diff --git a/scripts/http-jsonp-detection.nse b/scripts/http-jsonp-detection.nse index d75f535e2..5acc12d3f 100644 --- a/scripts/http-jsonp-detection.nse +++ b/scripts/http-jsonp-detection.nse @@ -65,7 +65,7 @@ end --Checks if the callback function is controllable from URL local callback_url = function(host, port, target, callback_variable) local path, response, report - local value = rand.rand_alpha(8) + local value = rand.random_alpha(8) if callback_variable == nil then callback_variable = "callback" end diff --git a/scripts/http-vuln-cve2011-3368.nse b/scripts/http-vuln-cve2011-3368.nse index eb2f239e4..0c613fc72 100644 --- a/scripts/http-vuln-cve2011-3368.nse +++ b/scripts/http-vuln-cve2011-3368.nse @@ -71,7 +71,7 @@ servers to remote users who send carefully crafted requests.]], -- Take a reference chrono for a 404 local start = os.time(os.date('*t')) - local random_page = rand.rand_alpha(20) + local random_page = rand.random_alpha(20) local reference = http.get(host,port,("%s/%s.htm"):format(prefix,random_page)) local chrono_404 = os.time(os.date('*t'))-start diff --git a/scripts/http-vuln-cve2017-5638.nse b/scripts/http-vuln-cve2017-5638.nse index c986387a0..60c3d3b10 100644 --- a/scripts/http-vuln-cve2017-5638.nse +++ b/scripts/http-vuln-cve2017-5638.nse @@ -62,7 +62,7 @@ vulnerability via the Content-Type header. local method = stdnse.get_script_args(SCRIPT_NAME..".method") or "GET" local path = stdnse.get_script_args(SCRIPT_NAME..".path") or "/" - local value = rand.rand_alpha(8) + local value = rand.random_alpha(8) local header = { ["Content-Type"] = string.format("%%{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-Check-Struts', '%s')}.multipart/form-data", value) diff --git a/scripts/rtsp-url-brute.nse b/scripts/rtsp-url-brute.nse index f2e7773be..7a96c9aa2 100644 --- a/scripts/rtsp-url-brute.nse +++ b/scripts/rtsp-url-brute.nse @@ -141,7 +141,7 @@ action = function(host, port) -- Try to see what a nonexistent URL looks like local status, response = fetch_url( host, port, ("rtsp://%s/%s"):format( - stdnse.get_hostname(host), rand.rand_alpha(14)) + stdnse.get_hostname(host), rand.random_alpha(14)) ) local status_404 = 404 if status then