mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Correct typos: receive, successfully, length
This commit is contained in:
@@ -1148,7 +1148,7 @@ o [NSE] Fix Diffie-Hellman parameter extraction in tls.lua. [Jacob Gajek]
|
||||
|
||||
Nmap 6.49BETA2 [2015-06-16]
|
||||
|
||||
o [GH#154] Fix a crash (assertion error) when Nmap recieves an ICMP Host
|
||||
o [GH#154] Fix a crash (assertion error) when Nmap receives an ICMP Host
|
||||
Unreachable message.
|
||||
|
||||
o [GH#158] Fix a configure failure when Python is not present, but no Python
|
||||
|
||||
@@ -22144,7 +22144,7 @@ U1(DF=N%T=FA-104%TG=FF%IPL=38%UN=0%RIPL=3401%RID=G%RIPCK=G%RUCK=G%RUD=G)
|
||||
IE(DFI=S%T=FA-104%TG=FF%CD=S)
|
||||
|
||||
# Dish Network Hopper with Wi-Fi adapter (http://www.dish.com/technology/hopper/)
|
||||
# Dish Hopper Joey Reciever
|
||||
# Dish Hopper Joey Receiver
|
||||
Fingerprint Dish Network Hopper media device
|
||||
Class Dish | embedded || media device
|
||||
CPE cpe:/h:dish:hopper
|
||||
|
||||
@@ -5410,7 +5410,7 @@ match http m|^HTTP/1\.1 404 Not Found\r\n\r\n$| p|SAGE EAS Digital Endec remote
|
||||
match http m|^\(null\) 400 Bad Request\r\nServer: \r\nDate: .*\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n| p/Arris TG862G http config/ d/WAP/ cpe:/h:arris:tg862g/a
|
||||
match http m|^HTTP/1\.0 401 Unauthorized\r\nConnection: close\r\nContent-Type: text/html\r\nServer: SNARE\r\nWWW-Authenticate: Digest realm=\"SNARE\", qop=\"auth\", nonce=\"[a-f0-9]+\", opaque=\"[a-f0-9]+\"\r\n\r\n| p/InterSect SNARE Server/ d/security-misc/ cpe:/a:intersectalliance:system_intrusion_analysis_and_reporting_environment/
|
||||
match http m|^HTTP/1\.1 400 Bad Request\r\nServer: Piolink Switch\r\n| p/Piolink ADC/
|
||||
match http m|^HTTP/1\.1 501\r\nX-AV-Server-Info: av=\"5\.:0\"; cn=\"Sony Corporation\"; mn=\"([^"]+)\"; mv=\"([^"]+)\"\r\nX-AV-Physical-Unit-Info: pa=\"\1\"\r\nConnection: close\r\n| p/Sony $1 AV reciever http info/ v/$2/ d/media device/ cpe:/h:sony:$1:$2/
|
||||
match http m|^HTTP/1\.1 501\r\nX-AV-Server-Info: av=\"5\.:0\"; cn=\"Sony Corporation\"; mn=\"([^"]+)\"; mv=\"([^"]+)\"\r\nX-AV-Physical-Unit-Info: pa=\"\1\"\r\nConnection: close\r\n| p/Sony $1 AV receiver http info/ v/$2/ d/media device/ cpe:/h:sony:$1:$2/
|
||||
match http m|^HTTP/1\.1 200 OK\nContent-Type: text/html; charset=UTF-8\nContent-Length: \d+\n\n<html>\n<!--\n \* WiFi Keyboard - Remote Keyboard for Android\.\n \* Copyright \(C\) 2011 Ivan Volosyuk\n| p/WiFi Keyboard for Android/ d/phone/ o/Android/ cpe:/o:google:android/a cpe:/o:linux:linux_kernel/a
|
||||
match http m|^HTTP/1\.1 200 OK\r\nConnection: Keep-Alive\r\nContent-Length: \d+\r\nContent-Type: application/octet-stream\r\nDate: .*\r\nKeep-Alive: timeout=15; max=19\r\n\r\n\0\0\0\x03\0\0\0\x06error\0\0\0\0\0\0\0\x01\0\0\0\x05\0\0\0\x11no_save_password\0\0\0\0\0\0\0\x01\0\0\0\0\0\0\0\x08pencore| p/SoftEther VPN httpd/ cpe:/a:university_of_tsukuba:softether_vpn/
|
||||
match http m|^HTTP/1\.0 401\r\nWWW-Authenticate: Digest realm=\"mongo\", nonce=\"abc\", algorithm=MD5, qop=\"auth\" \r\n\r\nnot allowed\n$| p/MongoDB simple REST interface/ v/1.5.0 or older/ cpe:/a:mongodb:mongodb/
|
||||
@@ -9572,7 +9572,7 @@ match http m|^HTTP/1\.1 400 Bad Request\r\nSERVER: HDHomeRun/([\w._-]+)\r\n| p/S
|
||||
match http m|^HTTP/1\.0 401 Unauthorized\r\nDate: .*\r\nContent-type: text/html\r\nContent-Length: 97\r\nWWW-Authenticate: Digest qop=\"auth\", stale=false, algorithm=MD5, realm=\"(ECOR[\w_-]+)\", nonce=\"\d+\"\r\nConnection: keep-alive\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY><H1>401 Unauthorized</H1></BODY></HTML>\n| p/EverFocus $1 DVR http viewer/ d/media device/ cpe:/h:everfocus:$1/
|
||||
match http m|^HTTP/1\.0 200 OK\r\nDate: .*\r\nServer: Raumfeld Renderer\r\nConnection: close\r\nContent-Type: audio/x-flac\r\n| p/Raumfeld Connector audio streaming httpd/ d/media device/ cpe:/h:teufel:raumfeld_connector/
|
||||
match http m|^HTTP/1\.1 200 OK\r\nServer: Linux, WEBACCESS/([\w._-]+), (DIR-\w+) Ver ([\w._-]+)\r\n| p/D-Link SharePort web access/ v/$1/ i/model $2, version $3/ d/storage-misc/ o/Linux/ cpe:/a:d-link:shareport_web_access:$1/ cpe:/h:d-link:$2/ cpe:/o:linux:linux_kernel/a
|
||||
match http m|^HTTP/1\.1 400 Bad Request\r\nConnection: close\r\nContent-Length: 0\r\n\r\n$| p/T-Home Telekom Media Reciever httpd/ d/media device/
|
||||
match http m|^HTTP/1\.1 400 Bad Request\r\nConnection: close\r\nContent-Length: 0\r\n\r\n$| p/T-Home Telekom Media Receiver httpd/ d/media device/
|
||||
match http m%^HTTP/1\.1 400 Bad Request\r\nContent-Type: text/html; charset=\"utf-8\"\r\nServer: Linux/((2\.[46]\.\d+|\d\.\d+)\S*) DoaHTTP\r\nContent-Length: 0\r\nDate: .* GMT\r\n\r\n$% p/com.sec.android.app.FileTransferServer/ i/Linux $1/ o/Android/ cpe:/o:google:android/ cpe:/o:linux:linux_kernel:$2/
|
||||
match http m|^HTTP/1\.0 \d\d\d .*\r\nServer: WebIOPi/([\w._-]+)/Python(\d[\w._-]*)\r\n| p/WebIOPi IoT framework/ v/$1/ i/Python $2/ cpe:/a:python:python:$2/ cpe:/a:trouch:webiopi:$1/
|
||||
match http m|^HTTP/1\.0 200 OK\r\nPragma: no-cache\r\nContent-Type: text/html\r\n\r\n<html><head><title></title>\n.*\n<script language=\"javascript\">\nvar lanIP=\"[\d.]+\";\nvar wanIP=\"([\d.]+)\";|s p/EnGenius ESR600 router http admin/ i/WAN IP: $1/ cpe:/h:engenius:esr600/a
|
||||
|
||||
@@ -1508,12 +1508,12 @@ size_t DNS::Factory::putDomainName(const std::string &name, u8 *buf, size_t offs
|
||||
{
|
||||
if((*c)=='.')
|
||||
{
|
||||
u8 lenght = accumulator.length();
|
||||
*(buf+offset+ret) = lenght;
|
||||
u8 length = accumulator.length();
|
||||
*(buf+offset+ret) = length;
|
||||
ret += 1;
|
||||
|
||||
memcpy(buf+offset+ret, accumulator.c_str(), lenght);
|
||||
ret += lenght;
|
||||
memcpy(buf+offset+ret, accumulator.c_str(), length);
|
||||
ret += length;
|
||||
accumulator.clear();
|
||||
}
|
||||
else
|
||||
|
||||
@@ -545,7 +545,7 @@ StartTLS = {
|
||||
end,
|
||||
wrap_receive = function(self)
|
||||
-- mostly lifted from mssql.TDSStream.Receive
|
||||
-- TODO: Modify that function to allow recieving arbitrary response
|
||||
-- TODO: Modify that function to allow receiving arbitrary response
|
||||
-- types, since it's only because it forces type 0x04 that we had to
|
||||
-- do this here (where we expect type 0x12)
|
||||
local combinedData = ""
|
||||
|
||||
@@ -160,7 +160,7 @@ Driver = {
|
||||
stdnse.debug(2,'Trying CICS: %s : %s', user, pass)
|
||||
self.tn3270:send_locations({user_loc,pass_loc})
|
||||
self.tn3270:get_all_data()
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
local count = 1
|
||||
while not self.tn3270:find('DFHCE3549') and count < 6 do -- some systems show a message for a bit before we get to CICS again
|
||||
@@ -184,7 +184,7 @@ Driver = {
|
||||
max_blank = max_blank + 1
|
||||
end
|
||||
|
||||
stdnse.debug(2,"Screen Recieved for Transaction ID: %s", pass)
|
||||
stdnse.debug(2,"Screen Received for Transaction ID: %s", pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
if self.tn3270:find('not recognized') or self.tn3270:find('DFHAC2002') then -- known invalid command
|
||||
stdnse.debug("Invalid CICS Transaction ID: %s", string.upper(pass))
|
||||
@@ -334,7 +334,7 @@ local function cics_test( host, port, commands, user, pass )
|
||||
stdnse.verbose('Trying CICS: %s : %s', user, pass)
|
||||
tn:send_locations({user_loc,pass_loc})
|
||||
tn:get_all_data()
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
|
||||
tn:get_screen_debug(2)
|
||||
count = 1
|
||||
while not tn:find('DFHCE3549') and count < 6 do
|
||||
|
||||
@@ -169,7 +169,7 @@ local function cics_info( host, port, commands, user, pass, cemt, trans )
|
||||
stdnse.verbose('Trying CICS: %s : %s', user, pass)
|
||||
tn:send_locations({user_loc,pass_loc})
|
||||
tn:get_all_data()
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s / %s", user, pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s / %s", user, pass)
|
||||
tn:get_screen_debug(2)
|
||||
count = 1
|
||||
while not tn:find('DFHCE3549') and count < 6 do
|
||||
|
||||
@@ -124,7 +124,7 @@ Driver = {
|
||||
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
|
||||
self.tn3270:send_locations({user_loc,pass_loc})
|
||||
self.tn3270:get_all_data()
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s/%s", user, pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s/%s", user, pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
|
||||
local loop = 1
|
||||
@@ -132,7 +132,7 @@ Driver = {
|
||||
stdnse.verbose('Trying CICS: ' .. user ..' : ' .. pass)
|
||||
self.tn3270:send_locations({user_loc,pass_loc})
|
||||
self.tn3270:get_all_data()
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s/%s", user, pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s/%s", user, pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
loop = loop + 1 -- We don't want this to loop forever
|
||||
end
|
||||
@@ -143,7 +143,7 @@ Driver = {
|
||||
return false, err
|
||||
end
|
||||
|
||||
-- Now check what we recieved if its valid or not
|
||||
-- Now check what we received if its valid or not
|
||||
if self.tn3270:find('TSS7101E') or
|
||||
self.tn3270:find('DFHCE3530') or
|
||||
self.tn3270:find('DFHCE3532') then
|
||||
|
||||
@@ -117,7 +117,7 @@ Driver = {
|
||||
stdnse.verbose("Trying User ID: %s", pass)
|
||||
self.tn3270:send_cursor(pass)
|
||||
self.tn3270:get_all_data()
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s", pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s", pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
if self.tn3270:find('TSS7145E') or
|
||||
self.tn3270:find('ACF01004') or
|
||||
|
||||
@@ -205,7 +205,7 @@ service. This vulnerability was discovered by Alejandro Hernandez (nitr0us).
|
||||
elseif cmd == "shutdown" then
|
||||
status = shutdown(host, port)
|
||||
if status then
|
||||
vuln.extra_info = "SHUTDOWN command sent succesfully."
|
||||
vuln.extra_info = "SHUTDOWN command sent successfully."
|
||||
vuln.state = vulns.STATE.VULN
|
||||
end
|
||||
else
|
||||
|
||||
@@ -96,7 +96,7 @@ local render = function(params, options)
|
||||
local res = http.post("dev.virtualearth.net", 80, query, headers, nil, body)
|
||||
if not res or res.status ~= 200 then
|
||||
stdnse.debug1("Error %d from API: %s", res.status, res.body)
|
||||
return false, ("Failed to recieve map using query '%s'."):format(query)
|
||||
return false, ("Failed to receive map using query '%s'."):format(query)
|
||||
end
|
||||
|
||||
local f = io.open(options["map_path"], "w")
|
||||
|
||||
@@ -81,7 +81,7 @@ local render = function(params, options)
|
||||
|
||||
local res = http.get("maps.googleapis.com", 80, query)
|
||||
if not res or res.status ~= 200 then
|
||||
return false, ("Failed to recieve map using query '%s'."):format(query)
|
||||
return false, ("Failed to receive map using query '%s'."):format(query)
|
||||
end
|
||||
|
||||
local f = io.open(options["map_path"], "w")
|
||||
|
||||
@@ -35,7 +35,7 @@ action = function(host, port)
|
||||
-- Probes sent, replies received, but no match.
|
||||
result = U.get_response(port.version.service_fp, "GetRequest")
|
||||
-- Loop through the ASCII probes most likely to receive random response
|
||||
-- from Skype. Others will also recieve this response, but are harder to
|
||||
-- from Skype. Others will also receive this response, but are harder to
|
||||
-- distinguish from an echo service.
|
||||
for _, p in ipairs({"HTTPOptions", "RTSPRequest"}) do
|
||||
rand = U.get_response(port.version.service_fp, p)
|
||||
|
||||
@@ -73,7 +73,7 @@ end
|
||||
-- @param IPv6_Network A IPv6 Address ( X:X:X:X::/YY )
|
||||
-- @param IPv4SHosts A IPv4 String can be: X.X.X.X or X.X.X.X/YY
|
||||
-- @param addr_table A table to hold the generated addresses.
|
||||
-- @return Number Total succesfuly nodes added to the scan.
|
||||
-- @return Number Total successfully nodes added to the scan.
|
||||
-- @return Error A warning if something happened. (Nil otherwise)
|
||||
local From_4_to_6 = function (IPv6_Network, IPv4SHosts, addr_table)
|
||||
|
||||
|
||||
@@ -65,7 +65,7 @@ end
|
||||
-- @param User_Segs Number of segments to search.
|
||||
-- @param User_Right Boolean for fill right or left (Default)
|
||||
-- @return Boolean True if was successful the operation
|
||||
-- @return Number Total of successfuly nodes added to the scan list.
|
||||
-- @return Number Total of successfully nodes added to the scan list.
|
||||
-- @return Error Any error generated, default: "" not nil.
|
||||
local CrearRangoHosts = function (Direccion, Prefijo, TablaPalabras,
|
||||
User_Segs, User_Right)
|
||||
|
||||
@@ -135,11 +135,11 @@ Driver = {
|
||||
end
|
||||
|
||||
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s", user)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s", user)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
|
||||
if not self.tn3270:find('Enter LOGON parameters below') then
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s", user)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s", user)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
-- This error occurs on too many concurrent application requests it
|
||||
-- should be temporary. We use the new setReduce function.
|
||||
@@ -172,7 +172,7 @@ Driver = {
|
||||
self.tn3270:get_all_data()
|
||||
end
|
||||
|
||||
stdnse.debug(2,"Screen Recieved for User/Pass: %s/%s", user, pass)
|
||||
stdnse.debug(2,"Screen Received for User/Pass: %s/%s", user, pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
|
||||
if not always_logon and self.tn3270:find("already logged on") then
|
||||
|
||||
@@ -133,7 +133,7 @@ Driver = {
|
||||
-- some systems require an enter after sending a valid user ID
|
||||
end
|
||||
|
||||
stdnse.debug(2,"Screen Recieved for User ID: %s", pass)
|
||||
stdnse.debug(2,"Screen Received for User ID: %s", pass)
|
||||
self.tn3270:get_screen_debug(2)
|
||||
if self.tn3270:find('not authorized to use TSO') or
|
||||
self.tn3270:find('IKJ56710I INVALID USERID') then -- invalid user ID
|
||||
|
||||
@@ -168,11 +168,11 @@ int main()
|
||||
0x00, 0x01, // Answers RRs count
|
||||
0x00, 0x00, // Authorities RRs count
|
||||
0x00, 0x00, // Additionals RRs count
|
||||
0x06, // Label lenght <-- [12]
|
||||
0x06, // Label length <-- [12]
|
||||
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
|
||||
0x04, // Label lenght
|
||||
0x04, // Label length
|
||||
0x6e, 0x6d, 0x61, 0x70, // "nmap"
|
||||
0x03, // Label lenght
|
||||
0x03, // Label length
|
||||
0x6f, 0x72, 0x67, // "org"
|
||||
0x00, // Name terminator
|
||||
0x00, 0x01, // A
|
||||
@@ -181,7 +181,7 @@ int main()
|
||||
0x00, 0x01, // A
|
||||
0x00, 0x01, // CLASS_IN
|
||||
0x00, 0x00, 0x0e, 0x0f, // TTL 3599
|
||||
0x00, 0x04, // Record Lenght
|
||||
0x00, 0x04, // Record Length
|
||||
0x2d, 0x21, 0x20, 0x9c }; // 45.33.32.156
|
||||
|
||||
plen = p.parseFromBuffer(answere_buf, answere_len);
|
||||
@@ -213,17 +213,17 @@ int main()
|
||||
0x00, 0x01, // Answers RRs count
|
||||
0x00, 0x00, // Authorities RRs count
|
||||
0x00, 0x00, // Additionals RRs count
|
||||
0x03, // Label lenght
|
||||
0x03, // Label length
|
||||
0x31, 0x35, 0x36, // "156"
|
||||
0x02, // Label lenght
|
||||
0x02, // Label length
|
||||
0x33, 0x32, // "32"
|
||||
0x02, // Label lenght
|
||||
0x02, // Label length
|
||||
0x33, 0x33, // "33"
|
||||
0x02, // Label lenght
|
||||
0x02, // Label length
|
||||
0x34, 0x35, // "45"
|
||||
0x07, // Label lenght
|
||||
0x07, // Label length
|
||||
0x69, 0x6e, 0x2d, 0x61, 0x64, 0x64, 0x72, // "in-addr"
|
||||
0x04, // Label lenght
|
||||
0x04, // Label length
|
||||
0x61, 0x72, 0x70, 0x61, // "arpa"
|
||||
0x00, // Name terminator
|
||||
0x00, 0x0c, // PTR
|
||||
@@ -232,12 +232,12 @@ int main()
|
||||
0x00, 0x0c, // PTR
|
||||
0x00, 0x01, // CLASS_IN
|
||||
0x00, 0x01, 0x51, 0x78, // TTL 86392
|
||||
0x00, 0x11, // Record Lenght
|
||||
0x06, // Label lenght
|
||||
0x00, 0x11, // Record Length
|
||||
0x06, // Label length
|
||||
0x73, 0x63, 0x61, 0x6e, 0x6d, 0x65, // "scanme"
|
||||
0x04, // Label lenght
|
||||
0x04, // Label length
|
||||
0x6e, 0x6d, 0x61, 0x70, // "nmap"
|
||||
0x03, // Label lenght
|
||||
0x03, // Label length
|
||||
0x6f, 0x72, 0x67, // "org"
|
||||
0x00 }; // Name terminator
|
||||
|
||||
|
||||
Reference in New Issue
Block a user