1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-02 04:49:02 +00:00

Update some SecLists URLs.

This commit is contained in:
david
2010-02-11 17:43:02 +00:00
parent ba5f5644cb
commit a3a7d79b5f
4 changed files with 4 additions and 4 deletions

View File

@@ -3224,7 +3224,7 @@ support the option completely, as does UDP scan.</para>
<para>If you wish to see the options in packets sent and
received, specify <option>--packet-trace</option>. For more
information and examples of using IP options with Nmap, see
<ulink url="http://seclists.org/nmap-dev/2006/q3/0052.html"/>.
<ulink url="http://seclists.org/nmap-dev/2006/q3/52"/>.
</para>
</listitem>

View File

@@ -388,7 +388,7 @@ ln -sf scan-$date.xml scan-prev.xml
in Perl and C++, but the summer ended shortly after it was decided
to rewrite the program in Python for the sake of Windows (and
Zenmap) compatibility. This Python version was written by David
Fifield. James Levine <ulink url="http://seclists.org/nmap-hackers/2000/0315.html">released</ulink> a Perl script named Ndiff with
Fifield. James Levine <ulink url="http://seclists.org/nmap-hackers/2000/315">released</ulink> a Perl script named Ndiff with
similar functionality in 2000.
</para>
</refsect1>

View File

@@ -7,7 +7,7 @@ This script is based on the Metasploit modules/auxiliary/scanner/http/wmap_dir_w
For more information on this vulnerability and script, see:
* http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html
* http://seclists.org/fulldisclosure/2009/May/att-0134/IIS_Advisory_pdf
* http://seclists.org/fulldisclosure/2009/May/att-134/IIS_Advisory_pdf.bin
* http://www.skullsecurity.org/blog/?p=271
* http://www.kb.cert.org/vuls/id/787932
* http://www.microsoft.com/technet/security/advisory/971492.mspx

View File

@@ -48,7 +48,7 @@ or higher to work. It is considered <code>unsafe</code>.
SMBv2 DoS -- performs a denial-of-service against the vulnerability disclosed in
CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista
and some versions of Windows 7, and causes a bluescreen if successful. The proof-
of-concept code at <http://seclists.org/fulldisclosure/2009/Sep/0039.html> was used,
of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used,
with one small change.
(Note: if you have other SMB/MSRPC vulnerability checks you'd like to see added, and