mirror of
https://github.com/nmap/nmap.git
synced 2025-12-26 17:39:03 +00:00
Remove trailing whitespace in lua files
Whitespace is not significant, so this should not be a problem. https://secwiki.org/w/Nmap/Code_Standards
This commit is contained in:
@@ -13,7 +13,7 @@ http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-
|
||||
This is done by requesting the page <code>/ts/in.cgi?open2</code> and
|
||||
looking for an errant 302 (it attempts to detect servers that always
|
||||
return 302). Thanks to Denis from the above link for finding this
|
||||
technique!
|
||||
technique!
|
||||
]]
|
||||
|
||||
---
|
||||
@@ -23,10 +23,10 @@ technique!
|
||||
-- 80/tcp open http syn-ack
|
||||
-- |_ http-malware-host: Host appears to be clean
|
||||
-- 8080/tcp open http-proxy syn-ack
|
||||
-- | http-malware-host:
|
||||
-- | http-malware-host:
|
||||
-- | | Host appears to be infected (/ts/in.cgi?open2 redirects to http://last-another-life.ru:8080/index.php)
|
||||
-- |_ |_ See: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
|
||||
--
|
||||
--
|
||||
|
||||
author = "Ron Bowes"
|
||||
|
||||
@@ -54,7 +54,7 @@ action = function(host, port)
|
||||
stdnse.print_debug(1, "%s: Exiting due to ambiguous response from web server on %s:%s. All URIs return status 200.", SCRIPT_NAME, host.ip, port.number)
|
||||
return false
|
||||
end
|
||||
|
||||
|
||||
-- Perform a GET request on the file
|
||||
result = http.get_url("http://" .. host.ip .. ":" .. port.number .. "/ts/in.cgi?open2")
|
||||
if(not(result)) then
|
||||
|
||||
Reference in New Issue
Block a user