table with information as received by action +-- @param port table with information as received by action -- @param database string containing the database name -- @param creds an iterator producing username, password pairs -- @param valid_accounts table in which to store found accounts @@ -93,8 +93,8 @@ end --- Checks if the supplied database exists -- --- @param host table with information as recieved by action --- @param port table with information as recieved by action +-- @param host table with information as received by action +-- @param port table with information as received by action -- @param database string containing the database name -- @return status true on success, false on failure isValidDb = function( host, port, database ) @@ -112,7 +112,7 @@ isValidDb = function( host, port, database ) return false end ---- Returns the amount of currenlty active threads +--- Returns the amount of currently active threads -- -- @param threads table containing the list of threads -- @return count number containing the number of non-dead threads diff --git a/scripts/firewalk.nse b/scripts/firewalk.nse index ceb6d648d..bb7e06777 100644 --- a/scripts/firewalk.nse +++ b/scripts/firewalk.nse @@ -729,7 +729,7 @@ local function initial_ttl(host) nmap.registry['firewalk']['traceroutefail'] = true if nmap.verbosity() > 0 then - stdnse.print_debug("%s requires unavailable traceroute informations.", SCRIPT_NAME) + stdnse.print_debug("%s requires unavailable traceroute information.", SCRIPT_NAME) end return nil @@ -906,7 +906,7 @@ end --- send a probe and update it -- @param scanner the scanner handle --- @param probe the probe specifications and related informations +-- @param probe the probe specifications and related information local function send_probe(scanner, probe) local try = nmap.new_try(function() scanner.sock:ip_close() end) @@ -918,7 +918,7 @@ local function send_probe(scanner, probe) try(scanner.sock:ip_send(pkt.buf, scanner.target)) - -- update probe informations + -- update probe information probe.retry = probe.retry + 1 probe.sent_time = nmap.clock_ms() diff --git a/scripts/flume-master-info.nse b/scripts/flume-master-info.nse index 294922fbb..8e1714876 100644 --- a/scripts/flume-master-info.nse +++ b/scripts/flume-master-info.nse @@ -110,7 +110,7 @@ function table_count(tt, item) return count end -parse_page = function( host, port, uri, intresting_keys ) +parse_page = function( host, port, uri, interesting_keys ) local result = {} local response = http.get( host, port, uri ) stdnse.print_debug(1, "%s: Status %s", @@ -125,7 +125,7 @@ parse_page = function( host, port, uri, intresting_keys ) if nmap.verbosity() > 1 then result[#result+1] = ("%s: %s"):format(name,value:gsub("^%s*(.-)%s*$", "%1")) else - for i,v in ipairs(intresting_keys) do + for i,v in ipairs(interesting_keys) do if name:match(("^%s"):format(v)) then result[#result+1] = ("%s: %s"):format(name,value:gsub("^%s*(.-)%s*$", "%1")) end diff --git a/scripts/ftp-vuln-cve2010-4221.nse b/scripts/ftp-vuln-cve2010-4221.nse index 47f2c9654..897d2fc4a 100644 --- a/scripts/ftp-vuln-cve2010-4221.nse +++ b/scripts/ftp-vuln-cve2010-4221.nse @@ -34,7 +34,7 @@ Reference: -- | Description: -- | ProFTPD server (version 1.3.2rc3 through 1.3.3b) is vulnerable to -- | stack-based buffer overflow. By sending a large number of TELNET_IAC --- | escape sequence, a remote attacker will be able to corrup the stack and +-- | escape sequence, a remote attacker will be able to corrupt the stack and -- | execute arbitrary code. -- | Disclosure date: 2010-11-02 -- | References: @@ -180,7 +180,7 @@ action = function(host, port) description = [[ ProFTPD server (version 1.3.2rc3 through 1.3.3b) is vulnerable to stack-based buffer overflow. By sending a large number of TELNET_IAC -escape sequence, a remote attacker will be able to corrup the stack and +escape sequence, a remote attacker will be able to corrupt the stack and execute arbitrary code.]], references = { 'http://bugs.proftpd.org/show_bug.cgi?id=3521', diff --git a/scripts/gkrellm-info.nse b/scripts/gkrellm-info.nse index f9c4773b2..83e542506 100644 --- a/scripts/gkrellm-info.nse +++ b/scripts/gkrellm-info.nse @@ -161,7 +161,7 @@ action = function(host, port) -- If there's an error we get a response back, and only then local status, data = socket:receive_buf("\n", false) if( status and data ~= "" ) then - return fail("An unknown error occured, aborting ...") + return fail("An unknown error occurred, aborting ...") elseif ( status ) then status, data = socket:receive_buf("\n", false) if ( status ) then diff --git a/scripts/hbase-master-info.nse b/scripts/hbase-master-info.nse index 68bb54eda..3f8e69c51 100644 --- a/scripts/hbase-master-info.nse +++ b/scripts/hbase-master-info.nse @@ -12,7 +12,7 @@ Retrieves information from an Apache HBase (Hadoop database) master HTTP status Information gathered: * Hbase version * Hbase compile date - * Hbase root eirectory + * Hbase root directory * Hadoop version * Hadoop compile date * Average load diff --git a/scripts/http-brute.nse b/scripts/http-brute.nse index 6289ea636..6c5004492 100644 --- a/scripts/http-brute.nse +++ b/scripts/http-brute.nse @@ -62,7 +62,7 @@ Driver = { end, connect = function( self ) - -- This will cause problems, as ther is no way for us to "reserve" + -- This will cause problems, as there is no way for us to "reserve" -- a socket. We may end up here early with a set of credentials -- which won't be guessed until the end, due to socket exhaustion. return true diff --git a/scripts/http-comments-displayer.nse b/scripts/http-comments-displayer.nse index cf680c878..caa5df6b4 100644 --- a/scripts/http-comments-displayer.nse +++ b/scripts/http-comments-displayer.nse @@ -13,7 +13,7 @@ Extracts and outputs HTML and JavaScript comments from HTTP responses. -- Default: nil (crawler mode on) -- @args http-comments-displayer.context declares the number of chars -- to extend our final strings. This is useful when we need to --- to see the code that the comments are reffering to. +-- to see the code that the comments are referring to. -- Default: 0, Maximum Value: 50 -- -- @@ -52,7 +52,7 @@ PATTERNS = { portrule = shortport.port_or_service( {80, 443}, {"http", "https"}, "tcp", "open") --- Returns comment's line number by counting the occurences of the +-- Returns comment's line number by counting the occurrences of the -- new line character ("\n") from the start of the HTML file until -- the related comment. local getLineNumber = function(body, comment) diff --git a/scripts/http-csrf.nse b/scripts/http-csrf.nse index 70c8ef603..449971ce6 100644 --- a/scripts/http-csrf.nse +++ b/scripts/http-csrf.nse @@ -10,7 +10,7 @@ will also calculate the entropy of each attribute's value. A big entropy means a possible token. A common use case for this script comes along with a cookie that gives access -in pages that require authentication, because that's where the priviledged +in pages that require authentication, because that's where the privileged exist. See the http library's documentation to set your own cookie. ]] @@ -31,15 +31,15 @@ exist. See the http library's documentation to set your own cookie. -- | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=some-very-random-page.com -- | Found the following CSRF vulnerabilities: -- | --- | Path: http://www.some-very-random-page.com/ +-- | Path: http://www.example.com/ -- | Form id: search_bar_input -- | Form action: /search -- | --- | Path: http://www.some-very-random-page.com/c/334/watches.html +-- | Path: http://www.example.com/c/334/watches.html -- | Form id: custom_price_filters -- | Form action: /search -- | --- | Path: http://www.some-very-radom-page.com/c/334/watches.html +-- | Path: http://www.example.com/c/334/watches.html -- | Form id: custom_price_filters -- |_ Form action: /c/334/rologia-xeiros-watches.html -- diff --git a/scripts/http-default-accounts.nse b/scripts/http-default-accounts.nse index 1639836ab..c1f9870db 100644 --- a/scripts/http-default-accounts.nse +++ b/scripts/http-default-accounts.nse @@ -69,7 +69,7 @@ portrule = shortport.http --validate_fingerprints(fingerprints) --Returns an error string if there is something wrong with --fingerprint table. ---Modified's version of http-enums validation code +--Modified version of http-enums validation code --@param fingerprints Fingerprint table --@return Error string if its an invalid fingerprint table --- diff --git a/scripts/http-domino-enum-passwords.nse b/scripts/http-domino-enum-passwords.nse index 797301822..28b6571c5 100644 --- a/scripts/http-domino-enum-passwords.nse +++ b/scripts/http-domino-enum-passwords.nse @@ -15,7 +15,7 @@ also download any Domino ID Files attached to the Person document. -- @usage -- nmap --script domino-enum-passwords -p 80 --script-args domino-enum-passwords.username='patrik karlsson',domino-enum-passwords.password=secret -- --- This script attempts to enumerate the password hashes used to authenitcate +-- This script attempts to enumerate the password hashes used to authenticate -- to the Lotus Domino Web interface. By default, these hashes are accessible -- to every authenticated user. Passwords are presented in a form suitable for -- running in John the Ripper. @@ -115,7 +115,7 @@ end -- -- @param host table as received by the action function or the name specified -- in the hostname argument --- @param port as recieved by the action method +-- @param port as received by the action method -- @param path the patch against which to validate the credentials -- @param user the username used for authentication -- @param pass the password used for authentication @@ -133,9 +133,9 @@ end --- Retrieves all uniq links in a pages -- --- @param body the html content of the recieved page +-- @param body the html content of the received page -- @param filter a filter to use for additional link filtering --- @param links [optional] table containing previousy retrieved links +-- @param links [optional] table containing previously retrieved links -- @return links table containing retrieved links local function getLinks( body, filter, links ) local tmp = {} @@ -164,7 +164,7 @@ end --- Retrieves the "next page" path from the returned document -- --- @param body the html content of the recieved page +-- @param body the html content of the received page -- @return link to next page local function getPager( body ) return body:match(" -- Revised 05/23/2011 - v0.2 - changed so that uservar is optional --- Revised 06/05/2011 - v0.3 - major re-write, added onsucces, onfailure and +-- Revised 06/05/2011 - v0.3 - major re-write, added onsuccess, onfailure and -- support for redirects -- @@ -96,7 +96,7 @@ Driver = { end, connect = function( self ) - -- This will cause problems, as ther is no way for us to "reserve" + -- This will cause problems, as there is no way for us to "reserve" -- a socket. We may end up here early with a set of credentials -- which won't be guessed until the end, due to socket exhaustion. return true diff --git a/scripts/http-icloud-sendmsg.nse b/scripts/http-icloud-sendmsg.nse index f74edbeca..1321c0182 100644 --- a/scripts/http-icloud-sendmsg.nse +++ b/scripts/http-icloud-sendmsg.nse @@ -85,7 +85,7 @@ action = function() end if ( not(arg_deviceindex) and not(arg_listdevices) ) then - return fail("No device ID was specificed") + return fail("No device ID was specified") end if ( 1 == tonumber(arg_listdevices) or "true" == arg_listdevices ) then diff --git a/scripts/http-iis-webdav-vuln.nse b/scripts/http-iis-webdav-vuln.nse index 2cca54d55..c07cb9a76 100644 --- a/scripts/http-iis-webdav-vuln.nse +++ b/scripts/http-iis-webdav-vuln.nse @@ -48,7 +48,7 @@ local enum_results = UNKNOWN = 3 } ----Sends a PROPFIND request to the given host, and for the given folder. Returns a table reprenting a response. +---Sends a PROPFIND request to the given host, and for the given folder. Returns a table representing a response. local function get_response(host, port, folder) local webdav_req = '' diff --git a/scripts/http-method-tamper.nse b/scripts/http-method-tamper.nse index a136a4a31..96c3af1f1 100644 --- a/scripts/http-method-tamper.nse +++ b/scripts/http-method-tamper.nse @@ -9,7 +9,7 @@ The script determines if the protected URI is vulnerable by performing HTTP verb for PHP servers ). If the table paths is set, it will attempt to access the given URIs. Otherwise, a web crawler -is initiated to try to find protected resources. Note that in a PHP environment with .htacess files you need to specify a +is initiated to try to find protected resources. Note that in a PHP environment with .htaccess files you need to specify a path to a file rather than a directory to find misconfigured .htaccess files. References: @@ -46,7 +46,7 @@ References: -- | http://capec.mitre.org/data/definitions/274.html -- |_ https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29 -- --- @args http-method-tamper.uri Base URI to crawl. Not aplicable if http-method-tamper.paths is set. +-- @args http-method-tamper.uri Base URI to crawl. Not applicable if http-method-tamper.paths is set. -- @args http-method-tamper.paths Array of paths to check. If not set, the script will crawl the web server. -- @args http-method-tamper.timeout Web crawler timeout. Default: 10s --- diff --git a/scripts/http-methods.nse b/scripts/http-methods.nse index 62e326f80..f48c8b533 100644 --- a/scripts/http-methods.nse +++ b/scripts/http-methods.nse @@ -66,7 +66,7 @@ action = function(host, port) local url_path, retest_http_methods local response, methods, options_status_line, output - -- default vaules for script-args + -- default values for script-args url_path = stdnse.get_script_args("http-methods.url-path") or "/" retest_http_methods = stdnse.get_script_args("http-methods.retest") ~= nil diff --git a/scripts/http-open-proxy.nse b/scripts/http-open-proxy.nse index f763f94d3..33e636a95 100644 --- a/scripts/http-open-proxy.nse +++ b/scripts/http-open-proxy.nse @@ -49,7 +49,7 @@ categories = {"default", "discovery", "external", "safe"} -- @param port The port table -- @param test_url The url te send the request -- @param pattern The pattern to check for valid result --- @return status (if any request was succeded +-- @return status if any request succeeded -- @return response String with supported methods function custom_test(host, port, test_url, pattern) local lstatus = false @@ -96,7 +96,7 @@ end -- -- @param host The host table -- @param port The port table --- @return status (if any request was succeded +-- @return status if any request succeeded -- @return response String with supported methods function default_test(host, port) local fstatus = false diff --git a/scripts/http-passwd.nse b/scripts/http-passwd.nse index e9dbd5b32..4ba8bf2b1 100644 --- a/scripts/http-passwd.nse +++ b/scripts/http-passwd.nse @@ -109,7 +109,7 @@ end --- Formats output. --@param passwd passwd or boot.ini file. ---@param dir Formatted request which elicited the good reponse. +--@param dir Formatted request which elicited the good response. --@return String description for output local output = function(passwd, dir) local trunc, len = truncatePasswd(passwd) diff --git a/scripts/http-referer-checker.nse b/scripts/http-referer-checker.nse index 8a3d1d0f7..7d8835e4b 100644 --- a/scripts/http-referer-checker.nse +++ b/scripts/http-referer-checker.nse @@ -5,7 +5,7 @@ third-party entities. ]] --- --- @usage nmap -p80 --script http-refferer-checker.nse +-- @usage nmap -p80 --script http-referer-checker.nse -- -- This script informs about cross-domain include of scripts by -- finding src attributes that point to a different domain. diff --git a/scripts/http-robtex-reverse-ip.nse b/scripts/http-robtex-reverse-ip.nse index 3c28d7f51..d997054f0 100644 --- a/scripts/http-robtex-reverse-ip.nse +++ b/scripts/http-robtex-reverse-ip.nse @@ -42,7 +42,7 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} ---- Scrape reverse ip informations from robtex website +--- Scrape reverse ip information from robtex website -- @param data string containing the retrieved web page -- @return table containing the resolved host names function parse_robtex_response(data) diff --git a/scripts/http-sitemap-generator.nse b/scripts/http-sitemap-generator.nse index 2249f89c7..614031402 100644 --- a/scripts/http-sitemap-generator.nse +++ b/scripts/http-sitemap-generator.nse @@ -98,8 +98,8 @@ end local function internal_table_to_output(t) local output = {} for _,dir in ipairs(t) do - local ext_and_occurences = sort_by_keys(dir[2]) - output[#output+1] = {name=dir[1], table.concat(ext_and_occurences, "; ")} + local ext_and_occurrences = sort_by_keys(dir[2]) + output[#output+1] = {name=dir[1], table.concat(ext_and_occurrences, "; ")} end return output end diff --git a/scripts/http-slowloris.nse b/scripts/http-slowloris.nse index 96c54b9c9..e9e3cf658 100644 --- a/scripts/http-slowloris.nse +++ b/scripts/http-slowloris.nse @@ -83,7 +83,7 @@ local Reason = "slowloris" -- DoSed due to slowloris attack or something else local Bestopt --- get time (in miliseconds) when the script should finish +-- get time (in milliseconds) when the script should finish local function get_end_time() if TimeLimit == nil then return -1 diff --git a/scripts/http-sql-injection.nse b/scripts/http-sql-injection.nse index 27246c727..83f831fed 100644 --- a/scripts/http-sql-injection.nse +++ b/scripts/http-sql-injection.nse @@ -87,7 +87,7 @@ local function check_injection_response(response) end --[[ -Replaces usual queries with malicious querie and return a table with them. +Replaces usual queries with malicious query and return a table with them. ]]-- local function build_injection_vector(urls) diff --git a/scripts/http-stored-xss.nse b/scripts/http-stored-xss.nse index 091d8b70c..777eae538 100644 --- a/scripts/http-stored-xss.nse +++ b/scripts/http-stored-xss.nse @@ -1,7 +1,7 @@ description = [[ Posts specially crafted strings to every form it encounters and then searches through the website for those -strings to determine whether the payloads were succesful. +strings to determine whether the payloads were successful. ]] --- @@ -118,7 +118,7 @@ local checkPayload = function(body, p) end --- Check if the payloads were succesfull by checking the content of pages in the uploadspaths array. +-- Check if the payloads were successful by checking the content of pages in the uploadspaths array. local checkRequests = function(body, target) local output = {} diff --git a/scripts/http-tplink-dir-traversal.nse b/scripts/http-tplink-dir-traversal.nse index e54e485e2..c990211ed 100644 --- a/scripts/http-tplink-dir-traversal.nse +++ b/scripts/http-tplink-dir-traversal.nse @@ -26,7 +26,7 @@ Other interesting files: -- | State: VULNERABLE (Exploitable) -- | Description: -- | Some TP-Link wireless routers are vulnerable to a path traversal vulnerability that allows attackers to read configurations or any other file in the device. --- | This vulnerability can be exploited remotely and without authenticatication. +-- | This vulnerability can be exploited remotely and without authentication. -- | Confirmed vulnerable models: WR740N, WR740ND, WR2543ND -- | Possibly vulnerable (Based on the same firmware): WR743ND,WR842ND,WA-901ND,WR941N,WR941ND,WR1043ND,MR3220,MR3020,WR841N. -- | Disclosure date: 2012-06-18 @@ -115,7 +115,7 @@ action = function(host, port) state = vulns.STATE.NOT_VULN, description = [[ Some TP-Link wireless routers are vulnerable to a path traversal vulnerability that allows attackers to read configurations or any other file in the device. -This vulnerability can be exploited without authenticatication. +This vulnerability can be exploited without authentication. Confirmed vulnerable models: WR740N, WR740ND, WR2543ND Possibly vulnerable (Based on the same firmware): WR743ND,WR842ND,WA-901ND,WR941N,WR941ND,WR1043ND,MR3220,MR3020,WR841N.]], references = { diff --git a/scripts/http-useragent-tester.nse b/scripts/http-useragent-tester.nse index 45ebb6d84..005024cfe 100644 --- a/scripts/http-useragent-tester.nse +++ b/scripts/http-useragent-tester.nse @@ -1,14 +1,14 @@ description = [[ -Checks if various crawling ultities are allowed by the host. +Checks if various crawling utilities are allowed by the host. ]] --- -- @usage nmap -p80 --script http-useragent-tester.nse -- -- This script sets various User-Agent headers that are used by different --- ultities and crawling libraries (for example CURL or wget). If the request is +-- utilities and crawling libraries (for example CURL or wget). If the request is -- redirected to a page different than a (valid) browser request would be, that --- means that this ultity is banned. +-- means that this utility is banned. -- -- @args http-useragent-tester.useragents A table with more User-Agent headers. -- Default: nil diff --git a/scripts/http-virustotal.nse b/scripts/http-virustotal.nse index cb22912df..1e8633d59 100644 --- a/scripts/http-virustotal.nse +++ b/scripts/http-virustotal.nse @@ -225,7 +225,7 @@ action = function() resource = json_data['resource'] local output = {} - table.insert(output, "Your file was succesfully uploaded and placed in the scanning queue.") + table.insert(output, "Your file was successfully uploaded and placed in the scanning queue.") table.insert(output, { name = "To check the current status visit:", json_data['permalink'] }) return stdnse.format_output(true, output) elseif ( arg_filename ) then @@ -248,7 +248,7 @@ action = function() end if ( not(response.response_code) or 0 == tonumber(response.response_code) ) then - return fail(("Failed to retreive scan report for resource: %s"):format(resource)) + return fail(("Failed to retrieve scan report for resource: %s"):format(resource)) end return stdnse.format_output(true, parseScanReport(response)) diff --git a/scripts/http-vmware-path-vuln.nse b/scripts/http-vmware-path-vuln.nse index 735d78faa..a06076364 100644 --- a/scripts/http-vmware-path-vuln.nse +++ b/scripts/http-vmware-path-vuln.nse @@ -62,7 +62,7 @@ local function fake_xml_parse(str, tag) -- Lowercase the 'body' we're searching local lc = string.lower(str) - -- Lowrcase the tag + -- Lowercase the tag tag = string.lower(tag) -- This loop does some ugly pattern-based xml parsing diff --git a/scripts/http-vuln-cve2011-3192.nse b/scripts/http-vuln-cve2011-3192.nse index 1b20e2528..44cdb11fa 100644 --- a/scripts/http-vuln-cve2011-3192.nse +++ b/scripts/http-vuln-cve2011-3192.nse @@ -41,7 +41,7 @@ References: -- 2011-08-29 Duarte Silva -- - Removed the "Accept-Encoding" HTTP header -- - Removed response header printing --- * Changes based on Henri Doreau and David Fifield sugestions +-- * Changes based on Henri Doreau and David Fifield suggestions -- 2011-08-20 Duarte Silva -- * First version ;) -- 2011-11-07 Henri Doreau diff --git a/scripts/http-vuln-cve2011-3368.nse b/scripts/http-vuln-cve2011-3368.nse index 568aa5967..8a41338a0 100644 --- a/scripts/http-vuln-cve2011-3368.nse +++ b/scripts/http-vuln-cve2011-3368.nse @@ -125,7 +125,7 @@ servers to remote users who send carefully crafted requests.]], { prefix = ":", suffix = ":80"} } - -- try a bunch of hosts, and hope we hit one thats + -- try a bunch of hosts, and hope we hit one that's -- not on the network, this will give us the delay we're expecting local hosts = { "10.10.10.10", diff --git a/scripts/http-waf-detect.nse b/scripts/http-waf-detect.nse index 727815b77..c5bf576ca 100644 --- a/scripts/http-waf-detect.nse +++ b/scripts/http-waf-detect.nse @@ -110,7 +110,7 @@ action = function(host, port) if payload_example and ( string.len(payload_example) > string.len(attack_vectors_n1[i]) ) then payload_example = attack_vectors_n1[i] end - stdnse.print_debug(2, "Payload:%s trigerred the IDS/IPS/WAF", attack_vectors_n1[i]) + stdnse.print_debug(2, "Payload:%s triggered the IDS/IPS/WAF", attack_vectors_n1[i]) if res.status and res.body then stdnse.print_debug(3, "Status:%s Body:%s\n", res.status, res.body) end diff --git a/scripts/http-waf-fingerprint.nse b/scripts/http-waf-fingerprint.nse index edf543567..ee9042744 100644 --- a/scripts/http-waf-fingerprint.nse +++ b/scripts/http-waf-fingerprint.nse @@ -41,7 +41,7 @@ categories = {"discovery", "intrusive"} -- Version 0.1: -- - Initial version based on work done with wafw00f and w3af. -- - Removed many false positives. --- - Added fingeprints for WAFs such as Incapsula WAF, Cloudflare, USP-SES, +-- - Added fingerprints for WAFs such as Incapsula WAF, Cloudflare, USP-SES, -- Cisco ACE XML Gateway and ModSecurity. -- - Added fingerprints and version detection for Webknight and BinarySec, -- Citrix Netscaler and ModSecurity @@ -342,7 +342,7 @@ netscaler = { end if response.header.cneonction == "close" or response.header.nncoection == "close" then - if not netscaler.detected then stdnse.print_debug("%s Netscaler detected through Cneoction/nnCoection header.", SCRIPT_NAME) end + if not netscaler.detected then stdnse.print_debug("%s Netscaler detected through Cneonction/nnCoection header.", SCRIPT_NAME) end netscaler.detected = true end @@ -535,7 +535,7 @@ naxsi = { end, intensive = function(host, port, root, responses) -- Credit to Henri Doreau - local response = http.get(host, port, root .. "?a=[") -- This shouldn't trigget the rules + local response = http.get(host, port, root .. "?a=[") -- This shouldn't trigger the rules local response2 = http.get(host, port, root .. "?a=[[[]]]][[[]") -- This should trigger the score based rules if response.status ~= response2.status then @@ -595,9 +595,9 @@ local send_requests = function(host, port, root) all = http.pipeline_add(root, nil, all, "GET") table.insert(requests,"normal") - -- Normal inexisting + -- Normal nonexistent all = http.pipeline_add(root .. "asofKlj", nil, all, "GET") - table.insert(requests,"inexisting") + table.insert(requests,"nonexistent") -- Invalid Method all = http.pipeline_add(root, nil, all, "ASDE") diff --git a/scripts/http-wordpress-brute.nse b/scripts/http-wordpress-brute.nse index 48ada5d6e..52b48ed88 100644 --- a/scripts/http-wordpress-brute.nse +++ b/scripts/http-wordpress-brute.nse @@ -79,7 +79,7 @@ Driver = { end, connect = function( self ) - -- This will cause problems, as ther is no way for us to "reserve" + -- This will cause problems, as there is no way for us to "reserve" -- a socket. We may end up here early with a set of credentials -- which won't be guessed until the end, due to socket exhaustion. return true diff --git a/scripts/http-wordpress-plugins.nse b/scripts/http-wordpress-plugins.nse index 0a630722f..316d82683 100644 --- a/scripts/http-wordpress-plugins.nse +++ b/scripts/http-wordpress-plugins.nse @@ -11,7 +11,7 @@ description = [[ Tries to obtain a list of installed WordPress plugins by brute force testing for known plugins. -The script will brute force the /wp-content/plugins/ folder with a dictionnary +The script will brute force the /wp-content/plugins/ folder with a dictionary of 14K (and counting) known WP plugins. Anything but a 404 means that a given plugin directory probably exists, so the plugin probably also does. diff --git a/scripts/ip-geolocation-maxmind.nse b/scripts/ip-geolocation-maxmind.nse index b42eba5c6..fa57f1d52 100644 --- a/scripts/ip-geolocation-maxmind.nse +++ b/scripts/ip-geolocation-maxmind.nse @@ -566,7 +566,7 @@ local GeoIP = { x[i] = x[i] + bit.lshift(buf:byte((self._recordLength * i + j) +1 ), j*8) end end - -- Gotta test this out thorougly because of the ipnum + -- Gotta test this out thoroughly because of the ipnum if bit.band(ipnum, bit.lshift(1,depth)) ~= 0 then if x[1] >= self._databaseSegments then return x[1] diff --git a/scripts/ipidseq.nse b/scripts/ipidseq.nse index 9f623636c..ef712a585 100644 --- a/scripts/ipidseq.nse +++ b/scripts/ipidseq.nse @@ -10,7 +10,7 @@ Classifies a host's IP ID sequence (test for susceptibility to idle scan). Sends six probes to obtain IP IDs from the target and classifies them -similiarly to Nmap's method. This is useful for finding suitable zombies +similarly to Nmap's method. This is useful for finding suitable zombies for Nmap's idle scan (-sI) as Nmap itself doesn't provide a way to scan for these hosts. ]] diff --git a/scripts/ipv6-ra-flood.nse b/scripts/ipv6-ra-flood.nse index e9b5ca0b5..523240bc6 100644 --- a/scripts/ipv6-ra-flood.nse +++ b/scripts/ipv6-ra-flood.nse @@ -110,7 +110,7 @@ local function build_router_advert(mac_src,prefix,prefix_len,valid_time,preferre local prefix_option_msg = string.char(prefix_len, 0xc0) .. --flags: Onlink, Auto packet.set_u32("....", 0, valid_time) .. -- valid lifetime - packet.set_u32("....", 0, preferred_time) .. -- preffered lifetime + packet.set_u32("....", 0, preferred_time) .. -- preferred lifetime string.char(0,0,0,0) .. --unknown prefix @@ -145,7 +145,7 @@ local function broadcast_on_interface(iface) --- maximum possible value of 4-byte integer local valid_time = tonumber(0xffffffff) - local preffered_time = tonumber(0xffffffff) + local preferred_time = tonumber(0xffffffff) local mtu = 1500 @@ -165,7 +165,7 @@ local function broadcast_on_interface(iface) packet.ip_bin_src = src_ip6_addr packet.ip_bin_dst = dst_ip6_addr - local icmpv6_payload = build_router_advert(src_mac, prefix, prefix_len, valid_time, preffered_time, mtu) + local icmpv6_payload = build_router_advert(src_mac, prefix, prefix_len, valid_time, preferred_time, mtu) packet:build_icmpv6_header(134, 0, icmpv6_payload) packet:build_ipv6_packet() packet:build_ether_frame() diff --git a/scripts/irc-unrealircd-backdoor.nse b/scripts/irc-unrealircd-backdoor.nse index 58e990711..1d33639e5 100644 --- a/scripts/irc-unrealircd-backdoor.nse +++ b/scripts/irc-unrealircd-backdoor.nse @@ -72,7 +72,7 @@ action = function(host, port) local delay = 8 -- If the command takes (delay - delay_fudge) or more seconds, the server is vulnerable. - -- I defined the furdge as 1 second, for now, just because of rounding issues. In practice, + -- I defined the fudge as 1 second, for now, just because of rounding issues. In practice, -- the actual delay should never be shorter than the given delay, only longer. local delay_fudge = 1 diff --git a/scripts/krb5-enum-users.nse b/scripts/krb5-enum-users.nse index 0d67187e0..b4c4f5b43 100644 --- a/scripts/krb5-enum-users.nse +++ b/scripts/krb5-enum-users.nse @@ -10,7 +10,7 @@ local unpwdb = require "unpwdb" description = [[ Discovers valid usernames by brute force querying likely usernames against a Kerberos service. -When an invalid username is requested the server will responde using the +When an invalid username is requested the server will respond using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine that the user name was invalid. Valid user names will illicit either the TGT in a AS-REP response or the error KRB5KDC_ERR_PREAUTH_REQUIRED, signaling diff --git a/scripts/ldap-novell-getpass.nse b/scripts/ldap-novell-getpass.nse index e929d93e3..23f51021b 100644 --- a/scripts/ldap-novell-getpass.nse +++ b/scripts/ldap-novell-getpass.nse @@ -119,7 +119,7 @@ function action(host,port) local respname = ( #response >= 5 ) and response[5] if ( rescode ~= 0 ) then - local errmsg = ( #response >= 4 ) and response[4] or "An unknown error occured" + local errmsg = ( #response >= 4 ) and response[4] or "An unknown error occurred" return "\n ERROR: " .. errmsg end diff --git a/scripts/ldap-search.nse b/scripts/ldap-search.nse index 64cc9b0af..559e823c7 100644 --- a/scripts/ldap-search.nse +++ b/scripts/ldap-search.nse @@ -84,7 +84,7 @@ anonymous bind will be used as a last attempt. -- Created 01/12/2010 - v0.1 - created by Patrik Karlsson -- Revised 01/20/2010 - v0.2 - added SSL support -- Revised 01/26/2010 - v0.3 - Changed SSL support to comm.tryssl, prefixed arguments with ldap, changes in determination of namingContexts --- Revised 02/17/2010 - v0.4 - Added dependencie to ldap-brute and the abilitity to check for ldap accounts (credentials) stored in nmap registry +-- Revised 02/17/2010 - v0.4 - Added dependency to ldap-brute and the abilitity to check for ldap accounts (credentials) stored in nmap registry -- Capped output to 20 entries, use ldap.maxObjects to override -- Revised 07/16/2010 - v0.5 - Fixed bug with empty contexts, added objectClass person to qfilter users, add error msg for invalid credentials -- Revised 09/05/2011 - v0.6 - Added support for saving searches to a file via argument ldap.savesearch diff --git a/scripts/llmnr-resolve.nse b/scripts/llmnr-resolve.nse index 15a6ac485..0f4d46813 100644 --- a/scripts/llmnr-resolve.nse +++ b/scripts/llmnr-resolve.nse @@ -122,7 +122,7 @@ local llmnrListen = function(interface, timeout, result) -- Now, answer record local response, alen = {} index, alen = bin.unpack(">C", llmnr, index) - -- Extract hostname with the correct case sensivity. + -- Extract hostname with the correct case sensitivity. index, response.hostname = bin.unpack(">A".. alen, llmnr, index) -- skip null byte, type, class, ttl, dlen diff --git a/scripts/maxdb-info.nse b/scripts/maxdb-info.nse index 391051034..015de42a7 100644 --- a/scripts/maxdb-info.nse +++ b/scripts/maxdb-info.nse @@ -91,7 +91,7 @@ end -- Parses and decodes the raw version response from the server -- @param data string containing the raw response --- @return version_info table containining a number of dynamic fields based on +-- @return version_info table containing a number of dynamic fields based on -- the response from the server. The fields typically include: -- VERSION, BUILD, OS, -- INSTROOT,LOGON, CODE, diff --git a/scripts/mcafee-epo-agent.nse b/scripts/mcafee-epo-agent.nse index 09f879cc0..a33aa9e74 100644 --- a/scripts/mcafee-epo-agent.nse +++ b/scripts/mcafee-epo-agent.nse @@ -5,7 +5,7 @@ -- History: -- 2012/05/31: Start -- 2012/06/01: extracting data from XML; tested with ePO 4.5 and 4.6 --- 2012/06/05: V0.0.2 convertion to version script by Daniel Miller +-- 2012/06/05: V0.0.2 conversion to version script by Daniel Miller -- 2012/06/20: new portrule by Daniel Miller description = [[ diff --git a/scripts/metasploit-info.nse b/scripts/metasploit-info.nse index 342d59aa6..3e61ab0df 100644 --- a/scripts/metasploit-info.nse +++ b/scripts/metasploit-info.nse @@ -76,13 +76,13 @@ local encode_auth = function(username, password) return bin.pack("C",0x93) .. bin.pack("C",0xaa) .. method .. get_prefix(username) .. username .. get_prefix(password) .. password end --- returns a msgpacked data for any method without exstra parameters +-- returns a msgpacked data for any method without extra parameters local encode_noparam = function(token,method) -- token is always the same length return bin.pack("C",0x92) .. get_prefix(method) .. method .. bin.pack("H","da0020") .. token end --- does the actuall call with specified, pre-packed data +-- does the actual call with specified, pre-packed data -- and returns the response local msgrpc_call = function(host, port, msg) local data @@ -98,7 +98,7 @@ local msgrpc_call = function(host, port, msg) return nil end --- auth.login wraper, returns the auth token +-- auth.login wrapper, returns the auth token local login = function(username, password,host,port) local data = msgrpc_call(host, port, encode_auth(username,password)) @@ -107,7 +107,7 @@ local login = function(username, password,host,port) local start = string.find(data,"success") if start > -1 then -- get token - local token = string.sub(string.sub(data,start),17) -- "manualy" unpack token + local token = string.sub(string.sub(data,start),17) -- "manually" unpack token return true, token else return false, nil @@ -117,7 +117,7 @@ local login = function(username, password,host,port) return false, nil end --- core.version wraper, returns version info, and sets the OS type +-- core.version wrapper, returns version info, and sets the OS type -- so we can decide which commands to send later local get_version = function(host, port, token) local msg = encode_noparam(token,"core.version") @@ -160,7 +160,7 @@ local get_version = function(host, port, token) return nil end --- console.create wraper, returns console_id +-- console.create wrapper, returns console_id -- which we can use to interact with metasploit further local create_console = function(host,port,token) local msg = encode_noparam(token,"console.create") @@ -181,7 +181,7 @@ local create_console = function(host,port,token) end --- console.read wraper +-- console.read wrapper local read_console = function(host,port,token,console_id) local msg = encode_console_read("console.read",token,console_id) local data = msgrpc_call(host, port, msg) @@ -204,7 +204,7 @@ local read_console = function(host,port,token,console_id) end end --- console.write wraper +-- console.write wrapper local write_console = function(host,port,token,console_id,command) local msg = encode_console_write("console.write",token,console_id,command .. "\n") local data = msgrpc_call(host, port, msg) @@ -215,7 +215,7 @@ local write_console = function(host,port,token,console_id,command) return false end --- console.destroy wraper, just to be nice, we don't want console to hang ... +-- console.destroy wrapper, just to be nice, we don't want console to hang ... local destroy_console = function(host,port,token,console_id) local msg = encode_console_read("console.destroy",token,console_id) local data = msgrpc_call(host, port, msg) diff --git a/scripts/metasploit-msgrpc-brute.nse b/scripts/metasploit-msgrpc-brute.nse index b2ef018a2..993abec58 100644 --- a/scripts/metasploit-msgrpc-brute.nse +++ b/scripts/metasploit-msgrpc-brute.nse @@ -17,7 +17,7 @@ Metasploit msgrpc interface. -- nmap --script metasploit-msgrpc-brute -p 55553 -- -- This script uses brute library to perform password --- guessing agains Metasploit's msgrpc interface. +-- guessing against Metasploit's msgrpc interface. -- -- -- @output diff --git a/scripts/mmouse-brute.nse b/scripts/mmouse-brute.nse index a5942972d..35d356599 100644 --- a/scripts/mmouse-brute.nse +++ b/scripts/mmouse-brute.nse @@ -74,7 +74,7 @@ Driver = { return true, brute.Account:new("", password, creds.State.VALID) end - local err = brute.Error:new("An unexpected error occured, retrying ...") + local err = brute.Error:new("An unexpected error occurred, retrying ...") err:setRetry(true) return false, err end, diff --git a/scripts/mongodb-databases.nse b/scripts/mongodb-databases.nse index b3fd6b078..53f8b2953 100644 --- a/scripts/mongodb-databases.nse +++ b/scripts/mongodb-databases.nse @@ -64,7 +64,7 @@ function action(host,port) try( socket:connect(host, port) ) - -- uglyness to allow creds.mongodb to work, as the port is not recognized + -- ugliness to allow creds.mongodb to work, as the port is not recognized -- as mongodb, unless a service scan was run local ps = port.service port.service = 'mongodb' diff --git a/scripts/mongodb-info.nse b/scripts/mongodb-info.nse index e5e7cbb91..f1b201e42 100644 --- a/scripts/mongodb-info.nse +++ b/scripts/mongodb-info.nse @@ -81,7 +81,7 @@ function action(host,port) local req, statusresponse, buildinfo, err - -- uglyness to allow creds.mongodb to work, as the port is not recognized + -- ugliness to allow creds.mongodb to work, as the port is not recognized -- as mongodb, unless a service scan was run local ps = port.service port.service = 'mongodb' diff --git a/scripts/mrinfo.nse b/scripts/mrinfo.nse index 32ce66847..1bbdf8c6b 100644 --- a/scripts/mrinfo.nse +++ b/scripts/mrinfo.nse @@ -111,8 +111,8 @@ local mrinfoParse = function(data) address.ip = ipOps.fromdword(address.ip) -- Link metric index, address.metric = bin.unpack(">C", data, index) - -- Treshold - index, address.treshold= bin.unpack(">C", data, index) + -- Threshold + index, address.threshold= bin.unpack(">C", data, index) -- Flags index, address.flags = bin.unpack(">C", data, index) -- Number of neighbors diff --git a/scripts/ms-sql-info.nse b/scripts/ms-sql-info.nse index 2ab52b005..080feb85d 100644 --- a/scripts/ms-sql-info.nse +++ b/scripts/ms-sql-info.nse @@ -31,7 +31,7 @@ Additionally, it provides imprecise version information. * Sending a probe to the instance, causing the instance to respond with information including the exact version number. This is the same method that Nmap uses for service versioning; however, this script can also do the same for -instances accessiable via Windows named pipes, and can target all of the +instances accessible via Windows named pipes, and can target all of the instances listed by the SQL Server Browser service. In the event that the script can connect to the SQL Server Browser service diff --git a/scripts/mtrace.nse b/scripts/mtrace.nse index 58592c1f5..9bca98bf0 100644 --- a/scripts/mtrace.nse +++ b/scripts/mtrace.nse @@ -214,7 +214,7 @@ local traceParse = function(data) if index >= #data then break elseif #data - index < 31 then - stdnse.print_verbose("%s malformated traceroute response.", SCRIPT_NAME) + stdnse.print_verbose("%s malformed traceroute response.", SCRIPT_NAME) return end diff --git a/scripts/mysql-databases.nse b/scripts/mysql-databases.nse index 75480c141..4856c4d5d 100644 --- a/scripts/mysql-databases.nse +++ b/scripts/mysql-databases.nse @@ -71,7 +71,7 @@ action = function( host, port ) end -- - -- Iterates over credentials, breaks once it successfully recieves results + -- Iterates over credentials, breaks once it successfully receives results -- for username, password in pairs(users) do diff --git a/scripts/mysql-enum.nse b/scripts/mysql-enum.nse index 19f03168c..f0731f284 100644 --- a/scripts/mysql-enum.nse +++ b/scripts/mysql-enum.nse @@ -14,7 +14,7 @@ Performs valid-user enumeration against MySQL server using a bug discovered and published by Kingcope (http://seclists.org/fulldisclosure/2012/Dec/9). -Server version 5.x are succeptible to an user enumeration +Server version 5.x are susceptible to an user enumeration attack due to different messages during login when using old authentication mechanism from versions 4.x and earlier. diff --git a/scripts/mysql-users.nse b/scripts/mysql-users.nse index 2687e7b16..cea20fa54 100644 --- a/scripts/mysql-users.nse +++ b/scripts/mysql-users.nse @@ -74,7 +74,7 @@ action = function( host, port ) end -- - -- Iterates over credentials, breaks once it successfully recieves results + -- Iterates over credentials, breaks once it successfully receives results -- for username, password in pairs(users) do diff --git a/scripts/mysql-variables.nse b/scripts/mysql-variables.nse index 33addb210..92564a5c3 100644 --- a/scripts/mysql-variables.nse +++ b/scripts/mysql-variables.nse @@ -83,7 +83,7 @@ action = function( host, port ) end -- - -- Iterates over credentials, breaks once it successfully recieves results + -- Iterates over credentials, breaks once it successfully receives results -- for username, password in pairs(users) do diff --git a/scripts/nat-pmp-info.nse b/scripts/nat-pmp-info.nse index 4c22f001f..5bd08afa6 100644 --- a/scripts/nat-pmp-info.nse +++ b/scripts/nat-pmp-info.nse @@ -4,7 +4,7 @@ local shortport = require "shortport" local stdnse = require "stdnse" description = [[ -Get's the routers WAN IP using the NAT Port Mapping Protocol (NAT-PMP). +Gets the routers WAN IP using the NAT Port Mapping Protocol (NAT-PMP). The NAT-PMP protocol is supported by a broad range of routers including: - Apple AirPort Express - Apple AirPort Extreme diff --git a/scripts/nat-pmp-mapport.nse b/scripts/nat-pmp-mapport.nse index 898b0d528..b9b82a76e 100644 --- a/scripts/nat-pmp-mapport.nse +++ b/scripts/nat-pmp-mapport.nse @@ -34,7 +34,7 @@ o unmapall - unmaps all previously mapped ports for the requesting IP -- choose another port, create the mapping and return the resulting port. -- -- @args nat-pmp-mapport.privport the internal port of the calling IP to map requests --- to. This port will recieve all requests coming in to the external port on the +-- to. This port will receive all requests coming in to the external port on the -- router. -- -- @args nat-pmp-mapport.protocol the protocol to map, can be either tcp or udp. diff --git a/scripts/nbstat.nse b/scripts/nbstat.nse index 244f7269d..9176a669d 100644 --- a/scripts/nbstat.nse +++ b/scripts/nbstat.nse @@ -80,7 +80,7 @@ owns. author = "Brandon Enright, Ron Bowes" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" --- Current version of this script was based entirly on Implementing CIFS, by +-- Current version of this script was based entirely on Implementing CIFS, by -- Christopher R. Hertel. categories = {"default", "discovery", "safe"} diff --git a/scripts/nessus-brute.nse b/scripts/nessus-brute.nse index c61228f26..c7b911602 100644 --- a/scripts/nessus-brute.nse +++ b/scripts/nessus-brute.nse @@ -110,7 +110,7 @@ Driver = end -- we force a brief incorrect statement just to get an error message to - -- confirm that we've succesfully authenticated to the server + -- confirm that we've successfully authenticated to the server local bad_cli_pref = "CLIENT <|> PREFERENCES <|>\n<|> CLIENT\n" status = self.socket:send(bad_cli_pref) if ( not(status) ) then diff --git a/scripts/ntp-monlist.nse b/scripts/ntp-monlist.nse index 2268e9669..f95618693 100644 --- a/scripts/ntp-monlist.nse +++ b/scripts/ntp-monlist.nse @@ -39,8 +39,8 @@ the NTP service. It should be noted that the very nature of the NTP monitor data means that the Mode 7 commands sent by this script are recorded by the target (and will often appear in these results). Since the monitor data is a MRU list, it is probable -that you can overwrite the record of the Mode 7 command by sending an innoccuous -looking Client Mode request. This can be acheived easily using Nmap: +that you can overwrite the record of the Mode 7 command by sending an innocuous +looking Client Mode request. This can be achieved easily using Nmap: nmap -sU -pU:123 -Pn -n --max-retries=0 Notes: @@ -509,7 +509,7 @@ function check(status, response, track) else -- seq <= hseq !duplicate! track.evil_pkts = track.evil_pkts+1 stdnse.print_debug(1, - 'Response from %s had a duplcate sequence number - dropping it.', + 'Response from %s had a duplicate sequence number - dropping it.', track.target ) return nil diff --git a/scripts/oracle-brute-stealth.nse b/scripts/oracle-brute-stealth.nse index fbb503e55..d3dd079aa 100644 --- a/scripts/oracle-brute-stealth.nse +++ b/scripts/oracle-brute-stealth.nse @@ -95,7 +95,7 @@ Driver = end status, data = self.helper:Connect() if ( not(status) ) then - stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occured", SCRIPT_NAME, data) + stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occurred", SCRIPT_NAME, data) self.helper:Close() else break diff --git a/scripts/oracle-brute.nse b/scripts/oracle-brute.nse index cc98e0ea8..e6d67979c 100644 --- a/scripts/oracle-brute.nse +++ b/scripts/oracle-brute.nse @@ -111,7 +111,7 @@ Driver = end status, data = self.helper:Connect() if ( not(status) ) then - stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occured", SCRIPT_NAME, data) + stdnse.print_debug(2, "%s: ERROR: An Oracle %s error occurred", SCRIPT_NAME, data) self.helper:Close() else break diff --git a/scripts/p2p-conficker.nse b/scripts/p2p-conficker.nse index 0851d1a9d..3b8cfb7bd 100644 --- a/scripts/p2p-conficker.nse +++ b/scripts/p2p-conficker.nse @@ -240,7 +240,7 @@ local function prng_generate_ports(ip, seed) end until(is_blacklisted_port(ports[1]) == false and is_blacklisted_port(ports[2]) == false and ports[1] ~= ports[2]) - -- Update the accumlator with the seed + -- Update the accumulator with the seed v1 = bit.bxor(v1, seed) -- Loop 10 more times to generate the second pair of ports @@ -292,7 +292,7 @@ local function p2p_checksum(data) end ---Encrypt/decrypt the buffer with a simple xor-based symmetric encryption. It uses a 64-bit key, represented --- by key1:key2, that is transmited in plain text. Since sniffed packets can be decrypted, this is a +-- by key1:key2, that is transmitted in plain text. Since sniffed packets can be decrypted, this is a -- simple obfuscation technique. -- --@param packet The packet to encrypt (before the key and optional length are prepended). diff --git a/scripts/path-mtu.nse b/scripts/path-mtu.nse index 9c6cbbfcf..63d3de339 100644 --- a/scripts/path-mtu.nse +++ b/scripts/path-mtu.nse @@ -314,7 +314,7 @@ action = function(host) -- Since we're sending potentially large amounts of data per packet, -- simply bump up the host's calculated timeout value. Most replies -- should come from routers along the path, fragmentation reassembly - -- times isn't an issue and the large amount of data is only travelling + -- times isn't an issue and the large amount of data is only traveling -- in one direction; still, we want a response from the target so call -- it 1.5*timeout to play it safer. pcap:set_timeout(1.5 * host.times.timeout * 1000) diff --git a/scripts/pgsql-brute.nse b/scripts/pgsql-brute.nse index 93b820754..f0a7ee966 100644 --- a/scripts/pgsql-brute.nse +++ b/scripts/pgsql-brute.nse @@ -114,7 +114,7 @@ action = function( host, port ) break end - -- SSL failed, this can occure due to: + -- SSL failed, this can occur due to: -- 1. The server does not do SSL -- 2. SSL was denied on a per host or network level -- diff --git a/scripts/rdp-vuln-ms12-020.nse b/scripts/rdp-vuln-ms12-020.nse index 331633be5..6143414da 100644 --- a/scripts/rdp-vuln-ms12-020.nse +++ b/scripts/rdp-vuln-ms12-020.nse @@ -176,7 +176,7 @@ action = function(host, port) -- Sleep for 0.2 seconds to make sure the script works even with SYN scan. -- Posible reason for this is that Windows resets the connection if we try to - -- reconect too fast to the same port after doing a SYN scan and not completing the + -- reconnect too fast to the same port after doing a SYN scan and not completing the -- handshake. In my tests, sleep values above 0.1s prevent the connection reset. stdnse.sleep(0.2) @@ -191,11 +191,11 @@ action = function(host, port) end status, err = socket:send(connectInitial) status, err = socket:send(userRequest) -- send attach user request - status, response = socket:receive_bytes(0) -- recieve attach user confirm + status, response = socket:receive_bytes(0) -- receive attach user confirm pos,user1 = bin.unpack(">S",response:sub(10,11)) -- user_channel-1001 - see http://msdn.microsoft.com/en-us/library/cc240918%28v=prot.10%29.aspx status, err = socket:send(userRequest) -- send another attach user request - status, response = socket:receive_bytes(0) -- recieve another attach user confirm + status, response = socket:receive_bytes(0) -- receive another attach user confirm pos,user2 = bin.unpack(">S",response:sub(10,11)) -- second user's channel - 1001 user2 = user2+1001 -- second user's channel local data4 = bin.pack(">SS",user1,user2) @@ -204,7 +204,7 @@ action = function(host, port) status, err = socket:send(channelJoinRequest) -- bogus channel join request user1 requests channel of user2 status, response = socket:receive_bytes(0) if response:sub(8,9) == bin.pack("H","3e00") then - -- 3e00 indicates a successfull join + -- 3e00 indicates a successful join -- see http://msdn.microsoft.com/en-us/library/cc240911%28v=prot.10%29.aspx -- service is vulnerable -- send a valid request to prevent the BSoD diff --git a/scripts/redis-brute.nse b/scripts/redis-brute.nse index 964fecb5e..a0ea0f3ea 100644 --- a/scripts/redis-brute.nse +++ b/scripts/redis-brute.nse @@ -48,7 +48,7 @@ Driver = { login = function( self, username, password ) local status, response = self.helper:reqCmd("AUTH", password) - -- some error occured, attempt to retry + -- some error occurred, attempt to retry if ( status and response.type == redis.Response.Type.ERROR and "-ERR invalid password" == response.data ) then return false, brute.Error:new( "Incorrect password" ) diff --git a/scripts/rpc-grind.nse b/scripts/rpc-grind.nse index d173ba07f..1836bafd3 100644 --- a/scripts/rpc-grind.nse +++ b/scripts/rpc-grind.nse @@ -199,7 +199,7 @@ local rpcGrinder = function(host, port, iterator, result) if type(response) == 'table' then if xid ~= response.xid then -- Shouldn't happen. - stdnse.print_debug("%s: XID mismtach.", SCRIPT_NAME) + stdnse.print_debug("%s: XID mismatch.", SCRIPT_NAME) end -- Look at accept state -- Not supported version means that we used the right program number diff --git a/scripts/rpcap-brute.nse b/scripts/rpcap-brute.nse index bceb992fc..51ec51b06 100644 --- a/scripts/rpcap-brute.nse +++ b/scripts/rpcap-brute.nse @@ -69,7 +69,7 @@ local function validateAuth(host, port) if ( status ) then return false, "Authentication not required" elseif ( not(status) and - "Authentication failed; NULL autentication not permitted." == result ) then + "Authentication failed; NULL authentication not permitted." == result ) then return true end return status, result diff --git a/scripts/rtsp-url-brute.nse b/scripts/rtsp-url-brute.nse index a35250d61..f44d360a9 100644 --- a/scripts/rtsp-url-brute.nse +++ b/scripts/rtsp-url-brute.nse @@ -26,7 +26,7 @@ Attempts to enumerate RTSP media URLS by testing for common paths on devices suc -- on which it determines whether the URL is valid or not. -- -- @args rtsp-url-brute.urlfile sets an alternate URL dictionary file --- @args rtsp-url-brute.threads sets the maximum number of parallell threads to run +-- @args rtsp-url-brute.threads sets the maximum number of parallel threads to run -- -- Version 0.1 @@ -135,9 +135,9 @@ action = function(host, port) -- urls that could not be retrieved due to low level errors, such as -- failure in socket send or receive - local failure_urls = { name='An error occured while testing the following URLs' } + local failure_urls = { name='An error occurred while testing the following URLs' } - -- urls that illicited a 200 OK response + -- urls that elicited a 200 OK response local success_urls = { name='Discovered URLs' } -- urls requiring authentication diff --git a/scripts/samba-vuln-cve-2012-1182.nse b/scripts/samba-vuln-cve-2012-1182.nse index 3ed7b0932..6a96d4ad0 100644 --- a/scripts/samba-vuln-cve-2012-1182.nse +++ b/scripts/samba-vuln-cve-2012-1182.nse @@ -17,12 +17,12 @@ CVE-2012-1182 marks multiple heap overflow vulnerabilities located in PIDL based autogenerated code. This check script is based on PoC by ZDI marked as ZDI-CAN-1503. Vulnerability lies in ndr_pull_lsa_SidArray function where an attacker is under control of num_sids and can cause -insuficient memory to be allocated, leading to heap buffer overflow -and posibility of remote code execution. +insufficient memory to be allocated, leading to heap buffer overflow +and possibility of remote code execution. -Script builds a malitious packet and makes a SAMR GetAliasMembership +Script builds a malicious packet and makes a SAMR GetAliasMembership call which triggers the vulnerability. On the vulnerable system, -connection is droped and result is "Failed to receive bytes after 5 attempts". +connection is dropped and result is "Failed to receive bytes after 5 attempts". On patched system, samba throws an error and result is "MSRPC call returned a fault (packet type)". @@ -121,7 +121,7 @@ from an anonymous connection. status, result = msrpc.samr_getaliasmembership(smbstate,marshaledHandle, data) stdnse.print_debug(2, "msrpc.samr_getaliasmembership: %s, '%s'", status, result) if(status == false and string.find(result,"Failed to receive bytes after 5 attempts") ~= nil) then - samba_cve.state = vulns.STATE.VULN -- connection droped, server crashed + samba_cve.state = vulns.STATE.VULN -- connection dropped, server crashed end return report:make_output(samba_cve) diff --git a/scripts/sip-brute.nse b/scripts/sip-brute.nse index 46afdb392..aeb450e36 100644 --- a/scripts/sip-brute.nse +++ b/scripts/sip-brute.nse @@ -74,7 +74,7 @@ Driver = { -- Function used to check if we can distinguish existing from non-existing -- accounts. In order to do so we send a semi-random username and password -- and interpret the response. Some servers will respond as if the login --- was successful which makes it impossible to tell successfull logins +-- was successful which makes it impossible to tell successful logins -- from non-existing accounts apart. local function checkBadUser(host, port) local user = "baduser-" .. math.random(10000) @@ -98,7 +98,7 @@ action = function(host, port) local status = checkBadUser(host, port) if ( status ) then return "\nERROR: Cannot detect non-existing user accounts, this will result in:\n" .. - " * Non-exisiting accounts being detected as found\n" .. + " * Non-existing accounts being detected as found\n" .. " * Passwords for existing accounts being correctly detected\n\n" .. "Supply the sip-brute.force argument to override" end diff --git a/scripts/sip-enum-users.nse b/scripts/sip-enum-users.nse index 965e64f5f..516ff5abe 100644 --- a/scripts/sip-enum-users.nse +++ b/scripts/sip-enum-users.nse @@ -180,7 +180,7 @@ Driver = { login = function( self, username, password) -- We are using the "password" values instead of the "username" so we - -- could benifit from brute.lua passonly option and setPasswordIterator + -- could benefit from brute.lua passonly option and setPasswordIterator -- function, as we are doing usernames enumeration only and not -- credentials brute forcing. local status, response, responsecode diff --git a/scripts/smb-brute.nse b/scripts/smb-brute.nse index d690c0662..c32077a1b 100644 --- a/scripts/smb-brute.nse +++ b/scripts/smb-brute.nse @@ -49,7 +49,7 @@ to perform their checks. The blank password is always tried first, followed by "special passwords" (such as the username and the username reversed). Once those are exhausted, the unpwdb password list is used. -One major goal of this script is to avoid accout lockouts. This is done in a few ways. First, +One major goal of this script is to avoid account lockouts. This is done in a few ways. First, when a lockout is detected, unless you user specifically overrides it with the smblockout argument, the scan stops. Second, all usernames are checked with the most common passwords first, so with not-too-strict lockouts (10 invalid attempts), the 10 most common passwords will still @@ -468,7 +468,7 @@ local function convert_case(str, num) end ---Attempts to determine the case of a password. This is done by trying every possible combination of upper and lowercase --- characters in the password, in the most efficient possible ordering, until the corerct case is found. +-- characters in the password, in the most efficient possible ordering, until the correct case is found. -- -- A session has to be active when this function is called. -- diff --git a/scripts/smb-check-vulns.nse b/scripts/smb-check-vulns.nse index 3e98340f4..310219e36 100644 --- a/scripts/smb-check-vulns.nse +++ b/scripts/smb-check-vulns.nse @@ -53,7 +53,7 @@ This check WILL crash the service, if it's vulnerable, and requires a guest acco or higher to work. It is considered unsafe. SMBv2 DoS. Performs a denial-of-service against the vulnerability disclosed in -CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista +CVE-2009-3103. Checks if the server went offline. This works against Windows Vista and some versions of Windows 7, and causes a bluescreen if successful. The proof-of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used, with one small change. @@ -64,7 +64,7 @@ getting information from the Remote Access and Routing service. RASRPC can be accessed using either "\ROUTER" SMB pipe or the "\SRVSVC" SMB pipe (usually on Windows XP machines). This is in RPC world known as "ncan_np" RPC transport. RasRpcSumbitRequest() method is a generic method which provides different functionalities according -to the RequestBuffer structure and particulary the RegType field within that +to the RequestBuffer structure and particularly the RegType field within that structure. RegType field is of enum ReqTypes type. This enum type lists all the different available operation that can be performed using the RasRpcSubmitRequest() RPC method. The one particular operation that this vuln targets is the REQTYPE_GETDEVCONFIG @@ -627,7 +627,7 @@ action = function(host) end end - -- Check for SMBv2 vulnerablity + -- Check for SMBv2 vulnerability status, result = check_smbv2_dos(host) if(status == false) then table.insert(response, get_response("SMBv2 DoS (CVE-2009-3103)", "ERROR", result, 0, 1)) diff --git a/scripts/smb-enum-shares.nse b/scripts/smb-enum-shares.nse index d949082ba..00a7c8608 100644 --- a/scripts/smb-enum-shares.nse +++ b/scripts/smb-enum-shares.nse @@ -11,7 +11,7 @@ to those functions is denied, a list of common share names are checked. Finding open shares is useful to a penetration tester because there may be private files shared, or, if it's writable, it could be a good place to drop a Trojan or to infect a file that's already there. Knowing where the share is could make those kinds of tests more useful, -except that determiing where the share is requires administrative privileges already. +except that determining where the share is requires administrative privileges already. Running NetShareEnumAll will work anonymously against Windows 2000, and requires a user-level account on any other Windows version. Calling NetShareGetInfo diff --git a/scripts/smb-os-discovery.nse b/scripts/smb-os-discovery.nse index 46d522900..db7054c2d 100644 --- a/scripts/smb-os-discovery.nse +++ b/scripts/smb-os-discovery.nse @@ -14,7 +14,7 @@ a difference); in response to a session starting, the server will send back all information. The following fields may be included in the output, depending on the -cirumstances (e.g. the workgroup name is mutually exclusive with domain and forest +circumstances (e.g. the workgroup name is mutually exclusive with domain and forest names) and the information available: * OS * Computer name diff --git a/scripts/smb-print-text.nse b/scripts/smb-print-text.nse index 4d62c4bd7..011aeea27 100644 --- a/scripts/smb-print-text.nse +++ b/scripts/smb-print-text.nse @@ -12,7 +12,7 @@ In order to use the script, at least one printer needs to be shared over SMB. If no printer is specified, script tries to enumerate existing ones by calling LANMAN API which might not be always available. LANMAN is available by default on Windows XP, but not on Vista or Windows 7 -for example. In that case, you need to specify printer share name manualy +for example. In that case, you need to specify printer share name manually using printer script argument. You can find out available shares by using smb-enum-shares script. @@ -101,7 +101,7 @@ action = function(host,port) end end if not printer then - stdnse.print_debug("No printer found, system may be unpached but it needs at least one printer shared to be vulnerable.") + stdnse.print_debug("No printer found, system may be unpatched but it needs at least one printer shared to be vulnerable.") return false end stdnse.print_debug("Using %s as printer.",printer) diff --git a/scripts/smb-psexec.nse b/scripts/smb-psexec.nse index bb01ebdce..38eb77f74 100644 --- a/scripts/smb-psexec.nse +++ b/scripts/smb-psexec.nse @@ -886,7 +886,7 @@ local function get_config(host, config) mod.name = mod.name or (string.format("%s %s", mod.program, mod.args or "")) mod.maxtime = mod.maxtime or 1 - -- Check if they forgot the uploadbility + -- Check if they forgot the uploadibility if(mod.upload == nil) then enabled = false mod.disabled_message = string.format("Configuration error: '%s': 'upload' field is required", mod.name) diff --git a/scripts/smb-vuln-ms10-054.nse b/scripts/smb-vuln-ms10-054.nse index 563a2de2c..0df61cd52 100644 --- a/scripts/smb-vuln-ms10-054.nse +++ b/scripts/smb-vuln-ms10-054.nse @@ -17,7 +17,7 @@ Either with guest credentials or with specified username/password. --- -- @usage nmap -p 445 --script=smb-vuln-ms10-054 --script-args unsafe -- --- @args unsafe Required to run the script, "safty swich" to prevent running it by accident +-- @args unsafe Required to run the script, "safety swich" to prevent running it by accident -- @args smb-vuln-ms10-054.share Share to connect to (defaults to SharedDocs) -- @output -- Host script results: diff --git a/scripts/smb-vuln-ms10-061.nse b/scripts/smb-vuln-ms10-061.nse index 681345ac5..f2f4cb8e7 100644 --- a/scripts/smb-vuln-ms10-061.nse +++ b/scripts/smb-vuln-ms10-061.nse @@ -133,7 +133,7 @@ aka "Print Spooler Service Impersonation Vulnerability." end end if not printer then - stdnse.print_debug("No printer found, system may be unpached but it needs at least one printer shared to be vulnerable.") + stdnse.print_debug("No printer found, system may be unpatched but it needs at least one printer shared to be vulnerable.") return false end stdnse.print_debug("Using %s as printer.",printer) @@ -162,7 +162,7 @@ aka "Print Spooler Service Impersonation Vulnerability." if stdnse.tohex(write_result) == "00000000" then -- patched version would report 4 bytes written ms10_061.state = vulns.STATE.VULN -- identified by diffing patched an unpatched version end - -- call abort_printer to stop the actuall printing in case the remote system is not vulnerable + -- call abort_printer to stop the actual printing in case the remote system is not vulnerable -- we care about the environment and don't want to spend more paper then needed :) status,result = msrpc.spoolss_abort_printer(smbstate,printer_handle) diff --git a/scripts/smtp-enum-users.nse b/scripts/smtp-enum-users.nse index 02cdb7556..9ab0f66b1 100644 --- a/scripts/smtp-enum-users.nse +++ b/scripts/smtp-enum-users.nse @@ -12,7 +12,7 @@ commands. The goal of this script is to discover all the user accounts in the re system. The script will output the list of user names that were found. The script will stop -querying the SMTP server if authentication is enforced. If an error occurrs while testing +querying the SMTP server if authentication is enforced. If an error occurs while testing the target host, the error will be printed with the list of any combinations that were found prior to the error. @@ -65,7 +65,7 @@ STATUS_CODES = { } ---Counts the number of occurrences in a table. Helper function --- from LUA documentation http://lua-users.org/wiki/TableUtils. +-- from Lua documentation http://lua-users.org/wiki/TableUtils. -- -- @param from Source table -- @param what What element to count @@ -82,7 +82,7 @@ function table_count(from, what) end ---Creates a new table from a source without the duplicates. Helper --- function from LUA documentation http://lua-users.org/wiki/TableUtils. +-- function from Lua documentation http://lua-users.org/wiki/TableUtils. -- -- @param from Source table -- @return New table without the duplicates diff --git a/scripts/smtp-open-relay.nse b/scripts/smtp-open-relay.nse index bd759232e..f2b288c48 100644 --- a/scripts/smtp-open-relay.nse +++ b/scripts/smtp-open-relay.nse @@ -18,7 +18,7 @@ hardcoded in the source file. The script will output all the working combination server allows if nmap is in verbose mode otherwise the script will print the number of successful tests. The script will not output if the server requires authentication. -If debug is enabled and an error occurrs while testing the target host, the error will be +If debug is enabled and an error occurs while testing the target host, the error will be printed with the list of any combinations that were found prior to the error. ]] diff --git a/scripts/smtp-vuln-cve2010-4344.nse b/scripts/smtp-vuln-cve2010-4344.nse index 3667f735d..ff8ea4611 100644 --- a/scripts/smtp-vuln-cve2010-4344.nse +++ b/scripts/smtp-vuln-cve2010-4344.nse @@ -21,7 +21,7 @@ user to gain root privileges by specifying an alternate configuration file using the -C option (CVE-2010-4345). The smtp-vuln-cve2010-4344.exploit script argument will make -the script try to exploit the vulnerabilties, by sending more than 50MB of +the script try to exploit the vulnerabilities, by sending more than 50MB of data, it depends on the message size limit configuration option of the Exim server. If the exploit succeed the exploit.cmd or smtp-vuln-cve2010-4344.cmd script arguments can be used to @@ -155,11 +155,11 @@ local function escalate_privs(socket, smtp_opts) return exploited, results end --- Tries to exploit the heap overflow and the priviled escalation +-- Tries to exploit the heap overflow and the privilege escalation -- Returns true, exploit_status, possible values: -- nil Not vulnerable -- "heap" Vulnerable to the heap overflow --- "heap-exploited" The heap overflow vulenrability was exploited +-- "heap-exploited" The heap overflow vulnerability was exploited local function exploit_heap(socket, smtp_opts) local exploited, ret = false, "" diff --git a/scripts/smtp-vuln-cve2011-1764.nse b/scripts/smtp-vuln-cve2011-1764.nse index d1b1d8032..0662b51be 100644 --- a/scripts/smtp-vuln-cve2011-1764.nse +++ b/scripts/smtp-vuln-cve2011-1764.nse @@ -80,7 +80,7 @@ local function get_exim_banner(response) end -- Sends the mail with the evil DKIM-Signatures header. --- Returns true, true if the Exim server is vulnrable +-- Returns true, true if the Exim server is vulnerable local function check_dkim(socket, smtp_opts) local killed = false diff --git a/scripts/sniffer-detect.nse b/scripts/sniffer-detect.nse index cfaa32963..d1beec564 100644 --- a/scripts/sniffer-detect.nse +++ b/scripts/sniffer-detect.nse @@ -74,7 +74,7 @@ do_test = function(dnet, pcap, host, test) -- so that 1 would mean (0-10ms), 2=(10-40ms) and 3=(40ms-90ms) -- but when we're running this tests on macs, first test is always 2. -- which means that the first answer is dropped. - -- for now, just return 1 if test was successfull, it's easier + -- for now, just return 1 if test was successful, it's easier -- return(i) return(1) end @@ -91,7 +91,7 @@ action = function(host) ['1_____1_'] = false, -- MacOSX(Tiger.Panther)/Linux/ ?Win98/ WinXP sp2(no pcap) ['1_______'] = false, -- Old Apple/SunOS/3Com ['1___1_1_'] = false, -- MacOSX(Tiger) - ['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt ) + ['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscuous openwrt ) ['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below) ['111___1_'] = true, -- WinXP sp2 promisc --['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed* diff --git a/scripts/snmp-brute.nse b/scripts/snmp-brute.nse index edc033d86..1c71d4a8a 100644 --- a/scripts/snmp-brute.nse +++ b/scripts/snmp-brute.nse @@ -27,7 +27,7 @@ this wordlist does not exist, the script falls back to No output is reported if no valid account is found. ]] --- 2008-07-03 Philip Pickering, basic verstion +-- 2008-07-03 Philip Pickering, basic version -- 2011-07-17 Gorjan Petrovski, Patrik Karlsson, optimization and creds -- accounts, rejected use of the brute library because of -- implementation using unconnected sockets. @@ -180,7 +180,7 @@ local sniff_snmp_responses = function(host, port, lport, result) -- last_run indicated whether there will be only one more receive local last_run = false - -- receive even when status=false untill all the probes are sent + -- receive even when status=false until all the probes are sent while true do local status, plen, l2, l3, _ = pcap:pcap_receive() @@ -287,7 +287,7 @@ action = function(host, port) -- return output return tostring(c) else - stdnse.print_debug("An error occured: "..result.msg) + stdnse.print_debug("An error occurred: "..result.msg) end end diff --git a/scripts/snmp-interfaces.nse b/scripts/snmp-interfaces.nse index f945fb23c..3606b7e32 100644 --- a/scripts/snmp-interfaces.nse +++ b/scripts/snmp-interfaces.nse @@ -41,7 +41,7 @@ dependencies = {"snmp-brute"} -- code borrowed heavily from Patrik Karlsson's excellent snmp scripts -- Created 03/03/2010 - v0.1 - created by Thomas Buchanan --- Revised 03/05/2010 - v0.2 - Reworked output slighty, moved iana_types to script scope. Suggested by David Fifield +-- Revised 03/05/2010 - v0.2 - Reworked output slightly, moved iana_types to script scope. Suggested by David Fifield -- Revised 04/11/2010 - v0.2 - moved snmp_walk to snmp library -- Revised 08/10/2010 - v0.3 - prerule; add interface addresses to Nmap's target list (Kris Katterjohn) -- Revised 05/27/2011 - v0.4 - action; add MAC addresses to nmap.registry[host.ip]["mac-geolocation"] (Gorjan Petrovski) @@ -423,7 +423,7 @@ action = function(host, port) socket:set_timeout(5000) try(socket:connect(srvhost, srvport, "udp")) - -- retreive network interface information from IF-MIB + -- retrieve network interface information from IF-MIB status, interfaces = snmp.snmpWalk( socket, if_oid ) socket:close() @@ -436,7 +436,7 @@ action = function(host, port) -- build a table of network interfaces from the IF-MIB table interfaces = process_interfaces( interfaces ) - -- retreive IP address information from IP-MIB + -- retrieve IP address information from IP-MIB try(socket:connect(srvhost, srvport, "udp")) status, ips = snmp.snmpWalk( socket, ip_oid ) diff --git a/scripts/snmp-ios-config.nse b/scripts/snmp-ios-config.nse index 67b0f4b02..5708ab32b 100644 --- a/scripts/snmp-ios-config.nse +++ b/scripts/snmp-ios-config.nse @@ -89,7 +89,7 @@ action = function(host, port) local status, tftpserver, _, _, _ = socket:get_info() if( not(status) ) then - return "ERROR: Failed to determin local ip" + return "ERROR: Failed to determine local ip" end -- build a SNMP v1 packet diff --git a/scripts/snmp-processes.nse b/scripts/snmp-processes.nse index 98aa1d7da..95e320019 100644 --- a/scripts/snmp-processes.nse +++ b/scripts/snmp-processes.nse @@ -38,7 +38,7 @@ dependencies = {"snmp-brute"} -- Version 0.4 -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson --- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist +-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist -- Revised 01/19/2010 - v0.3 - removed debugging output and renamed file -- Revised 04/11/2010 - v0.4 - moved snmp_walk to snmp library diff --git a/scripts/snmp-win32-services.nse b/scripts/snmp-win32-services.nse index 22e2f6b65..d672ed1cb 100644 --- a/scripts/snmp-win32-services.nse +++ b/scripts/snmp-win32-services.nse @@ -32,7 +32,7 @@ dependencies = {"snmp-brute"} -- Version 0.3 -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson --- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist +-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist -- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library diff --git a/scripts/snmp-win32-shares.nse b/scripts/snmp-win32-shares.nse index dc66091e2..93784783f 100644 --- a/scripts/snmp-win32-shares.nse +++ b/scripts/snmp-win32-shares.nse @@ -25,7 +25,7 @@ dependencies = {"snmp-brute"} -- Version 0.3 -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson --- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist +-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist -- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library diff --git a/scripts/snmp-win32-software.nse b/scripts/snmp-win32-software.nse index e225ef843..3920bd9e4 100644 --- a/scripts/snmp-win32-software.nse +++ b/scripts/snmp-win32-software.nse @@ -27,7 +27,7 @@ dependencies = {"snmp-brute"} -- Version 0.3 -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson --- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist +-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist -- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library diff --git a/scripts/snmp-win32-users.nse b/scripts/snmp-win32-users.nse index f0a94c1d1..57d4a0e4a 100644 --- a/scripts/snmp-win32-users.nse +++ b/scripts/snmp-win32-users.nse @@ -29,7 +29,7 @@ dependencies = {"snmp-brute"} -- Version 0.3 -- Created 01/15/2010 - v0.1 - created by Patrik Karlsson --- Revised 01/19/2010 - v0.2 - fixed loop that would occure if a mib did not exist +-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist -- Revised 04/11/2010 - v0.3 - moved snmp_walk to snmp library diff --git a/scripts/socks-brute.nse b/scripts/socks-brute.nse index 9edc12fc8..1927cb39b 100644 --- a/scripts/socks-brute.nse +++ b/scripts/socks-brute.nse @@ -51,7 +51,7 @@ Driver = { return false, brute.Error:new( "Login failed" ) end - -- something else happend, let's retry + -- something else happened, let's retry local err = brute.Error:new( err ) err:setRetry( true ) return false, err diff --git a/scripts/targets-ipv6-multicast-slaac.nse b/scripts/targets-ipv6-multicast-slaac.nse index 65cc23b23..8fbb92e65 100644 --- a/scripts/targets-ipv6-multicast-slaac.nse +++ b/scripts/targets-ipv6-multicast-slaac.nse @@ -58,7 +58,7 @@ end --- Get a Unique-local Address with random global ID. -- @param local_scope The scope of the address, local or reserved. -- @return A 16-byte string of IPv6 address, and the length of the prefix. -local function get_radom_ula_prefix(local_scope) +local function get_random_ula_prefix(local_scope) local ula_prefix math.randomseed(os.time()) local global_id = string.char(math.random(256)-1,math.random(256)-1,math.random(256)-1,math.random(256)-1,math.random(256)-1) @@ -145,7 +145,7 @@ local function single_interface_broadcast(if_nfo, results) pcap:pcap_open(if_nfo.device, 128, true, "src ::0/128 and dst net ff02::1:0:0/96 and icmp6 and ip6[6:1] = 58 and ip6[40:1] = 135") local actual_prefix = string.sub(src_ip6,1,8) - local ula_prefix, prefix_len = get_radom_ula_prefix() + local ula_prefix, prefix_len = get_random_ula_prefix() -- preferred_lifetime <= valid_lifetime. -- Nmap will get the whole IPv6 addresses of each host if the two parameters are both longer than 5 seconds. diff --git a/scripts/ventrilo-info.nse b/scripts/ventrilo-info.nse index 5ed628d2f..e73f2c438 100644 --- a/scripts/ventrilo-info.nse +++ b/scripts/ventrilo-info.nse @@ -24,7 +24,7 @@ package since version 2.1.2 when the UDP status service was implemented. When run as a version detection script (-sV), the script will report on the server version, name, uptime, authentication scheme, and OS. When run explicitly (--script ventrilo-info), the script will additionally report on the -server name phonetic pronounciation string, the server comment, maximum number +server name phonetic pronunciation string, the server comment, maximum number of clients, voice codec, voice format, channel and client counts, and details about channels and currently connected clients. @@ -228,7 +228,7 @@ local crypt_crc = { 0x6e17,0x7e36,0x4e55,0x5e74,0x2e93,0x3eb2,0x0ed1,0x1ef0 } --- The probe payload is static as it has proven to be unecessary to forge a new +-- The probe payload is static as it has proven to be unnecessary to forge a new -- one every time. The data used includes the following parameters: -- cmd = 2, password = 0, header len = 20, data len = 16, totlen = 36 -- static 2 byte status request id (time(NULL) in the original protocol) diff --git a/scripts/whois-domain.nse b/scripts/whois-domain.nse index c57b1e06e..d1de4e92a 100644 --- a/scripts/whois-domain.nse +++ b/scripts/whois-domain.nse @@ -5,10 +5,10 @@ Attempts to retrieve information about the domain name of the target --- -- @usage nmap --script whois-domain.nse -- --- This script starts by quering the whois.iana.org (which is the root of the +-- This script starts by querying the whois.iana.org (which is the root of the -- whois servers). Using some patterns the script can determine if the response --- represents a refferal to a record hosted elsewhere. If that's the case it will --- query that refferal. The script keeps repeating this until the response don't +-- represents a referral to a record hosted elsewhere. If that's the case it will +-- query that referral. The script keeps repeating this until the response don't -- match with any of the patterns, meaning that there are no other referrals and -- prints the output. -- diff --git a/scripts/whois-ip.nse b/scripts/whois-ip.nse index 48062db6e..5a9a8c83f 100644 --- a/scripts/whois-ip.nse +++ b/scripts/whois-ip.nse @@ -976,7 +976,7 @@ end -- @param db String id of the service from which the response was obtained. -- @param ip String representing the Target's IP address. -- @param meta Table, nmap.registry.whois.whoisdb[db] where db is either the service queried or a mirrored service. --- @return String containing the most specific part of the response (or the entire response if only one inetneum object is present). +-- @return String containing the most specific part of the response (or the entire response if only one inetnum object is present). -- @return Number position of the start of the most specific part of the response. -- @see smallest_range @@ -1873,7 +1873,7 @@ function file_exists( file ) elseif err then return false, err else - return false, ( "unforseen error while checking " .. file ) + return false, ( "unforeseen error while checking " .. file ) end end diff --git a/scripts/wsdd-discover.nse b/scripts/wsdd-discover.nse index 6c62c32c8..5b23363fb 100644 --- a/scripts/wsdd-discover.nse +++ b/scripts/wsdd-discover.nse @@ -38,7 +38,7 @@ categories = {"safe", "discovery", "default"} portrule = shortport.portnumber(3702, "udp", {"open", "open|filtered"}) --- function used for running several discovery threads in parallell +-- function used for running several discovery threads in parallel -- -- @param funcname string containing the name of the function to run -- the name should be one of the discovery functions in wsdd.Helper diff --git a/scripts/xmpp-brute.nse b/scripts/xmpp-brute.nse index fd493a2c8..e3d9647c9 100644 --- a/scripts/xmpp-brute.nse +++ b/scripts/xmpp-brute.nse @@ -114,7 +114,7 @@ action = function(host, port) local mechs = helper:getAuthMechs() if ( not(mechs) ) then - return "\n ERROR: Failed to retreive authentication mechs from XMPP server" + return "\n ERROR: Failed to retrieve authentication mechs from XMPP server" end local mech_prio = stdnse.get_script_args("xmpp-brute.auth") diff --git a/scripts/xmpp-info.nse b/scripts/xmpp-info.nse index 98beb80f3..d2f50128d 100644 --- a/scripts/xmpp-info.nse +++ b/scripts/xmpp-info.nse @@ -88,14 +88,14 @@ local known_features = { ['ver'] = true } -local check_citadele = function(id1, id2) +local check_citadel = function(id1, id2) stdnse.print_debug("CHECK") local i1 = tonumber(id1, 16) local i2 = tonumber(id2, 16) return i2 - i1 < 20 and i2 > i1 end --- Be carefull while adding fingerprints into the table - it must be well sorted +-- Be careful while adding fingerprints into the table - it must be well sorted -- as some fingerprints are actually supersetted by another... local id_database = { { @@ -113,8 +113,8 @@ local id_database = { { regexp1 = '^' .. string.rep('[0-9a-f]', 8) .. '$', regexp2 = '^' .. string.rep('[0-9a-f]', 8) .. '$', - name = 'Citidel', - check = check_citadele + name = 'Citadel', + check = check_citadel }, {