From 7f58dc082c469d8cd1556124a7f3896a62333960 Mon Sep 17 00:00:00 2001 From: ejlbell Date: Sat, 15 Mar 2008 21:09:29 +0000 Subject: [PATCH] Switched bruteTelnet to the vulnerability category so it is not executed by default. Prompted by a bug report stating bruteTelnet failed on windows but switching is a good idea anyway as the script takes a long time to run. --- scripts/bruteTelnet.nse | 2 +- scripts/script.db | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/bruteTelnet.nse b/scripts/bruteTelnet.nse index 712913b83..d32198941 100644 --- a/scripts/bruteTelnet.nse +++ b/scripts/bruteTelnet.nse @@ -2,7 +2,7 @@ id='bruteforce' author = 'Eddie Bell ' description='brute force telnet login credientials' license = 'See nmaps COPYING for licence' -categories = {'intrusive'} +categories = {'vulnerability'} require('shortport') require('stdnse') diff --git a/scripts/script.db b/scripts/script.db index dd60085a0..66456c008 100644 --- a/scripts/script.db +++ b/scripts/script.db @@ -18,7 +18,7 @@ Entry{ category = "intrusive", filename = "SSHv1-support.nse" } Entry{ category = "intrusive", filename = "SSLv2-support.nse" } Entry{ category = "safe", filename = "UPnP-info.nse" } Entry{ category = "intrusive", filename = "anonFTP.nse" } -Entry{ category = "intrusive", filename = "bruteTelnet.nse" } +Entry{ category = "vulnerability", filename = "bruteTelnet.nse" } Entry{ category = "demo", filename = "chargenTest.nse" } Entry{ category = "demo", filename = "daytimeTest.nse" } Entry{ category = "intrusive", filename = "dns-test-open-recursion.nse" }