mirror of
https://github.com/nmap/nmap.git
synced 2026-01-02 04:49:02 +00:00
Update some SecLists URLs.
This commit is contained in:
@@ -3224,7 +3224,7 @@ support the option completely, as does UDP scan.</para>
|
||||
<para>If you wish to see the options in packets sent and
|
||||
received, specify <option>--packet-trace</option>. For more
|
||||
information and examples of using IP options with Nmap, see
|
||||
<ulink url="http://seclists.org/nmap-dev/2006/q3/0052.html"/>.
|
||||
<ulink url="http://seclists.org/nmap-dev/2006/q3/52"/>.
|
||||
</para>
|
||||
|
||||
</listitem>
|
||||
|
||||
@@ -388,7 +388,7 @@ ln -sf scan-$date.xml scan-prev.xml
|
||||
in Perl and C++, but the summer ended shortly after it was decided
|
||||
to rewrite the program in Python for the sake of Windows (and
|
||||
Zenmap) compatibility. This Python version was written by David
|
||||
Fifield. James Levine <ulink url="http://seclists.org/nmap-hackers/2000/0315.html">released</ulink> a Perl script named Ndiff with
|
||||
Fifield. James Levine <ulink url="http://seclists.org/nmap-hackers/2000/315">released</ulink> a Perl script named Ndiff with
|
||||
similar functionality in 2000.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
@@ -7,7 +7,7 @@ This script is based on the Metasploit modules/auxiliary/scanner/http/wmap_dir_w
|
||||
|
||||
For more information on this vulnerability and script, see:
|
||||
* http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html
|
||||
* http://seclists.org/fulldisclosure/2009/May/att-0134/IIS_Advisory_pdf
|
||||
* http://seclists.org/fulldisclosure/2009/May/att-134/IIS_Advisory_pdf.bin
|
||||
* http://www.skullsecurity.org/blog/?p=271
|
||||
* http://www.kb.cert.org/vuls/id/787932
|
||||
* http://www.microsoft.com/technet/security/advisory/971492.mspx
|
||||
|
||||
@@ -48,7 +48,7 @@ or higher to work. It is considered <code>unsafe</code>.
|
||||
SMBv2 DoS -- performs a denial-of-service against the vulnerability disclosed in
|
||||
CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista
|
||||
and some versions of Windows 7, and causes a bluescreen if successful. The proof-
|
||||
of-concept code at <http://seclists.org/fulldisclosure/2009/Sep/0039.html> was used,
|
||||
of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used,
|
||||
with one small change.
|
||||
|
||||
(Note: if you have other SMB/MSRPC vulnerability checks you'd like to see added, and
|
||||
|
||||
Reference in New Issue
Block a user