mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Update scripts with millisecond timeouts to timespec
Similar changes to r30653, but may break compatibility with people using integer millisecond values, which are now treated as number of seconds. To get same behavior, use ms after number, e.g. 5000 becomes 5000ms or 5s
This commit is contained in:
@@ -44,7 +44,7 @@ is 0. The payload is consisted of random bytes.
|
|||||||
--
|
--
|
||||||
-- @args broadcast-ping.interface string specifying which interface to use for this script (default all interfaces)
|
-- @args broadcast-ping.interface string specifying which interface to use for this script (default all interfaces)
|
||||||
-- @args broadcast-ping.num_probes number specifying how many ICMP probes should be sent (default 1)
|
-- @args broadcast-ping.num_probes number specifying how many ICMP probes should be sent (default 1)
|
||||||
-- @args broadcast-ping.timeout number specifying how long to wait for response in milliseconds (default 3000)
|
-- @args broadcast-ping.timeout timespec specifying how long to wait for response (default 3s)
|
||||||
--
|
--
|
||||||
-- @output
|
-- @output
|
||||||
-- | broadcast-ping:
|
-- | broadcast-ping:
|
||||||
@@ -141,8 +141,8 @@ local broadcast_if = function(if_table,icmp_responders)
|
|||||||
|
|
||||||
local num_probes = tonumber(stdnse.get_script_args(SCRIPT_NAME .. ".num-probes")) or 1
|
local num_probes = tonumber(stdnse.get_script_args(SCRIPT_NAME .. ".num-probes")) or 1
|
||||||
|
|
||||||
local timeout = stdnse.get_script_args(SCRIPT_NAME .. ".timeout")
|
local timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME .. ".timeout"))
|
||||||
if not timeout then timeout = 3000 end
|
timeout = (timeout or 3) * 1000
|
||||||
|
|
||||||
local ttl = nmap.get_ttl()
|
local ttl = nmap.get_ttl()
|
||||||
|
|
||||||
|
|||||||
@@ -22,8 +22,8 @@ LAN by sending a broadcast RIPng Request command and collecting any responses.
|
|||||||
-- | fe80:471:0:0:0:0:0:0/64 1
|
-- | fe80:471:0:0:0:0:0:0/64 1
|
||||||
-- |_ fe80:472:0:0:0:0:0:0/64 1
|
-- |_ fe80:472:0:0:0:0:0:0/64 1
|
||||||
--
|
--
|
||||||
-- @args broadcast-ripng-discover.timeout sets the connection timeout in ms
|
-- @args broadcast-ripng-discover.timeout sets the connection timeout
|
||||||
-- (default: 5000ms)
|
-- (default: 5s)
|
||||||
|
|
||||||
author = "Patrik Karlsson"
|
author = "Patrik Karlsson"
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
@@ -172,7 +172,8 @@ action = function()
|
|||||||
local req = RIPng.Request:new( { RIPng.RTE:new("0::", 0, 0, 16) } )
|
local req = RIPng.Request:new( { RIPng.RTE:new("0::", 0, 0, 16) } )
|
||||||
local host, port = "FF02::9", { number = 521, protocol = "udp" }
|
local host, port = "FF02::9", { number = 521, protocol = "udp" }
|
||||||
local iface = nmap.get_interface()
|
local iface = nmap.get_interface()
|
||||||
local timeout = stdnse.get_script_args(SCRIPT_NAME..".timeout") or 5000
|
local timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME..".timeout"))
|
||||||
|
timeout = (timeout or 5) * 1000
|
||||||
|
|
||||||
local sock = nmap.new_socket("udp")
|
local sock = nmap.new_socket("udp")
|
||||||
sock:bind(nil, 521)
|
sock:bind(nil, 521)
|
||||||
|
|||||||
@@ -48,7 +48,7 @@ References:
|
|||||||
--
|
--
|
||||||
-- @args http-method-tamper.uri Base URI to crawl. Not aplicable if <code>http-method-tamper.paths</code> is set.
|
-- @args http-method-tamper.uri Base URI to crawl. Not aplicable if <code>http-method-tamper.paths</code> is set.
|
||||||
-- @args http-method-tamper.paths Array of paths to check. If not set, the script will crawl the web server.
|
-- @args http-method-tamper.paths Array of paths to check. If not set, the script will crawl the web server.
|
||||||
-- @args http-method-tamper.timeout Web crawler timeout. Default: 10000ms
|
-- @args http-method-tamper.timeout Web crawler timeout. Default: 10s
|
||||||
---
|
---
|
||||||
|
|
||||||
author = "Paulino Calderon <calderon()websec.mx>"
|
author = "Paulino Calderon <calderon()websec.mx>"
|
||||||
@@ -100,7 +100,8 @@ action = function(host, port)
|
|||||||
local vuln_uris = {}
|
local vuln_uris = {}
|
||||||
local paths = stdnse.get_script_args(SCRIPT_NAME..".paths")
|
local paths = stdnse.get_script_args(SCRIPT_NAME..".paths")
|
||||||
local uri = stdnse.get_script_args(SCRIPT_NAME..".uri") or "/"
|
local uri = stdnse.get_script_args(SCRIPT_NAME..".uri") or "/"
|
||||||
local timeout = stdnse.get_script_args(SCRIPT_NAME..".timeout") or 10000
|
local timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME..".timeout"))
|
||||||
|
timeout = (timeout or 10) * 1000
|
||||||
local vuln = {
|
local vuln = {
|
||||||
title = 'Authentication bypass by HTTP verb tampering',
|
title = 'Authentication bypass by HTTP verb tampering',
|
||||||
state = vulns.STATE.NOT_VULN,
|
state = vulns.STATE.NOT_VULN,
|
||||||
|
|||||||
@@ -38,7 +38,7 @@ The attack vector/probe used is: <code>/'"/><script>alert(1)</script></code>
|
|||||||
-- | https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
|
-- | https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
|
||||||
-- |_ http://php.net/manual/en/reserved.variables.server.php
|
-- |_ http://php.net/manual/en/reserved.variables.server.php
|
||||||
-- @args http-phpself-xss.uri URI. Default: /
|
-- @args http-phpself-xss.uri URI. Default: /
|
||||||
-- @args http-phpself-xss.timeout Spidering timeout. Default:10000
|
-- @args http-phpself-xss.timeout Spidering timeout. (default 10s)
|
||||||
author = "Paulino Calderon"
|
author = "Paulino Calderon"
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
categories = {"fuzzer", "intrusive", "vuln"}
|
categories = {"fuzzer", "intrusive", "vuln"}
|
||||||
@@ -100,7 +100,8 @@ end
|
|||||||
---
|
---
|
||||||
action = function(host, port)
|
action = function(host, port)
|
||||||
local uri = stdnse.get_script_args(SCRIPT_NAME..".uri") or "/"
|
local uri = stdnse.get_script_args(SCRIPT_NAME..".uri") or "/"
|
||||||
local timeout = stdnse.get_script_args(SCRIPT_NAME..'.timeout') or 10000
|
local timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME..'.timeout'))
|
||||||
|
timeout = (timeout or 10) * 1000
|
||||||
local crawler = httpspider.Crawler:new(host, port, uri, { scriptname = SCRIPT_NAME } )
|
local crawler = httpspider.Crawler:new(host, port, uri, { scriptname = SCRIPT_NAME } )
|
||||||
crawler:set_timeout(timeout)
|
crawler:set_timeout(timeout)
|
||||||
|
|
||||||
|
|||||||
@@ -26,14 +26,15 @@ http://mobilemouse.com/
|
|||||||
-- | Statistics
|
-- | Statistics
|
||||||
-- |_ Performed 1199 guesses in 23 seconds, average tps: 47
|
-- |_ Performed 1199 guesses in 23 seconds, average tps: 47
|
||||||
--
|
--
|
||||||
-- @args mmouse-brute.timeout socket timeout (milliseconds) for connecting to Mobile Mouse (default 5000)
|
-- @args mmouse-brute.timeout socket timeout for connecting to Mobile Mouse (default 5s)
|
||||||
|
|
||||||
author = "Patrik Karlsson"
|
author = "Patrik Karlsson"
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
categories = {"intrusive", "brute"}
|
categories = {"intrusive", "brute"}
|
||||||
|
|
||||||
|
|
||||||
local arg_timeout = stdnse.get_script_args(SCRIPT_NAME .. ".timeout") or 5000
|
local arg_timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME .. ".timeout"))
|
||||||
|
arg_timeout = (arg_timeout or 5) * 1000
|
||||||
|
|
||||||
portrule = shortport.port_or_service(51010, "mmouse", "tcp")
|
portrule = shortport.port_or_service(51010, "mmouse", "tcp")
|
||||||
|
|
||||||
|
|||||||
@@ -67,7 +67,7 @@ Interesting post about this vuln:
|
|||||||
-- @args mysql-vuln-cve2012-2122.user MySQL username. Default: root.
|
-- @args mysql-vuln-cve2012-2122.user MySQL username. Default: root.
|
||||||
-- @args mysql-vuln-cve2012-2122.pass MySQL password. Default: nmapFTW.
|
-- @args mysql-vuln-cve2012-2122.pass MySQL password. Default: nmapFTW.
|
||||||
-- @args mysql-vuln-cve2012-2122.iterations Connection retries. Default: 1500.
|
-- @args mysql-vuln-cve2012-2122.iterations Connection retries. Default: 1500.
|
||||||
-- @args mysql-vuln-cve2012-2122.socket_timeout Socket timeout (milliseconds). Default: 5000.
|
-- @args mysql-vuln-cve2012-2122.socket_timeout Socket timeout. Default: 5s.
|
||||||
---
|
---
|
||||||
|
|
||||||
local mysql = require "mysql"
|
local mysql = require "mysql"
|
||||||
@@ -121,7 +121,8 @@ basically account password protection is as good as nonexistent.
|
|||||||
local mysql_user = stdnse.get_script_args(SCRIPT_NAME..".user") or "root"
|
local mysql_user = stdnse.get_script_args(SCRIPT_NAME..".user") or "root"
|
||||||
local mysql_pwd = stdnse.get_script_args(SCRIPT_NAME..".pass") or "nmapFTW"
|
local mysql_pwd = stdnse.get_script_args(SCRIPT_NAME..".pass") or "nmapFTW"
|
||||||
local iterations = stdnse.get_script_args(SCRIPT_NAME..".iterations") or 1500
|
local iterations = stdnse.get_script_args(SCRIPT_NAME..".iterations") or 1500
|
||||||
local conn_timeout = stdnse.get_script_args(SCRIPT_NAME..".socket_timeout") or 5000
|
local conn_timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME..".socket_timeout"))
|
||||||
|
conn_timeout = (conn_timeout or 5) * 1000
|
||||||
|
|
||||||
socket:set_timeout(conn_timeout)
|
socket:set_timeout(conn_timeout)
|
||||||
|
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ Performs brute force password auditing against a Nessus vulnerability scanning d
|
|||||||
-- |_ Performed 1933 guesses in 26 seconds, average tps: 73
|
-- |_ Performed 1933 guesses in 26 seconds, average tps: 73
|
||||||
--
|
--
|
||||||
-- @args nessus-xmlrpc-brute.threads sets the number of threads.
|
-- @args nessus-xmlrpc-brute.threads sets the number of threads.
|
||||||
-- @args nessus-xmlrpc-brute.timeout socket timeout (milliseconds) for connecting to Nessus (default 5000)
|
-- @args nessus-xmlrpc-brute.timeout socket timeout for connecting to Nessus (default 5s)
|
||||||
|
|
||||||
author = "Patrik Karlsson"
|
author = "Patrik Karlsson"
|
||||||
|
|
||||||
@@ -31,11 +31,11 @@ categories = {"intrusive", "brute"}
|
|||||||
|
|
||||||
portrule = shortport.port_or_service(8834, "ssl/http", "tcp")
|
portrule = shortport.port_or_service(8834, "ssl/http", "tcp")
|
||||||
|
|
||||||
local arg_timeout = stdnse.get_script_args(SCRIPT_NAME..'.timeout')
|
local arg_timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME..'.timeout'))
|
||||||
|
arg_timeout = (arg_timeout or 5) * 1000
|
||||||
local arg_threads = stdnse.get_script_args("nessus-xmlrpc-brute.threads")
|
local arg_threads = stdnse.get_script_args("nessus-xmlrpc-brute.threads")
|
||||||
|
|
||||||
local function authenticate(host, port, username, password)
|
local function authenticate(host, port, username, password)
|
||||||
local timeout = arg_timeout or 5000
|
|
||||||
local post_data = ("login=%s&password=%s"):format(username, password)
|
local post_data = ("login=%s&password=%s"):format(username, password)
|
||||||
|
|
||||||
local headers = {
|
local headers = {
|
||||||
@@ -49,7 +49,7 @@ local function authenticate(host, port, username, password)
|
|||||||
|
|
||||||
local data = table.concat(headers, "\r\n") .. "\r\n\r\n" .. post_data
|
local data = table.concat(headers, "\r\n") .. "\r\n\r\n" .. post_data
|
||||||
local socket = nmap.new_socket()
|
local socket = nmap.new_socket()
|
||||||
socket:set_timeout(timeout)
|
socket:set_timeout(arg_timeout)
|
||||||
|
|
||||||
local status, err = socket:connect(host, port)
|
local status, err = socket:connect(host, port)
|
||||||
if ( not(status) ) then
|
if ( not(status) ) then
|
||||||
|
|||||||
Reference in New Issue
Block a user