1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Correct typos: receive, successfully, length

This commit is contained in:
dmiller
2017-03-15 02:23:09 +00:00
parent 83c9e060fc
commit 772bd8d824
18 changed files with 41 additions and 41 deletions

View File

@@ -1148,7 +1148,7 @@ o [NSE] Fix Diffie-Hellman parameter extraction in tls.lua. [Jacob Gajek]
Nmap 6.49BETA2 [2015-06-16] Nmap 6.49BETA2 [2015-06-16]
o [GH#154] Fix a crash (assertion error) when Nmap recieves an ICMP Host o [GH#154] Fix a crash (assertion error) when Nmap receives an ICMP Host
Unreachable message. Unreachable message.
o [GH#158] Fix a configure failure when Python is not present, but no Python o [GH#158] Fix a configure failure when Python is not present, but no Python

View File

@@ -22144,7 +22144,7 @@ U1(DF=N%T=FA-104%TG=FF%IPL=38%UN=0%RIPL=3401%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(DFI=S%T=FA-104%TG=FF%CD=S) IE(DFI=S%T=FA-104%TG=FF%CD=S)
# Dish Network Hopper with Wi-Fi adapter (http://www.dish.com/technology/hopper/) # Dish Network Hopper with Wi-Fi adapter (http://www.dish.com/technology/hopper/)
# Dish Hopper Joey Reciever # Dish Hopper Joey Receiver
Fingerprint Dish Network Hopper media device Fingerprint Dish Network Hopper media device
Class Dish | embedded || media device Class Dish | embedded || media device
CPE cpe:/h:dish:hopper CPE cpe:/h:dish:hopper

View File

@@ -5410,7 +5410,7 @@ match http m|^HTTP/1\.1 404 Not Found\r\n\r\n$| p|SAGE EAS Digital Endec remote
match http m|^\(null\) 400 Bad Request\r\nServer: \r\nDate: .*\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n| p/Arris TG862G http config/ d/WAP/ cpe:/h:arris:tg862g/a match http m|^\(null\) 400 Bad Request\r\nServer: \r\nDate: .*\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n| p/Arris TG862G http config/ d/WAP/ cpe:/h:arris:tg862g/a
match http m|^HTTP/1\.0 401 Unauthorized\r\nConnection: close\r\nContent-Type: text/html\r\nServer: SNARE\r\nWWW-Authenticate: Digest realm=\"SNARE\", qop=\"auth\", nonce=\"[a-f0-9]+\", opaque=\"[a-f0-9]+\"\r\n\r\n| p/InterSect SNARE Server/ d/security-misc/ cpe:/a:intersectalliance:system_intrusion_analysis_and_reporting_environment/ match http m|^HTTP/1\.0 401 Unauthorized\r\nConnection: close\r\nContent-Type: text/html\r\nServer: SNARE\r\nWWW-Authenticate: Digest realm=\"SNARE\", qop=\"auth\", nonce=\"[a-f0-9]+\", opaque=\"[a-f0-9]+\"\r\n\r\n| p/InterSect SNARE Server/ d/security-misc/ cpe:/a:intersectalliance:system_intrusion_analysis_and_reporting_environment/
match http m|^HTTP/1\.1 400 Bad Request\r\nServer: Piolink Switch\r\n| p/Piolink ADC/ match http m|^HTTP/1\.1 400 Bad Request\r\nServer: Piolink Switch\r\n| p/Piolink ADC/
match http m|^HTTP/1\.1 501\r\nX-AV-Server-Info: av=\"5\.:0\"; cn=\"Sony Corporation\"; mn=\"([^"]+)\"; mv=\"([^"]+)\"\r\nX-AV-Physical-Unit-Info: pa=\"\1\"\r\nConnection: close\r\n| p/Sony $1 AV reciever http info/ v/$2/ d/media device/ cpe:/h:sony:$1:$2/ match http m|^HTTP/1\.1 501\r\nX-AV-Server-Info: av=\"5\.:0\"; cn=\"Sony Corporation\"; mn=\"([^"]+)\"; mv=\"([^"]+)\"\r\nX-AV-Physical-Unit-Info: pa=\"\1\"\r\nConnection: close\r\n| p/Sony $1 AV receiver http info/ v/$2/ d/media device/ cpe:/h:sony:$1:$2/
match http m|^HTTP/1\.1 200 OK\nContent-Type: text/html; charset=UTF-8\nContent-Length: \d+\n\n<html>\n<!--\n \* WiFi Keyboard - Remote Keyboard for Android\.\n \* Copyright \(C\) 2011 Ivan Volosyuk\n| p/WiFi Keyboard for Android/ d/phone/ o/Android/ cpe:/o:google:android/a cpe:/o:linux:linux_kernel/a match http m|^HTTP/1\.1 200 OK\nContent-Type: text/html; charset=UTF-8\nContent-Length: \d+\n\n<html>\n<!--\n \* WiFi Keyboard - Remote Keyboard for Android\.\n \* Copyright \(C\) 2011 Ivan Volosyuk\n| p/WiFi Keyboard for Android/ d/phone/ o/Android/ cpe:/o:google:android/a cpe:/o:linux:linux_kernel/a
match http m|^HTTP/1\.1 200 OK\r\nConnection: Keep-Alive\r\nContent-Length: \d+\r\nContent-Type: application/octet-stream\r\nDate: .*\r\nKeep-Alive: timeout=15; max=19\r\n\r\n\0\0\0\x03\0\0\0\x06error\0\0\0\0\0\0\0\x01\0\0\0\x05\0\0\0\x11no_save_password\0\0\0\0\0\0\0\x01\0\0\0\0\0\0\0\x08pencore| p/SoftEther VPN httpd/ cpe:/a:university_of_tsukuba:softether_vpn/ match http m|^HTTP/1\.1 200 OK\r\nConnection: Keep-Alive\r\nContent-Length: \d+\r\nContent-Type: application/octet-stream\r\nDate: .*\r\nKeep-Alive: timeout=15; max=19\r\n\r\n\0\0\0\x03\0\0\0\x06error\0\0\0\0\0\0\0\x01\0\0\0\x05\0\0\0\x11no_save_password\0\0\0\0\0\0\0\x01\0\0\0\0\0\0\0\x08pencore| p/SoftEther VPN httpd/ cpe:/a:university_of_tsukuba:softether_vpn/
match http m|^HTTP/1\.0 401\r\nWWW-Authenticate: Digest realm=\"mongo\", nonce=\"abc\", algorithm=MD5, qop=\"auth\" \r\n\r\nnot allowed\n$| p/MongoDB simple REST interface/ v/1.5.0 or older/ cpe:/a:mongodb:mongodb/ match http m|^HTTP/1\.0 401\r\nWWW-Authenticate: Digest realm=\"mongo\", nonce=\"abc\", algorithm=MD5, qop=\"auth\" \r\n\r\nnot allowed\n$| p/MongoDB simple REST interface/ v/1.5.0 or older/ cpe:/a:mongodb:mongodb/
@@ -9572,7 +9572,7 @@ match http m|^HTTP/1\.1 400 Bad Request\r\nSERVER: HDHomeRun/([\w._-]+)\r\n| p/S
match http m|^HTTP/1\.0 401 Unauthorized\r\nDate: .*\r\nContent-type: text/html\r\nContent-Length: 97\r\nWWW-Authenticate: Digest qop=\"auth\", stale=false, algorithm=MD5, realm=\"(ECOR[\w_-]+)\", nonce=\"\d+\"\r\nConnection: keep-alive\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY><H1>401 Unauthorized</H1></BODY></HTML>\n| p/EverFocus $1 DVR http viewer/ d/media device/ cpe:/h:everfocus:$1/ match http m|^HTTP/1\.0 401 Unauthorized\r\nDate: .*\r\nContent-type: text/html\r\nContent-Length: 97\r\nWWW-Authenticate: Digest qop=\"auth\", stale=false, algorithm=MD5, realm=\"(ECOR[\w_-]+)\", nonce=\"\d+\"\r\nConnection: keep-alive\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY><H1>401 Unauthorized</H1></BODY></HTML>\n| p/EverFocus $1 DVR http viewer/ d/media device/ cpe:/h:everfocus:$1/
match http m|^HTTP/1\.0 200 OK\r\nDate: .*\r\nServer: Raumfeld Renderer\r\nConnection: close\r\nContent-Type: audio/x-flac\r\n| p/Raumfeld Connector audio streaming httpd/ d/media device/ cpe:/h:teufel:raumfeld_connector/ match http m|^HTTP/1\.0 200 OK\r\nDate: .*\r\nServer: Raumfeld Renderer\r\nConnection: close\r\nContent-Type: audio/x-flac\r\n| p/Raumfeld Connector audio streaming httpd/ d/media device/ cpe:/h:teufel:raumfeld_connector/
match http m|^HTTP/1\.1 200 OK\r\nServer: Linux, WEBACCESS/([\w._-]+), (DIR-\w+) Ver ([\w._-]+)\r\n| p/D-Link SharePort web access/ v/$1/ i/model $2, version $3/ d/storage-misc/ o/Linux/ cpe:/a:d-link:shareport_web_access:$1/ cpe:/h:d-link:$2/ cpe:/o:linux:linux_kernel/a match http m|^HTTP/1\.1 200 OK\r\nServer: Linux, WEBACCESS/([\w._-]+), (DIR-\w+) Ver ([\w._-]+)\r\n| p/D-Link SharePort web access/ v/$1/ i/model $2, version $3/ d/storage-misc/ o/Linux/ cpe:/a:d-link:shareport_web_access:$1/ cpe:/h:d-link:$2/ cpe:/o:linux:linux_kernel/a
match http m|^HTTP/1\.1 400 Bad Request\r\nConnection: close\r\nContent-Length: 0\r\n\r\n$| p/T-Home Telekom Media Reciever httpd/ d/media device/ match http m|^HTTP/1\.1 400 Bad Request\r\nConnection: close\r\nContent-Length: 0\r\n\r\n$| p/T-Home Telekom Media Receiver httpd/ d/media device/
match http m%^HTTP/1\.1 400 Bad Request\r\nContent-Type: text/html; charset=\"utf-8\"\r\nServer: Linux/((2\.[46]\.\d+|\d\.\d+)\S*) DoaHTTP\r\nContent-Length: 0\r\nDate: .* GMT\r\n\r\n$% p/com.sec.android.app.FileTransferServer/ i/Linux $1/ o/Android/ cpe:/o:google:android/ cpe:/o:linux:linux_kernel:$2/ match http m%^HTTP/1\.1 400 Bad Request\r\nContent-Type: text/html; charset=\"utf-8\"\r\nServer: Linux/((2\.[46]\.\d+|\d\.\d+)\S*) DoaHTTP\r\nContent-Length: 0\r\nDate: .* GMT\r\n\r\n$% p/com.sec.android.app.FileTransferServer/ i/Linux $1/ o/Android/ cpe:/o:google:android/ cpe:/o:linux:linux_kernel:$2/
match http m|^HTTP/1\.0 \d\d\d .*\r\nServer: WebIOPi/([\w._-]+)/Python(\d[\w._-]*)\r\n| p/WebIOPi IoT framework/ v/$1/ i/Python $2/ cpe:/a:python:python:$2/ cpe:/a:trouch:webiopi:$1/ match http m|^HTTP/1\.0 \d\d\d .*\r\nServer: WebIOPi/([\w._-]+)/Python(\d[\w._-]*)\r\n| p/WebIOPi IoT framework/ v/$1/ i/Python $2/ cpe:/a:python:python:$2/ cpe:/a:trouch:webiopi:$1/
match http m|^HTTP/1\.0 200 OK\r\nPragma: no-cache\r\nContent-Type: text/html\r\n\r\n<html><head><title></title>\n.*\n<script language=\"javascript\">\nvar lanIP=\"[\d.]+\";\nvar wanIP=\"([\d.]+)\";|s p/EnGenius ESR600 router http admin/ i/WAN IP: $1/ cpe:/h:engenius:esr600/a match http m|^HTTP/1\.0 200 OK\r\nPragma: no-cache\r\nContent-Type: text/html\r\n\r\n<html><head><title></title>\n.*\n<script language=\"javascript\">\nvar lanIP=\"[\d.]+\";\nvar wanIP=\"([\d.]+)\";|s p/EnGenius ESR600 router http admin/ i/WAN IP: $1/ cpe:/h:engenius:esr600/a

View File

@@ -1508,12 +1508,12 @@ size_t DNS::Factory::putDomainName(const std::string &name, u8 *buf, size_t offs
{ {
if((*c)=='.') if((*c)=='.')
{ {
u8 lenght = accumulator.length(); u8 length = accumulator.length();
*(buf+offset+ret) = lenght; *(buf+offset+ret) = length;
ret += 1; ret += 1;
memcpy(buf+offset+ret, accumulator.c_str(), lenght); memcpy(buf+offset+ret, accumulator.c_str(), length);
ret += lenght; ret += length;
accumulator.clear(); accumulator.clear();
} }
else else

View File

@@ -545,7 +545,7 @@ StartTLS = {
end, end,
wrap_receive = function(self) wrap_receive = function(self)
-- mostly lifted from mssql.TDSStream.Receive -- mostly lifted from mssql.TDSStream.Receive
-- TODO: Modify that function to allow recieving arbitrary response -- TODO: Modify that function to allow receiving arbitrary response
-- types, since it's only because it forces type 0x04 that we had to -- types, since it's only because it forces type 0x04 that we had to
-- do this here (where we expect type 0x12) -- do this here (where we expect type 0x12)
local combinedData = "" local combinedData = ""

View File

@@ -160,7 +160,7 @@ Driver = {
stdnse.debug(2,'Trying CICS: %s : %s', user, pass) stdnse.debug(2,'Trying CICS: %s : %s', user, pass)
self.tn3270:send_locations({user_loc,pass_loc}) self.tn3270:send_locations({user_loc,pass_loc})
self.tn3270:get_all_data() self.tn3270:get_all_data()
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass) stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
local count = 1 local count = 1
while not self.tn3270:find('DFHCE3549') and count < 6 do -- some systems show a message for a bit before we get to CICS again while not self.tn3270:find('DFHCE3549') and count < 6 do -- some systems show a message for a bit before we get to CICS again
@@ -184,7 +184,7 @@ Driver = {
max_blank = max_blank + 1 max_blank = max_blank + 1
end end
stdnse.debug(2,"Screen Recieved for Transaction ID: %s", pass) stdnse.debug(2,"Screen Received for Transaction ID: %s", pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
if self.tn3270:find('not recognized') or self.tn3270:find('DFHAC2002') then -- known invalid command if self.tn3270:find('not recognized') or self.tn3270:find('DFHAC2002') then -- known invalid command
stdnse.debug("Invalid CICS Transaction ID: %s", string.upper(pass)) stdnse.debug("Invalid CICS Transaction ID: %s", string.upper(pass))
@@ -334,7 +334,7 @@ local function cics_test( host, port, commands, user, pass )
stdnse.verbose('Trying CICS: %s : %s', user, pass) stdnse.verbose('Trying CICS: %s : %s', user, pass)
tn:send_locations({user_loc,pass_loc}) tn:send_locations({user_loc,pass_loc})
tn:get_all_data() tn:get_all_data()
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass) stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
tn:get_screen_debug(2) tn:get_screen_debug(2)
count = 1 count = 1
while not tn:find('DFHCE3549') and count < 6 do while not tn:find('DFHCE3549') and count < 6 do

View File

@@ -169,7 +169,7 @@ local function cics_info( host, port, commands, user, pass, cemt, trans )
stdnse.verbose('Trying CICS: %s : %s', user, pass) stdnse.verbose('Trying CICS: %s : %s', user, pass)
tn:send_locations({user_loc,pass_loc}) tn:send_locations({user_loc,pass_loc})
tn:get_all_data() tn:get_all_data()
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass) stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
tn:get_screen_debug(2) tn:get_screen_debug(2)
count = 1 count = 1
while not tn:find('DFHCE3549') and count < 6 do while not tn:find('DFHCE3549') and count < 6 do

View File

@@ -124,7 +124,7 @@ Driver = {
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass) stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
self.tn3270:send_locations({user_loc,pass_loc}) self.tn3270:send_locations({user_loc,pass_loc})
self.tn3270:get_all_data() self.tn3270:get_all_data()
stdnse.debug(2,"Screen Recieved for User ID: %s/%s", user, pass) stdnse.debug(2,"Screen Received for User ID: %s/%s", user, pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
local loop = 1 local loop = 1
@@ -132,7 +132,7 @@ Driver = {
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass) stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
self.tn3270:send_locations({user_loc,pass_loc}) self.tn3270:send_locations({user_loc,pass_loc})
self.tn3270:get_all_data() self.tn3270:get_all_data()
stdnse.debug(2,"Screen Recieved for User ID: %s/%s", user, pass) stdnse.debug(2,"Screen Received for User ID: %s/%s", user, pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
loop = loop + 1 -- We don't want this to loop forever loop = loop + 1 -- We don't want this to loop forever
end end
@@ -143,7 +143,7 @@ Driver = {
return false, err return false, err
end end
-- Now check what we recieved if its valid or not -- Now check what we received if its valid or not
if self.tn3270:find('TSS7101E') or if self.tn3270:find('TSS7101E') or
self.tn3270:find('DFHCE3530') or self.tn3270:find('DFHCE3530') or
self.tn3270:find('DFHCE3532') then self.tn3270:find('DFHCE3532') then

View File

@@ -117,7 +117,7 @@ Driver = {
stdnse.verbose("Trying User ID: %s", pass) stdnse.verbose("Trying User ID: %s", pass)
self.tn3270:send_cursor(pass) self.tn3270:send_cursor(pass)
self.tn3270:get_all_data() self.tn3270:get_all_data()
stdnse.debug(2,"Screen Recieved for User ID: %s", pass) stdnse.debug(2,"Screen Received for User ID: %s", pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
if self.tn3270:find('TSS7145E') or if self.tn3270:find('TSS7145E') or
self.tn3270:find('ACF01004') or self.tn3270:find('ACF01004') or

View File

@@ -205,7 +205,7 @@ service. This vulnerability was discovered by Alejandro Hernandez (nitr0us).
elseif cmd == "shutdown" then elseif cmd == "shutdown" then
status = shutdown(host, port) status = shutdown(host, port)
if status then if status then
vuln.extra_info = "SHUTDOWN command sent succesfully." vuln.extra_info = "SHUTDOWN command sent successfully."
vuln.state = vulns.STATE.VULN vuln.state = vulns.STATE.VULN
end end
else else

View File

@@ -96,7 +96,7 @@ local render = function(params, options)
local res = http.post("dev.virtualearth.net", 80, query, headers, nil, body) local res = http.post("dev.virtualearth.net", 80, query, headers, nil, body)
if not res or res.status ~= 200 then if not res or res.status ~= 200 then
stdnse.debug1("Error %d from API: %s", res.status, res.body) stdnse.debug1("Error %d from API: %s", res.status, res.body)
return false, ("Failed to recieve map using query '%s'."):format(query) return false, ("Failed to receive map using query '%s'."):format(query)
end end
local f = io.open(options["map_path"], "w") local f = io.open(options["map_path"], "w")

View File

@@ -81,7 +81,7 @@ local render = function(params, options)
local res = http.get("maps.googleapis.com", 80, query) local res = http.get("maps.googleapis.com", 80, query)
if not res or res.status ~= 200 then if not res or res.status ~= 200 then
return false, ("Failed to recieve map using query '%s'."):format(query) return false, ("Failed to receive map using query '%s'."):format(query)
end end
local f = io.open(options["map_path"], "w") local f = io.open(options["map_path"], "w")

View File

@@ -35,7 +35,7 @@ action = function(host, port)
-- Probes sent, replies received, but no match. -- Probes sent, replies received, but no match.
result = U.get_response(port.version.service_fp, "GetRequest") result = U.get_response(port.version.service_fp, "GetRequest")
-- Loop through the ASCII probes most likely to receive random response -- Loop through the ASCII probes most likely to receive random response
-- from Skype. Others will also recieve this response, but are harder to -- from Skype. Others will also receive this response, but are harder to
-- distinguish from an echo service. -- distinguish from an echo service.
for _, p in ipairs({"HTTPOptions", "RTSPRequest"}) do for _, p in ipairs({"HTTPOptions", "RTSPRequest"}) do
rand = U.get_response(port.version.service_fp, p) rand = U.get_response(port.version.service_fp, p)

View File

@@ -73,7 +73,7 @@ end
-- @param IPv6_Network A IPv6 Address ( X:X:X:X::/YY ) -- @param IPv6_Network A IPv6 Address ( X:X:X:X::/YY )
-- @param IPv4SHosts A IPv4 String can be: X.X.X.X or X.X.X.X/YY -- @param IPv4SHosts A IPv4 String can be: X.X.X.X or X.X.X.X/YY
-- @param addr_table A table to hold the generated addresses. -- @param addr_table A table to hold the generated addresses.
-- @return Number Total succesfuly nodes added to the scan. -- @return Number Total successfully nodes added to the scan.
-- @return Error A warning if something happened. (Nil otherwise) -- @return Error A warning if something happened. (Nil otherwise)
local From_4_to_6 = function (IPv6_Network, IPv4SHosts, addr_table) local From_4_to_6 = function (IPv6_Network, IPv4SHosts, addr_table)

View File

@@ -65,7 +65,7 @@ end
-- @param User_Segs Number of segments to search. -- @param User_Segs Number of segments to search.
-- @param User_Right Boolean for fill right or left (Default) -- @param User_Right Boolean for fill right or left (Default)
-- @return Boolean True if was successful the operation -- @return Boolean True if was successful the operation
-- @return Number Total of successfuly nodes added to the scan list. -- @return Number Total of successfully nodes added to the scan list.
-- @return Error Any error generated, default: "" not nil. -- @return Error Any error generated, default: "" not nil.
local CrearRangoHosts = function (Direccion, Prefijo, TablaPalabras, local CrearRangoHosts = function (Direccion, Prefijo, TablaPalabras,
User_Segs, User_Right) User_Segs, User_Right)

View File

@@ -135,11 +135,11 @@ Driver = {
end end
stdnse.debug(2,"Screen Recieved for User ID: %s", user) stdnse.debug(2,"Screen Received for User ID: %s", user)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
if not self.tn3270:find('Enter LOGON parameters below') then if not self.tn3270:find('Enter LOGON parameters below') then
stdnse.debug(2,"Screen Recieved for User ID: %s", user) stdnse.debug(2,"Screen Received for User ID: %s", user)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
-- This error occurs on too many concurrent application requests it -- This error occurs on too many concurrent application requests it
-- should be temporary. We use the new setReduce function. -- should be temporary. We use the new setReduce function.
@@ -172,7 +172,7 @@ Driver = {
self.tn3270:get_all_data() self.tn3270:get_all_data()
end end
stdnse.debug(2,"Screen Recieved for User/Pass: %s/%s", user, pass) stdnse.debug(2,"Screen Received for User/Pass: %s/%s", user, pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
if not always_logon and self.tn3270:find("already logged on") then if not always_logon and self.tn3270:find("already logged on") then

View File

@@ -133,7 +133,7 @@ Driver = {
-- some systems require an enter after sending a valid user ID -- some systems require an enter after sending a valid user ID
end end
stdnse.debug(2,"Screen Recieved for User ID: %s", pass) stdnse.debug(2,"Screen Received for User ID: %s", pass)
self.tn3270:get_screen_debug(2) self.tn3270:get_screen_debug(2)
if self.tn3270:find('not authorized to use TSO') or if self.tn3270:find('not authorized to use TSO') or
self.tn3270:find('IKJ56710I INVALID USERID') then -- invalid user ID self.tn3270:find('IKJ56710I INVALID USERID') then -- invalid user ID

View File

@@ -168,11 +168,11 @@ int main()
0x00, 0x01, // Answers RRs count 0x00, 0x01, // Answers RRs count
0x00, 0x00, // Authorities RRs count 0x00, 0x00, // Authorities RRs count
0x00, 0x00, // Additionals RRs count 0x00, 0x00, // Additionals RRs count
0x06, // Label lenght <-- [12] 0x06, // Label length <-- [12]
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme" 0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
0x04, // Label lenght 0x04, // Label length
0x6e, 0x6d, 0x61, 0x70, // "nmap" 0x6e, 0x6d, 0x61, 0x70, // "nmap"
0x03, // Label lenght 0x03, // Label length
0x6f, 0x72, 0x67, // "org" 0x6f, 0x72, 0x67, // "org"
0x00, // Name terminator 0x00, // Name terminator
0x00, 0x01, // A 0x00, 0x01, // A
@@ -181,7 +181,7 @@ int main()
0x00, 0x01, // A 0x00, 0x01, // A
0x00, 0x01, // CLASS_IN 0x00, 0x01, // CLASS_IN
0x00, 0x00, 0x0e, 0x0f, // TTL 3599 0x00, 0x00, 0x0e, 0x0f, // TTL 3599
0x00, 0x04, // Record Lenght 0x00, 0x04, // Record Length
0x2d, 0x21, 0x20, 0x9c }; // 45.33.32.156 0x2d, 0x21, 0x20, 0x9c }; // 45.33.32.156
plen = p.parseFromBuffer(answere_buf, answere_len); plen = p.parseFromBuffer(answere_buf, answere_len);
@@ -213,17 +213,17 @@ int main()
0x00, 0x01, // Answers RRs count 0x00, 0x01, // Answers RRs count
0x00, 0x00, // Authorities RRs count 0x00, 0x00, // Authorities RRs count
0x00, 0x00, // Additionals RRs count 0x00, 0x00, // Additionals RRs count
0x03, // Label lenght 0x03, // Label length
0x31, 0x35, 0x36, // "156" 0x31, 0x35, 0x36, // "156"
0x02, // Label lenght 0x02, // Label length
0x33, 0x32, // "32" 0x33, 0x32, // "32"
0x02, // Label lenght 0x02, // Label length
0x33, 0x33, // "33" 0x33, 0x33, // "33"
0x02, // Label lenght 0x02, // Label length
0x34, 0x35, // "45" 0x34, 0x35, // "45"
0x07, // Label lenght 0x07, // Label length
0x69, 0x6e, 0x2d, 0x61, 0x64, 0x64, 0x72, // "in-addr" 0x69, 0x6e, 0x2d, 0x61, 0x64, 0x64, 0x72, // "in-addr"
0x04, // Label lenght 0x04, // Label length
0x61, 0x72, 0x70, 0x61, // "arpa" 0x61, 0x72, 0x70, 0x61, // "arpa"
0x00, // Name terminator 0x00, // Name terminator
0x00, 0x0c, // PTR 0x00, 0x0c, // PTR
@@ -232,12 +232,12 @@ int main()
0x00, 0x0c, // PTR 0x00, 0x0c, // PTR
0x00, 0x01, // CLASS_IN 0x00, 0x01, // CLASS_IN
0x00, 0x01, 0x51, 0x78, // TTL 86392 0x00, 0x01, 0x51, 0x78, // TTL 86392
0x00, 0x11, // Record Lenght 0x00, 0x11, // Record Length
0x06, // Label lenght 0x06, // Label length
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme" 0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
0x04, // Label lenght 0x04, // Label length
0x6e, 0x6d, 0x61, 0x70, // "nmap" 0x6e, 0x6d, 0x61, 0x70, // "nmap"
0x03, // Label lenght 0x03, // Label length
0x6f, 0x72, 0x67, // "org" 0x6f, 0x72, 0x67, // "org"
0x00 }; // Name terminator 0x00 }; // Name terminator