diff --git a/scripts/broadcast-ripng-discover.nse b/scripts/broadcast-ripng-discover.nse index d641b3569..d149723ac 100644 --- a/scripts/broadcast-ripng-discover.nse +++ b/scripts/broadcast-ripng-discover.nse @@ -209,7 +209,7 @@ action = function() local result = {} for ip, resp in pairs(responses) do - print(ip, resp) + stdnse.print_debug(ip, resp) table.insert(result, { name = ip, parse_response(resp) } ) end return stdnse.format_output(true, result) diff --git a/scripts/citrix-brute-xml.nse b/scripts/citrix-brute-xml.nse index 524b6e75a..2b9bf9112 100644 --- a/scripts/citrix-brute-xml.nse +++ b/scripts/citrix-brute-xml.nse @@ -78,7 +78,7 @@ function verify_password( host, port, username, password, domain ) account.valid = false account.message = "Unspecified" else - print("UNKNOWN response: " .. response) + stdnse.print_debug("UNKNOWN response: " .. response) account.valid = false account.message = "failed" end diff --git a/scripts/dns-brute.nse b/scripts/dns-brute.nse index 1a472e827..c622e5fe6 100644 --- a/scripts/dns-brute.nse +++ b/scripts/dns-brute.nse @@ -248,7 +248,7 @@ action = function(host) end file:close() else - print("dns-brute: Hostlist file not found. Will use default list.") + stdnse.print_debug("dns-brute: Hostlist file not found. Will use default list.") end end if (not hostlist) then hostlist = HOST_LIST end diff --git a/scripts/mmouse-exec.nse b/scripts/mmouse-exec.nse index d6927e9f8..4fde1dbaa 100644 --- a/scripts/mmouse-exec.nse +++ b/scripts/mmouse-exec.nse @@ -96,7 +96,7 @@ end local function processSwitchMode(socket, swmode) local m, o, a1, a2, p = swmode:match("^(.-)\30(.-)\30(.-)\30(.-)\30(.-)\04$") if ( m ~= "SWITCHMODE") then - print("lklklk", m, o) + stdnse.print_debug("Unknown SWITCHMODE: %s %s", m, o) return false, "Failed to parse SWITCHMODE" end diff --git a/scripts/samba-vuln-cve-2012-1182.nse b/scripts/samba-vuln-cve-2012-1182.nse index 841eb1068..3c21d2502 100644 --- a/scripts/samba-vuln-cve-2012-1182.nse +++ b/scripts/samba-vuln-cve-2012-1182.nse @@ -3,6 +3,7 @@ local msrpc = require "msrpc" local smb = require "smb" local string = require "string" local vulns = require "vulns" +local stdnse = require "stdnse" description = [[ Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182. @@ -118,7 +119,7 @@ from an anonymous connection. local marshaledHandle = string.rep("X",20) status, result = msrpc.samr_getaliasmembership(smbstate,marshaledHandle, data) - print(status, result) + stdnse.print_debug(2, "msrpc.samr_getaliasmembership: %s, '%s'", status, result) if(status == false and string.find(result,"Failed to receive bytes after 5 attempts") ~= nil) then samba_cve.state = vulns.STATE.VULN -- connection droped, server crashed end diff --git a/scripts/sip-brute.nse b/scripts/sip-brute.nse index b70937803..caa62d961 100644 --- a/scripts/sip-brute.nse +++ b/scripts/sip-brute.nse @@ -81,7 +81,7 @@ local function checkBadUser(host, port) local pass = "badpass-" .. math.random(10000) local helper = sip.Helper:new(host, port, { expires = 0 }) - print(user, pass) + stdnse.print_debug(2, "Checking bad user: %s/%s", user, pass) local status, err = helper:connect() if ( not(status) ) then return false, "ERROR: Failed to connect" end