mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Correct typos: receive, successfully, length
This commit is contained in:
@@ -1148,7 +1148,7 @@ o [NSE] Fix Diffie-Hellman parameter extraction in tls.lua. [Jacob Gajek]
|
|||||||
|
|
||||||
Nmap 6.49BETA2 [2015-06-16]
|
Nmap 6.49BETA2 [2015-06-16]
|
||||||
|
|
||||||
o [GH#154] Fix a crash (assertion error) when Nmap recieves an ICMP Host
|
o [GH#154] Fix a crash (assertion error) when Nmap receives an ICMP Host
|
||||||
Unreachable message.
|
Unreachable message.
|
||||||
|
|
||||||
o [GH#158] Fix a configure failure when Python is not present, but no Python
|
o [GH#158] Fix a configure failure when Python is not present, but no Python
|
||||||
|
|||||||
@@ -22144,7 +22144,7 @@ U1(DF=N%T=FA-104%TG=FF%IPL=38%UN=0%RIPL=3401%RID=G%RIPCK=G%RUCK=G%RUD=G)
|
|||||||
IE(DFI=S%T=FA-104%TG=FF%CD=S)
|
IE(DFI=S%T=FA-104%TG=FF%CD=S)
|
||||||
|
|
||||||
# Dish Network Hopper with Wi-Fi adapter (http://www.dish.com/technology/hopper/)
|
# Dish Network Hopper with Wi-Fi adapter (http://www.dish.com/technology/hopper/)
|
||||||
# Dish Hopper Joey Reciever
|
# Dish Hopper Joey Receiver
|
||||||
Fingerprint Dish Network Hopper media device
|
Fingerprint Dish Network Hopper media device
|
||||||
Class Dish | embedded || media device
|
Class Dish | embedded || media device
|
||||||
CPE cpe:/h:dish:hopper
|
CPE cpe:/h:dish:hopper
|
||||||
|
|||||||
@@ -5410,7 +5410,7 @@ match http m|^HTTP/1\.1 404 Not Found\r\n\r\n$| p|SAGE EAS Digital Endec remote
|
|||||||
match http m|^\(null\) 400 Bad Request\r\nServer: \r\nDate: .*\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n| p/Arris TG862G http config/ d/WAP/ cpe:/h:arris:tg862g/a
|
match http m|^\(null\) 400 Bad Request\r\nServer: \r\nDate: .*\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n| p/Arris TG862G http config/ d/WAP/ cpe:/h:arris:tg862g/a
|
||||||
match http m|^HTTP/1\.0 401 Unauthorized\r\nConnection: close\r\nContent-Type: text/html\r\nServer: SNARE\r\nWWW-Authenticate: Digest realm=\"SNARE\", qop=\"auth\", nonce=\"[a-f0-9]+\", opaque=\"[a-f0-9]+\"\r\n\r\n| p/InterSect SNARE Server/ d/security-misc/ cpe:/a:intersectalliance:system_intrusion_analysis_and_reporting_environment/
|
match http m|^HTTP/1\.0 401 Unauthorized\r\nConnection: close\r\nContent-Type: text/html\r\nServer: SNARE\r\nWWW-Authenticate: Digest realm=\"SNARE\", qop=\"auth\", nonce=\"[a-f0-9]+\", opaque=\"[a-f0-9]+\"\r\n\r\n| p/InterSect SNARE Server/ d/security-misc/ cpe:/a:intersectalliance:system_intrusion_analysis_and_reporting_environment/
|
||||||
match http m|^HTTP/1\.1 400 Bad Request\r\nServer: Piolink Switch\r\n| p/Piolink ADC/
|
match http m|^HTTP/1\.1 400 Bad Request\r\nServer: Piolink Switch\r\n| p/Piolink ADC/
|
||||||
match http m|^HTTP/1\.1 501\r\nX-AV-Server-Info: av=\"5\.:0\"; cn=\"Sony Corporation\"; mn=\"([^"]+)\"; mv=\"([^"]+)\"\r\nX-AV-Physical-Unit-Info: pa=\"\1\"\r\nConnection: close\r\n| p/Sony $1 AV reciever http info/ v/$2/ d/media device/ cpe:/h:sony:$1:$2/
|
match http m|^HTTP/1\.1 501\r\nX-AV-Server-Info: av=\"5\.:0\"; cn=\"Sony Corporation\"; mn=\"([^"]+)\"; mv=\"([^"]+)\"\r\nX-AV-Physical-Unit-Info: pa=\"\1\"\r\nConnection: close\r\n| p/Sony $1 AV receiver http info/ v/$2/ d/media device/ cpe:/h:sony:$1:$2/
|
||||||
match http m|^HTTP/1\.1 200 OK\nContent-Type: text/html; charset=UTF-8\nContent-Length: \d+\n\n<html>\n<!--\n \* WiFi Keyboard - Remote Keyboard for Android\.\n \* Copyright \(C\) 2011 Ivan Volosyuk\n| p/WiFi Keyboard for Android/ d/phone/ o/Android/ cpe:/o:google:android/a cpe:/o:linux:linux_kernel/a
|
match http m|^HTTP/1\.1 200 OK\nContent-Type: text/html; charset=UTF-8\nContent-Length: \d+\n\n<html>\n<!--\n \* WiFi Keyboard - Remote Keyboard for Android\.\n \* Copyright \(C\) 2011 Ivan Volosyuk\n| p/WiFi Keyboard for Android/ d/phone/ o/Android/ cpe:/o:google:android/a cpe:/o:linux:linux_kernel/a
|
||||||
match http m|^HTTP/1\.1 200 OK\r\nConnection: Keep-Alive\r\nContent-Length: \d+\r\nContent-Type: application/octet-stream\r\nDate: .*\r\nKeep-Alive: timeout=15; max=19\r\n\r\n\0\0\0\x03\0\0\0\x06error\0\0\0\0\0\0\0\x01\0\0\0\x05\0\0\0\x11no_save_password\0\0\0\0\0\0\0\x01\0\0\0\0\0\0\0\x08pencore| p/SoftEther VPN httpd/ cpe:/a:university_of_tsukuba:softether_vpn/
|
match http m|^HTTP/1\.1 200 OK\r\nConnection: Keep-Alive\r\nContent-Length: \d+\r\nContent-Type: application/octet-stream\r\nDate: .*\r\nKeep-Alive: timeout=15; max=19\r\n\r\n\0\0\0\x03\0\0\0\x06error\0\0\0\0\0\0\0\x01\0\0\0\x05\0\0\0\x11no_save_password\0\0\0\0\0\0\0\x01\0\0\0\0\0\0\0\x08pencore| p/SoftEther VPN httpd/ cpe:/a:university_of_tsukuba:softether_vpn/
|
||||||
match http m|^HTTP/1\.0 401\r\nWWW-Authenticate: Digest realm=\"mongo\", nonce=\"abc\", algorithm=MD5, qop=\"auth\" \r\n\r\nnot allowed\n$| p/MongoDB simple REST interface/ v/1.5.0 or older/ cpe:/a:mongodb:mongodb/
|
match http m|^HTTP/1\.0 401\r\nWWW-Authenticate: Digest realm=\"mongo\", nonce=\"abc\", algorithm=MD5, qop=\"auth\" \r\n\r\nnot allowed\n$| p/MongoDB simple REST interface/ v/1.5.0 or older/ cpe:/a:mongodb:mongodb/
|
||||||
@@ -9572,7 +9572,7 @@ match http m|^HTTP/1\.1 400 Bad Request\r\nSERVER: HDHomeRun/([\w._-]+)\r\n| p/S
|
|||||||
match http m|^HTTP/1\.0 401 Unauthorized\r\nDate: .*\r\nContent-type: text/html\r\nContent-Length: 97\r\nWWW-Authenticate: Digest qop=\"auth\", stale=false, algorithm=MD5, realm=\"(ECOR[\w_-]+)\", nonce=\"\d+\"\r\nConnection: keep-alive\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY><H1>401 Unauthorized</H1></BODY></HTML>\n| p/EverFocus $1 DVR http viewer/ d/media device/ cpe:/h:everfocus:$1/
|
match http m|^HTTP/1\.0 401 Unauthorized\r\nDate: .*\r\nContent-type: text/html\r\nContent-Length: 97\r\nWWW-Authenticate: Digest qop=\"auth\", stale=false, algorithm=MD5, realm=\"(ECOR[\w_-]+)\", nonce=\"\d+\"\r\nConnection: keep-alive\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY><H1>401 Unauthorized</H1></BODY></HTML>\n| p/EverFocus $1 DVR http viewer/ d/media device/ cpe:/h:everfocus:$1/
|
||||||
match http m|^HTTP/1\.0 200 OK\r\nDate: .*\r\nServer: Raumfeld Renderer\r\nConnection: close\r\nContent-Type: audio/x-flac\r\n| p/Raumfeld Connector audio streaming httpd/ d/media device/ cpe:/h:teufel:raumfeld_connector/
|
match http m|^HTTP/1\.0 200 OK\r\nDate: .*\r\nServer: Raumfeld Renderer\r\nConnection: close\r\nContent-Type: audio/x-flac\r\n| p/Raumfeld Connector audio streaming httpd/ d/media device/ cpe:/h:teufel:raumfeld_connector/
|
||||||
match http m|^HTTP/1\.1 200 OK\r\nServer: Linux, WEBACCESS/([\w._-]+), (DIR-\w+) Ver ([\w._-]+)\r\n| p/D-Link SharePort web access/ v/$1/ i/model $2, version $3/ d/storage-misc/ o/Linux/ cpe:/a:d-link:shareport_web_access:$1/ cpe:/h:d-link:$2/ cpe:/o:linux:linux_kernel/a
|
match http m|^HTTP/1\.1 200 OK\r\nServer: Linux, WEBACCESS/([\w._-]+), (DIR-\w+) Ver ([\w._-]+)\r\n| p/D-Link SharePort web access/ v/$1/ i/model $2, version $3/ d/storage-misc/ o/Linux/ cpe:/a:d-link:shareport_web_access:$1/ cpe:/h:d-link:$2/ cpe:/o:linux:linux_kernel/a
|
||||||
match http m|^HTTP/1\.1 400 Bad Request\r\nConnection: close\r\nContent-Length: 0\r\n\r\n$| p/T-Home Telekom Media Reciever httpd/ d/media device/
|
match http m|^HTTP/1\.1 400 Bad Request\r\nConnection: close\r\nContent-Length: 0\r\n\r\n$| p/T-Home Telekom Media Receiver httpd/ d/media device/
|
||||||
match http m%^HTTP/1\.1 400 Bad Request\r\nContent-Type: text/html; charset=\"utf-8\"\r\nServer: Linux/((2\.[46]\.\d+|\d\.\d+)\S*) DoaHTTP\r\nContent-Length: 0\r\nDate: .* GMT\r\n\r\n$% p/com.sec.android.app.FileTransferServer/ i/Linux $1/ o/Android/ cpe:/o:google:android/ cpe:/o:linux:linux_kernel:$2/
|
match http m%^HTTP/1\.1 400 Bad Request\r\nContent-Type: text/html; charset=\"utf-8\"\r\nServer: Linux/((2\.[46]\.\d+|\d\.\d+)\S*) DoaHTTP\r\nContent-Length: 0\r\nDate: .* GMT\r\n\r\n$% p/com.sec.android.app.FileTransferServer/ i/Linux $1/ o/Android/ cpe:/o:google:android/ cpe:/o:linux:linux_kernel:$2/
|
||||||
match http m|^HTTP/1\.0 \d\d\d .*\r\nServer: WebIOPi/([\w._-]+)/Python(\d[\w._-]*)\r\n| p/WebIOPi IoT framework/ v/$1/ i/Python $2/ cpe:/a:python:python:$2/ cpe:/a:trouch:webiopi:$1/
|
match http m|^HTTP/1\.0 \d\d\d .*\r\nServer: WebIOPi/([\w._-]+)/Python(\d[\w._-]*)\r\n| p/WebIOPi IoT framework/ v/$1/ i/Python $2/ cpe:/a:python:python:$2/ cpe:/a:trouch:webiopi:$1/
|
||||||
match http m|^HTTP/1\.0 200 OK\r\nPragma: no-cache\r\nContent-Type: text/html\r\n\r\n<html><head><title></title>\n.*\n<script language=\"javascript\">\nvar lanIP=\"[\d.]+\";\nvar wanIP=\"([\d.]+)\";|s p/EnGenius ESR600 router http admin/ i/WAN IP: $1/ cpe:/h:engenius:esr600/a
|
match http m|^HTTP/1\.0 200 OK\r\nPragma: no-cache\r\nContent-Type: text/html\r\n\r\n<html><head><title></title>\n.*\n<script language=\"javascript\">\nvar lanIP=\"[\d.]+\";\nvar wanIP=\"([\d.]+)\";|s p/EnGenius ESR600 router http admin/ i/WAN IP: $1/ cpe:/h:engenius:esr600/a
|
||||||
|
|||||||
@@ -1508,12 +1508,12 @@ size_t DNS::Factory::putDomainName(const std::string &name, u8 *buf, size_t offs
|
|||||||
{
|
{
|
||||||
if((*c)=='.')
|
if((*c)=='.')
|
||||||
{
|
{
|
||||||
u8 lenght = accumulator.length();
|
u8 length = accumulator.length();
|
||||||
*(buf+offset+ret) = lenght;
|
*(buf+offset+ret) = length;
|
||||||
ret += 1;
|
ret += 1;
|
||||||
|
|
||||||
memcpy(buf+offset+ret, accumulator.c_str(), lenght);
|
memcpy(buf+offset+ret, accumulator.c_str(), length);
|
||||||
ret += lenght;
|
ret += length;
|
||||||
accumulator.clear();
|
accumulator.clear();
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
|||||||
@@ -545,7 +545,7 @@ StartTLS = {
|
|||||||
end,
|
end,
|
||||||
wrap_receive = function(self)
|
wrap_receive = function(self)
|
||||||
-- mostly lifted from mssql.TDSStream.Receive
|
-- mostly lifted from mssql.TDSStream.Receive
|
||||||
-- TODO: Modify that function to allow recieving arbitrary response
|
-- TODO: Modify that function to allow receiving arbitrary response
|
||||||
-- types, since it's only because it forces type 0x04 that we had to
|
-- types, since it's only because it forces type 0x04 that we had to
|
||||||
-- do this here (where we expect type 0x12)
|
-- do this here (where we expect type 0x12)
|
||||||
local combinedData = ""
|
local combinedData = ""
|
||||||
|
|||||||
@@ -160,7 +160,7 @@ Driver = {
|
|||||||
stdnse.debug(2,'Trying CICS: %s : %s', user, pass)
|
stdnse.debug(2,'Trying CICS: %s : %s', user, pass)
|
||||||
self.tn3270:send_locations({user_loc,pass_loc})
|
self.tn3270:send_locations({user_loc,pass_loc})
|
||||||
self.tn3270:get_all_data()
|
self.tn3270:get_all_data()
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass)
|
stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
local count = 1
|
local count = 1
|
||||||
while not self.tn3270:find('DFHCE3549') and count < 6 do -- some systems show a message for a bit before we get to CICS again
|
while not self.tn3270:find('DFHCE3549') and count < 6 do -- some systems show a message for a bit before we get to CICS again
|
||||||
@@ -184,7 +184,7 @@ Driver = {
|
|||||||
max_blank = max_blank + 1
|
max_blank = max_blank + 1
|
||||||
end
|
end
|
||||||
|
|
||||||
stdnse.debug(2,"Screen Recieved for Transaction ID: %s", pass)
|
stdnse.debug(2,"Screen Received for Transaction ID: %s", pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
if self.tn3270:find('not recognized') or self.tn3270:find('DFHAC2002') then -- known invalid command
|
if self.tn3270:find('not recognized') or self.tn3270:find('DFHAC2002') then -- known invalid command
|
||||||
stdnse.debug("Invalid CICS Transaction ID: %s", string.upper(pass))
|
stdnse.debug("Invalid CICS Transaction ID: %s", string.upper(pass))
|
||||||
@@ -334,7 +334,7 @@ local function cics_test( host, port, commands, user, pass )
|
|||||||
stdnse.verbose('Trying CICS: %s : %s', user, pass)
|
stdnse.verbose('Trying CICS: %s : %s', user, pass)
|
||||||
tn:send_locations({user_loc,pass_loc})
|
tn:send_locations({user_loc,pass_loc})
|
||||||
tn:get_all_data()
|
tn:get_all_data()
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass)
|
stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
|
||||||
tn:get_screen_debug(2)
|
tn:get_screen_debug(2)
|
||||||
count = 1
|
count = 1
|
||||||
while not tn:find('DFHCE3549') and count < 6 do
|
while not tn:find('DFHCE3549') and count < 6 do
|
||||||
|
|||||||
@@ -169,7 +169,7 @@ local function cics_info( host, port, commands, user, pass, cemt, trans )
|
|||||||
stdnse.verbose('Trying CICS: %s : %s', user, pass)
|
stdnse.verbose('Trying CICS: %s : %s', user, pass)
|
||||||
tn:send_locations({user_loc,pass_loc})
|
tn:send_locations({user_loc,pass_loc})
|
||||||
tn:get_all_data()
|
tn:get_all_data()
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass)
|
stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
|
||||||
tn:get_screen_debug(2)
|
tn:get_screen_debug(2)
|
||||||
count = 1
|
count = 1
|
||||||
while not tn:find('DFHCE3549') and count < 6 do
|
while not tn:find('DFHCE3549') and count < 6 do
|
||||||
|
|||||||
@@ -124,7 +124,7 @@ Driver = {
|
|||||||
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
|
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
|
||||||
self.tn3270:send_locations({user_loc,pass_loc})
|
self.tn3270:send_locations({user_loc,pass_loc})
|
||||||
self.tn3270:get_all_data()
|
self.tn3270:get_all_data()
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s/%s", user, pass)
|
stdnse.debug(2,"Screen Received for User ID: %s/%s", user, pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
|
|
||||||
local loop = 1
|
local loop = 1
|
||||||
@@ -132,7 +132,7 @@ Driver = {
|
|||||||
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
|
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
|
||||||
self.tn3270:send_locations({user_loc,pass_loc})
|
self.tn3270:send_locations({user_loc,pass_loc})
|
||||||
self.tn3270:get_all_data()
|
self.tn3270:get_all_data()
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s/%s", user, pass)
|
stdnse.debug(2,"Screen Received for User ID: %s/%s", user, pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
loop = loop + 1 -- We don't want this to loop forever
|
loop = loop + 1 -- We don't want this to loop forever
|
||||||
end
|
end
|
||||||
@@ -143,7 +143,7 @@ Driver = {
|
|||||||
return false, err
|
return false, err
|
||||||
end
|
end
|
||||||
|
|
||||||
-- Now check what we recieved if its valid or not
|
-- Now check what we received if its valid or not
|
||||||
if self.tn3270:find('TSS7101E') or
|
if self.tn3270:find('TSS7101E') or
|
||||||
self.tn3270:find('DFHCE3530') or
|
self.tn3270:find('DFHCE3530') or
|
||||||
self.tn3270:find('DFHCE3532') then
|
self.tn3270:find('DFHCE3532') then
|
||||||
|
|||||||
@@ -117,7 +117,7 @@ Driver = {
|
|||||||
stdnse.verbose("Trying User ID: %s", pass)
|
stdnse.verbose("Trying User ID: %s", pass)
|
||||||
self.tn3270:send_cursor(pass)
|
self.tn3270:send_cursor(pass)
|
||||||
self.tn3270:get_all_data()
|
self.tn3270:get_all_data()
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s", pass)
|
stdnse.debug(2,"Screen Received for User ID: %s", pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
if self.tn3270:find('TSS7145E') or
|
if self.tn3270:find('TSS7145E') or
|
||||||
self.tn3270:find('ACF01004') or
|
self.tn3270:find('ACF01004') or
|
||||||
|
|||||||
@@ -205,7 +205,7 @@ service. This vulnerability was discovered by Alejandro Hernandez (nitr0us).
|
|||||||
elseif cmd == "shutdown" then
|
elseif cmd == "shutdown" then
|
||||||
status = shutdown(host, port)
|
status = shutdown(host, port)
|
||||||
if status then
|
if status then
|
||||||
vuln.extra_info = "SHUTDOWN command sent succesfully."
|
vuln.extra_info = "SHUTDOWN command sent successfully."
|
||||||
vuln.state = vulns.STATE.VULN
|
vuln.state = vulns.STATE.VULN
|
||||||
end
|
end
|
||||||
else
|
else
|
||||||
|
|||||||
@@ -96,7 +96,7 @@ local render = function(params, options)
|
|||||||
local res = http.post("dev.virtualearth.net", 80, query, headers, nil, body)
|
local res = http.post("dev.virtualearth.net", 80, query, headers, nil, body)
|
||||||
if not res or res.status ~= 200 then
|
if not res or res.status ~= 200 then
|
||||||
stdnse.debug1("Error %d from API: %s", res.status, res.body)
|
stdnse.debug1("Error %d from API: %s", res.status, res.body)
|
||||||
return false, ("Failed to recieve map using query '%s'."):format(query)
|
return false, ("Failed to receive map using query '%s'."):format(query)
|
||||||
end
|
end
|
||||||
|
|
||||||
local f = io.open(options["map_path"], "w")
|
local f = io.open(options["map_path"], "w")
|
||||||
|
|||||||
@@ -81,7 +81,7 @@ local render = function(params, options)
|
|||||||
|
|
||||||
local res = http.get("maps.googleapis.com", 80, query)
|
local res = http.get("maps.googleapis.com", 80, query)
|
||||||
if not res or res.status ~= 200 then
|
if not res or res.status ~= 200 then
|
||||||
return false, ("Failed to recieve map using query '%s'."):format(query)
|
return false, ("Failed to receive map using query '%s'."):format(query)
|
||||||
end
|
end
|
||||||
|
|
||||||
local f = io.open(options["map_path"], "w")
|
local f = io.open(options["map_path"], "w")
|
||||||
|
|||||||
@@ -35,7 +35,7 @@ action = function(host, port)
|
|||||||
-- Probes sent, replies received, but no match.
|
-- Probes sent, replies received, but no match.
|
||||||
result = U.get_response(port.version.service_fp, "GetRequest")
|
result = U.get_response(port.version.service_fp, "GetRequest")
|
||||||
-- Loop through the ASCII probes most likely to receive random response
|
-- Loop through the ASCII probes most likely to receive random response
|
||||||
-- from Skype. Others will also recieve this response, but are harder to
|
-- from Skype. Others will also receive this response, but are harder to
|
||||||
-- distinguish from an echo service.
|
-- distinguish from an echo service.
|
||||||
for _, p in ipairs({"HTTPOptions", "RTSPRequest"}) do
|
for _, p in ipairs({"HTTPOptions", "RTSPRequest"}) do
|
||||||
rand = U.get_response(port.version.service_fp, p)
|
rand = U.get_response(port.version.service_fp, p)
|
||||||
|
|||||||
@@ -73,7 +73,7 @@ end
|
|||||||
-- @param IPv6_Network A IPv6 Address ( X:X:X:X::/YY )
|
-- @param IPv6_Network A IPv6 Address ( X:X:X:X::/YY )
|
||||||
-- @param IPv4SHosts A IPv4 String can be: X.X.X.X or X.X.X.X/YY
|
-- @param IPv4SHosts A IPv4 String can be: X.X.X.X or X.X.X.X/YY
|
||||||
-- @param addr_table A table to hold the generated addresses.
|
-- @param addr_table A table to hold the generated addresses.
|
||||||
-- @return Number Total succesfuly nodes added to the scan.
|
-- @return Number Total successfully nodes added to the scan.
|
||||||
-- @return Error A warning if something happened. (Nil otherwise)
|
-- @return Error A warning if something happened. (Nil otherwise)
|
||||||
local From_4_to_6 = function (IPv6_Network, IPv4SHosts, addr_table)
|
local From_4_to_6 = function (IPv6_Network, IPv4SHosts, addr_table)
|
||||||
|
|
||||||
|
|||||||
@@ -65,7 +65,7 @@ end
|
|||||||
-- @param User_Segs Number of segments to search.
|
-- @param User_Segs Number of segments to search.
|
||||||
-- @param User_Right Boolean for fill right or left (Default)
|
-- @param User_Right Boolean for fill right or left (Default)
|
||||||
-- @return Boolean True if was successful the operation
|
-- @return Boolean True if was successful the operation
|
||||||
-- @return Number Total of successfuly nodes added to the scan list.
|
-- @return Number Total of successfully nodes added to the scan list.
|
||||||
-- @return Error Any error generated, default: "" not nil.
|
-- @return Error Any error generated, default: "" not nil.
|
||||||
local CrearRangoHosts = function (Direccion, Prefijo, TablaPalabras,
|
local CrearRangoHosts = function (Direccion, Prefijo, TablaPalabras,
|
||||||
User_Segs, User_Right)
|
User_Segs, User_Right)
|
||||||
|
|||||||
@@ -135,11 +135,11 @@ Driver = {
|
|||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s", user)
|
stdnse.debug(2,"Screen Received for User ID: %s", user)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
|
|
||||||
if not self.tn3270:find('Enter LOGON parameters below') then
|
if not self.tn3270:find('Enter LOGON parameters below') then
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s", user)
|
stdnse.debug(2,"Screen Received for User ID: %s", user)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
-- This error occurs on too many concurrent application requests it
|
-- This error occurs on too many concurrent application requests it
|
||||||
-- should be temporary. We use the new setReduce function.
|
-- should be temporary. We use the new setReduce function.
|
||||||
@@ -172,7 +172,7 @@ Driver = {
|
|||||||
self.tn3270:get_all_data()
|
self.tn3270:get_all_data()
|
||||||
end
|
end
|
||||||
|
|
||||||
stdnse.debug(2,"Screen Recieved for User/Pass: %s/%s", user, pass)
|
stdnse.debug(2,"Screen Received for User/Pass: %s/%s", user, pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
|
|
||||||
if not always_logon and self.tn3270:find("already logged on") then
|
if not always_logon and self.tn3270:find("already logged on") then
|
||||||
|
|||||||
@@ -133,7 +133,7 @@ Driver = {
|
|||||||
-- some systems require an enter after sending a valid user ID
|
-- some systems require an enter after sending a valid user ID
|
||||||
end
|
end
|
||||||
|
|
||||||
stdnse.debug(2,"Screen Recieved for User ID: %s", pass)
|
stdnse.debug(2,"Screen Received for User ID: %s", pass)
|
||||||
self.tn3270:get_screen_debug(2)
|
self.tn3270:get_screen_debug(2)
|
||||||
if self.tn3270:find('not authorized to use TSO') or
|
if self.tn3270:find('not authorized to use TSO') or
|
||||||
self.tn3270:find('IKJ56710I INVALID USERID') then -- invalid user ID
|
self.tn3270:find('IKJ56710I INVALID USERID') then -- invalid user ID
|
||||||
|
|||||||
@@ -168,11 +168,11 @@ int main()
|
|||||||
0x00, 0x01, // Answers RRs count
|
0x00, 0x01, // Answers RRs count
|
||||||
0x00, 0x00, // Authorities RRs count
|
0x00, 0x00, // Authorities RRs count
|
||||||
0x00, 0x00, // Additionals RRs count
|
0x00, 0x00, // Additionals RRs count
|
||||||
0x06, // Label lenght <-- [12]
|
0x06, // Label length <-- [12]
|
||||||
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
|
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
|
||||||
0x04, // Label lenght
|
0x04, // Label length
|
||||||
0x6e, 0x6d, 0x61, 0x70, // "nmap"
|
0x6e, 0x6d, 0x61, 0x70, // "nmap"
|
||||||
0x03, // Label lenght
|
0x03, // Label length
|
||||||
0x6f, 0x72, 0x67, // "org"
|
0x6f, 0x72, 0x67, // "org"
|
||||||
0x00, // Name terminator
|
0x00, // Name terminator
|
||||||
0x00, 0x01, // A
|
0x00, 0x01, // A
|
||||||
@@ -181,7 +181,7 @@ int main()
|
|||||||
0x00, 0x01, // A
|
0x00, 0x01, // A
|
||||||
0x00, 0x01, // CLASS_IN
|
0x00, 0x01, // CLASS_IN
|
||||||
0x00, 0x00, 0x0e, 0x0f, // TTL 3599
|
0x00, 0x00, 0x0e, 0x0f, // TTL 3599
|
||||||
0x00, 0x04, // Record Lenght
|
0x00, 0x04, // Record Length
|
||||||
0x2d, 0x21, 0x20, 0x9c }; // 45.33.32.156
|
0x2d, 0x21, 0x20, 0x9c }; // 45.33.32.156
|
||||||
|
|
||||||
plen = p.parseFromBuffer(answere_buf, answere_len);
|
plen = p.parseFromBuffer(answere_buf, answere_len);
|
||||||
@@ -213,17 +213,17 @@ int main()
|
|||||||
0x00, 0x01, // Answers RRs count
|
0x00, 0x01, // Answers RRs count
|
||||||
0x00, 0x00, // Authorities RRs count
|
0x00, 0x00, // Authorities RRs count
|
||||||
0x00, 0x00, // Additionals RRs count
|
0x00, 0x00, // Additionals RRs count
|
||||||
0x03, // Label lenght
|
0x03, // Label length
|
||||||
0x31, 0x35, 0x36, // "156"
|
0x31, 0x35, 0x36, // "156"
|
||||||
0x02, // Label lenght
|
0x02, // Label length
|
||||||
0x33, 0x32, // "32"
|
0x33, 0x32, // "32"
|
||||||
0x02, // Label lenght
|
0x02, // Label length
|
||||||
0x33, 0x33, // "33"
|
0x33, 0x33, // "33"
|
||||||
0x02, // Label lenght
|
0x02, // Label length
|
||||||
0x34, 0x35, // "45"
|
0x34, 0x35, // "45"
|
||||||
0x07, // Label lenght
|
0x07, // Label length
|
||||||
0x69, 0x6e, 0x2d, 0x61, 0x64, 0x64, 0x72, // "in-addr"
|
0x69, 0x6e, 0x2d, 0x61, 0x64, 0x64, 0x72, // "in-addr"
|
||||||
0x04, // Label lenght
|
0x04, // Label length
|
||||||
0x61, 0x72, 0x70, 0x61, // "arpa"
|
0x61, 0x72, 0x70, 0x61, // "arpa"
|
||||||
0x00, // Name terminator
|
0x00, // Name terminator
|
||||||
0x00, 0x0c, // PTR
|
0x00, 0x0c, // PTR
|
||||||
@@ -232,12 +232,12 @@ int main()
|
|||||||
0x00, 0x0c, // PTR
|
0x00, 0x0c, // PTR
|
||||||
0x00, 0x01, // CLASS_IN
|
0x00, 0x01, // CLASS_IN
|
||||||
0x00, 0x01, 0x51, 0x78, // TTL 86392
|
0x00, 0x01, 0x51, 0x78, // TTL 86392
|
||||||
0x00, 0x11, // Record Lenght
|
0x00, 0x11, // Record Length
|
||||||
0x06, // Label lenght
|
0x06, // Label length
|
||||||
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
|
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
|
||||||
0x04, // Label lenght
|
0x04, // Label length
|
||||||
0x6e, 0x6d, 0x61, 0x70, // "nmap"
|
0x6e, 0x6d, 0x61, 0x70, // "nmap"
|
||||||
0x03, // Label lenght
|
0x03, // Label length
|
||||||
0x6f, 0x72, 0x67, // "org"
|
0x6f, 0x72, 0x67, // "org"
|
||||||
0x00 }; // Name terminator
|
0x00 }; // Name terminator
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user