mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 21:21:31 +00:00
Correct some wrong output sections (old-style)
This commit is contained in:
@@ -54,13 +54,13 @@ database can specify their own criteria for accepting a page as valid.
|
||||
-- PORT STATE SERVICE REASON
|
||||
-- 80/tcp open http syn-ack
|
||||
-- | http-enum:
|
||||
-- | | /icons/: Icons and images
|
||||
-- | | /images/: Icons and images
|
||||
-- | | /robots.txt: Robots file
|
||||
-- | | /sw/auth/login.aspx: Citrix WebTop
|
||||
-- | | /images/outlook.jpg: Outlook Web Access
|
||||
-- | | /nfservlets/servlet/SPSRouterServlet/: netForensics
|
||||
-- |_ |_ /nfservlets/servlet/SPSRouterServlet/: netForensics
|
||||
-- | /icons/: Icons and images
|
||||
-- | /images/: Icons and images
|
||||
-- | /robots.txt: Robots file
|
||||
-- | /sw/auth/login.aspx: Citrix WebTop
|
||||
-- | /images/outlook.jpg: Outlook Web Access
|
||||
-- | /nfservlets/servlet/SPSRouterServlet/: netForensics
|
||||
-- |_ /nfservlets/servlet/SPSRouterServlet/: netForensics
|
||||
|
||||
author = "Ron Bowes, Andrew Orr, Rob Nicholls"
|
||||
|
||||
|
||||
@@ -24,8 +24,8 @@ technique!
|
||||
-- |_ http-malware-host: Host appears to be clean
|
||||
-- 8080/tcp open http-proxy syn-ack
|
||||
-- | http-malware-host:
|
||||
-- | | Host appears to be infected (/ts/in.cgi?open2 redirects to http://last-another-life.ru:8080/index.php)
|
||||
-- |_ |_ See: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
|
||||
-- | Host appears to be infected (/ts/in.cgi?open2 redirects to http://last-another-life.ru:8080/index.php)
|
||||
-- |_ See: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
|
||||
--
|
||||
|
||||
author = "Ron Bowes"
|
||||
|
||||
@@ -67,20 +67,20 @@ who contributed!
|
||||
-- Clean machine (results printed only if extra verbosity ("-vv")is specified):
|
||||
-- Host script results:
|
||||
-- | p2p-conficker: Checking for Conficker.C or higher...
|
||||
-- | | Check 1 (port 44329/tcp): CLEAN (Couldn't connect)
|
||||
-- | | Check 2 (port 33824/tcp): CLEAN (Couldn't connect)
|
||||
-- | | Check 3 (port 31380/udp): CLEAN (Failed to receive data)
|
||||
-- | | Check 4 (port 52600/udp): CLEAN (Failed to receive data)
|
||||
-- |_ |_ 0/4 checks: Host is CLEAN or ports are blocked
|
||||
-- | Check 1 (port 44329/tcp): CLEAN (Couldn't connect)
|
||||
-- | Check 2 (port 33824/tcp): CLEAN (Couldn't connect)
|
||||
-- | Check 3 (port 31380/udp): CLEAN (Failed to receive data)
|
||||
-- | Check 4 (port 52600/udp): CLEAN (Failed to receive data)
|
||||
-- |_ 0/4 checks: Host is CLEAN or ports are blocked
|
||||
--
|
||||
-- Infected machine (results always printed):
|
||||
-- Host script results:
|
||||
-- | p2p-conficker: Checking for Conficker.C or higher...
|
||||
-- | | Check 1 (port 18707/tcp): INFECTED (Received valid data)
|
||||
-- | | Check 2 (port 65273/tcp): INFECTED (Received valid data)
|
||||
-- | | Check 3 (port 11722/udp): INFECTED (Received valid data)
|
||||
-- | | Check 4 (port 12690/udp): INFECTED (Received valid data)
|
||||
-- |_ |_ 4/4 checks: Host is likely INFECTED
|
||||
-- | Check 1 (port 18707/tcp): INFECTED (Received valid data)
|
||||
-- | Check 2 (port 65273/tcp): INFECTED (Received valid data)
|
||||
-- | Check 3 (port 11722/udp): INFECTED (Received valid data)
|
||||
-- | Check 4 (port 12690/udp): INFECTED (Received valid data)
|
||||
-- |_ 4/4 checks: Host is likely INFECTED
|
||||
--
|
||||
-----------------------------------------------------------------------
|
||||
|
||||
@@ -635,7 +635,7 @@ action = function(host)
|
||||
table.insert(response, string.format("Check %d (port %d/%s): INFECTED (%s)", checks, port, "udp", reason))
|
||||
count = count + 1
|
||||
else
|
||||
table.insert(response, string.format("| Check %d (port %d/%s): CLEAN (%s)", checks, port, "udp", reason))
|
||||
table.insert(response, string.format("Check %d (port %d/%s): CLEAN (%s)", checks, port, "udp", reason))
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
@@ -77,16 +77,16 @@ determined with a fairly efficient bruteforce. For example, if the actual passwo
|
||||
--@output
|
||||
-- Host script results:
|
||||
-- | smb-brute:
|
||||
-- | | bad name:test => Valid credentials
|
||||
-- | | consoletest:test => Valid credentials, password must be changed at next logon
|
||||
-- | | guest:<anything> => Valid credentials, account disabled
|
||||
-- | | mixcase:BuTTeRfLY1 => Valid credentials
|
||||
-- | | test:password1 => Valid credentials, account expired
|
||||
-- | | this:password => Valid credentials, account cannot log in at current time
|
||||
-- | | thisisaverylong:password => Valid credentials
|
||||
-- | | thisisaverylongname:password => Valid credentials
|
||||
-- | | thisisaverylongnamev:password => Valid credentials
|
||||
-- |_ |_ web:TeSt => Valid credentials, account disabled
|
||||
-- | bad name:test => Valid credentials
|
||||
-- | consoletest:test => Valid credentials, password must be changed at next logon
|
||||
-- | guest:<anything> => Valid credentials, account disabled
|
||||
-- | mixcase:BuTTeRfLY1 => Valid credentials
|
||||
-- | test:password1 => Valid credentials, account expired
|
||||
-- | this:password => Valid credentials, account cannot log in at current time
|
||||
-- | thisisaverylong:password => Valid credentials
|
||||
-- | thisisaverylongname:password => Valid credentials
|
||||
-- | thisisaverylongnamev:password => Valid credentials
|
||||
-- |_ web:TeSt => Valid credentials, account disabled
|
||||
--
|
||||
-- @args smblockout This argument will force the script to continue if it
|
||||
-- locks out an account or thinks it will lock out an account.
|
||||
|
||||
Reference in New Issue
Block a user