mirror of
https://github.com/nmap/nmap.git
synced 2025-12-22 07:29:01 +00:00
o [NSE] Added the qscan script to repeatedly probe ports on a host to
gather round-trip times for each port. The script then uses these times to group together ports with statistically equivalent RTTs. Ports in different groups could be the result of things such as port forwarding to hosts behind a NAT. This is based on work by Doug Hoyte. [Kris]
This commit is contained in:
@@ -1,5 +1,3 @@
|
||||
Entry { filename = "afp-path-exploit.nse", categories = { "safe", "vuln", } }
|
||||
Entry { filename = "afp-path-vuln.nse", categories = { "safe", "vuln", } }
|
||||
Entry { filename = "afp-showmount.nse", categories = { "discovery", "safe", } }
|
||||
Entry { filename = "asn-query.nse", categories = { "discovery", "external", "safe", } }
|
||||
Entry { filename = "auth-owners.nse", categories = { "default", "safe", } }
|
||||
@@ -71,6 +69,7 @@ Entry { filename = "pjl-ready-message.nse", categories = { "intrusive", } }
|
||||
Entry { filename = "pop3-brute.nse", categories = { "auth", "intrusive", } }
|
||||
Entry { filename = "pop3-capabilities.nse", categories = { "default", "discovery", "safe", } }
|
||||
Entry { filename = "pptp-version.nse", categories = { "version", } }
|
||||
Entry { filename = "qscan.nse", categories = { "discovery", "safe", } }
|
||||
Entry { filename = "realvnc-auth-bypass.nse", categories = { "default", "safe", "vuln", } }
|
||||
Entry { filename = "robots.txt.nse", categories = { "default", "discovery", "safe", } }
|
||||
Entry { filename = "rpcinfo.nse", categories = { "discovery", "safe", } }
|
||||
|
||||
Reference in New Issue
Block a user