From 3ceb44b4f75617465fdeb6df7e3cd36c7b00fa9b Mon Sep 17 00:00:00 2001 From: fyodor Date: Fri, 11 Jun 2010 06:49:15 +0000 Subject: [PATCH] Moved some information from the license field of these two scripts to the description field. I felt this was a better place since the URL leads to a description of the service rather than license information --- scripts/dns-random-srcport.nse | 16 +++++++--------- scripts/dns-random-txid.nse | 16 +++++++--------- 2 files changed, 14 insertions(+), 18 deletions(-) diff --git a/scripts/dns-random-srcport.nse b/scripts/dns-random-srcport.nse index 2e9c73821..ab02f0173 100644 --- a/scripts/dns-random-srcport.nse +++ b/scripts/dns-random-srcport.nse @@ -3,17 +3,15 @@ Checks a DNS server for the predictable-port recursion vulnerability. Predictable source ports can make a DNS server vulnerable to cache poisoning attacks (see CVE-2008-1447). -The script works by querying porttest.dns-oarc.net. -Be aware that any targets against which this script is run will be sent to and -potentially recorded by one or more DNS servers and the porttest server. In -addition your IP address will be sent along with the porttest query to the DNS -server running on the target. +The script works by querying porttest.dns-oarc.net (see +https://www.dns-oarc.net/oarc/services/porttest). Be aware that any +targets against which this script is run will be sent to and +potentially recorded by one or more DNS servers and the porttest +server. In addition your IP address will be sent along with the +porttest query to the DNS server running on the target. ]] -license = [[ -Script: Same as Nmap--See http://nmap.org/book/man-legal.html \n -porttest.dns-oarc.net: https://www.dns-oarc.net/oarc/services/porttest -]] +license = "Same as Nmap--See http://nmap.org/book/man-legal.html" author = [[ Script: Brandon Enright \n diff --git a/scripts/dns-random-txid.nse b/scripts/dns-random-txid.nse index da9353a53..19ff303c6 100644 --- a/scripts/dns-random-txid.nse +++ b/scripts/dns-random-txid.nse @@ -3,17 +3,15 @@ Checks a DNS server for the predictable-TXID DNS recursion vulnerability. Predictable TXID values can make a DNS server vulnerable to cache poisoning attacks (see CVE-2008-1447). -The script works by querying txidtest.dns-oarc.net. -Be aware that any targets against which this script is run will be sent to and -potentially recorded by one or more DNS servers and the txidtest server. In -addition your IP address will be sent along with the txidtest query to the DNS -server running on the target. +The script works by querying txidtest.dns-oarc.net (see +https://www.dns-oarc.net/oarc/services/txidtest). Be aware that any +targets against which this script is run will be sent to and +potentially recorded by one or more DNS servers and the txidtest +server. In addition your IP address will be sent along with the +txidtest query to the DNS server running on the target. ]] -license = [[ -Script: Same as Nmap--See http://nmap.org/book/man-legal.html \n -txidtest.dns-oarc.net: https://www.dns-oarc.net/oarc/services/txidtest -]] +license = "Same as Nmap--See http://nmap.org/book/man-legal.html" author = [[ Script: Brandon Enright \n