From 776a11146e6a36bff2648d7444c948707c21ae77 Mon Sep 17 00:00:00 2001 From: patrik Date: Sun, 13 Nov 2011 12:56:29 +0000 Subject: [PATCH] Added code to brute library that picks up the executing SCRIPT_NAME using getfenv [Patrik] --- nselib/brute.lua | 3 +++ 1 file changed, 3 insertions(+) diff --git a/nselib/brute.lua b/nselib/brute.lua index e0e8d647a..93197d6ac 100644 --- a/nselib/brute.lua +++ b/nselib/brute.lua @@ -623,7 +623,10 @@ Engine = local cvar = {} local condvar = nmap.condvar( cvar ) + local script_env = getfenv(2) + -- get the SCRIPT_NAME of the executing script + self.options.script_name = self.options.script_name or script_env.SCRIPT_NAME assert(self.options.script_name, "SCRIPT_NAME was not set in options.script_name") assert(self.port.number and self.port.protocol, "Invalid port table detected") self.port.service = self.port.service or "unknown"