1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 06:01:28 +00:00

Use stdnse.silent_require where needed.

This is required for scripts that require "openssl", but also
transitively for script that require a library that requires "openssl".
This commit is contained in:
david
2012-03-09 18:06:49 +00:00
parent 7452fbc800
commit 515dbe7f2f
11 changed files with 23 additions and 14 deletions

View File

@@ -22,9 +22,10 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery", "safe"}
require 'shortport'
require 'bitcoin'
require 'tab'
require 'target'
require 'stdnse'
stdnse.silent_require('bitcoin')
--
-- Version 0.1

View File

@@ -39,9 +39,9 @@ author = "Gorjan Petrovski"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery","safe"}
require "bittorrent"
require "stdnse"
require "target"
require 'stdnse'
stdnse.silent_require('bittorrent')
prerule = function()
if not stdnse.get_script_args(SCRIPT_NAME..".torrent") and

View File

@@ -49,10 +49,10 @@ categories = {"discovery","safe","broadcast"}
require "nmap"
require "stdnse"
require "packet"
require "openssl"
require "bin"
require "tab"
require "target"
stdnse.silent_require("openssl")
prerule = function()
if not nmap.is_privileged() then

View File

@@ -49,7 +49,8 @@ require("http")
require("shortport")
require("tab")
require("vulns")
require("openssl")
require("stdnse")
stdnse.silent_require("openssl")
portrule = shortport.http
@@ -132,4 +133,4 @@ locale parameter]],
end
vuln.extra_info=stdnse.format_output(true, results)
return vuln_report:make_output(vuln)
end
end

View File

@@ -29,8 +29,9 @@ author = "David Fifield"
require("bin")
require("bit")
require("dns")
require("openssl")
require("stdnse")
require("packet")
stdnse.silent_require("openssl")
local ICMPv6_NODEINFOQUERY = 139
local ICMPv6_NODEINFOQUERY_IPv6ADDR = 0

View File

@@ -26,7 +26,8 @@ require "bin"
require "stdnse"
require "target"
require "nmap"
require "openssl"
require "stdnse"
stdnse.silent_require("openssl")
prerule = function()
if not nmap.is_privileged() then

View File

@@ -17,8 +17,9 @@ Performs brute force password auditing against the MongoDB database.
--
require 'brute'
require 'mongodb'
require 'shortport'
require 'stdnse'
stdnse.silent_require('mongodb')
author = "Patrik Karlsson"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -40,8 +40,9 @@ categories = {"default", "discovery", "safe"}
dependencies = {"mongodb-brute"}
require "creds"
require "mongodb"
require "shortport"
require 'stdnse'
stdnse.silent_require('mongodb')
portrule = shortport.port_or_service({27017}, {"mongodb"})

View File

@@ -53,8 +53,9 @@ categories = {"default", "discovery", "safe"}
dependencies = {"mongodb-brute"}
require "creds"
require "mongodb"
require "shortport"
require 'stdnse'
stdnse.silent_require('mongodb')
local arg_db = stdnse.get_script_args(SCRIPT_NAME .. ".db") or "admin"

View File

@@ -21,7 +21,8 @@ Performs brute force password auditing against the rsync remote file syncing pro
require 'shortport'
require 'brute'
require 'rsync'
require 'stdnse'
stdnse.silent_require('rsync')
author = "Patrik Karlsson"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -34,7 +34,8 @@ categories = {"discovery", "safe"}
require 'shortport'
require 'ipOps'
require 'vuzedht'
require 'stdnse'
stdnse.silent_require('vuzedht')
portrule = function(host, port)
local allports = stdnse.get_script_args('vuze-dht-info.allports')
@@ -79,4 +80,4 @@ action = function(host, port)
nmap.set_port_state(host, port, "open")
return tostring(response)
end
end
end