1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 21:21:31 +00:00

Correct some wrong output sections (old-style)

This commit is contained in:
dmiller
2014-09-05 13:08:11 +00:00
parent b6e59efb4b
commit a41685fd33
4 changed files with 35 additions and 35 deletions

View File

@@ -54,13 +54,13 @@ database can specify their own criteria for accepting a page as valid.
-- PORT STATE SERVICE REASON
-- 80/tcp open http syn-ack
-- | http-enum:
-- | | /icons/: Icons and images
-- | | /images/: Icons and images
-- | | /robots.txt: Robots file
-- | | /sw/auth/login.aspx: Citrix WebTop
-- | | /images/outlook.jpg: Outlook Web Access
-- | | /nfservlets/servlet/SPSRouterServlet/: netForensics
-- |_ |_ /nfservlets/servlet/SPSRouterServlet/: netForensics
-- | /icons/: Icons and images
-- | /images/: Icons and images
-- | /robots.txt: Robots file
-- | /sw/auth/login.aspx: Citrix WebTop
-- | /images/outlook.jpg: Outlook Web Access
-- | /nfservlets/servlet/SPSRouterServlet/: netForensics
-- |_ /nfservlets/servlet/SPSRouterServlet/: netForensics
author = "Ron Bowes, Andrew Orr, Rob Nicholls"

View File

@@ -24,8 +24,8 @@ technique!
-- |_ http-malware-host: Host appears to be clean
-- 8080/tcp open http-proxy syn-ack
-- | http-malware-host:
-- | | Host appears to be infected (/ts/in.cgi?open2 redirects to http://last-another-life.ru:8080/index.php)
-- |_ |_ See: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
-- | Host appears to be infected (/ts/in.cgi?open2 redirects to http://last-another-life.ru:8080/index.php)
-- |_ See: http://blog.unmaskparasites.com/2009/09/11/dynamic-dns-and-botnet-of-zombie-web-servers/
--
author = "Ron Bowes"

View File

@@ -67,20 +67,20 @@ who contributed!
-- Clean machine (results printed only if extra verbosity ("-vv")is specified):
-- Host script results:
-- | p2p-conficker: Checking for Conficker.C or higher...
-- | | Check 1 (port 44329/tcp): CLEAN (Couldn't connect)
-- | | Check 2 (port 33824/tcp): CLEAN (Couldn't connect)
-- | | Check 3 (port 31380/udp): CLEAN (Failed to receive data)
-- | | Check 4 (port 52600/udp): CLEAN (Failed to receive data)
-- |_ |_ 0/4 checks: Host is CLEAN or ports are blocked
-- | Check 1 (port 44329/tcp): CLEAN (Couldn't connect)
-- | Check 2 (port 33824/tcp): CLEAN (Couldn't connect)
-- | Check 3 (port 31380/udp): CLEAN (Failed to receive data)
-- | Check 4 (port 52600/udp): CLEAN (Failed to receive data)
-- |_ 0/4 checks: Host is CLEAN or ports are blocked
--
-- Infected machine (results always printed):
-- Host script results:
-- | p2p-conficker: Checking for Conficker.C or higher...
-- | | Check 1 (port 18707/tcp): INFECTED (Received valid data)
-- | | Check 2 (port 65273/tcp): INFECTED (Received valid data)
-- | | Check 3 (port 11722/udp): INFECTED (Received valid data)
-- | | Check 4 (port 12690/udp): INFECTED (Received valid data)
-- |_ |_ 4/4 checks: Host is likely INFECTED
-- | Check 1 (port 18707/tcp): INFECTED (Received valid data)
-- | Check 2 (port 65273/tcp): INFECTED (Received valid data)
-- | Check 3 (port 11722/udp): INFECTED (Received valid data)
-- | Check 4 (port 12690/udp): INFECTED (Received valid data)
-- |_ 4/4 checks: Host is likely INFECTED
--
-----------------------------------------------------------------------
@@ -635,7 +635,7 @@ action = function(host)
table.insert(response, string.format("Check %d (port %d/%s): INFECTED (%s)", checks, port, "udp", reason))
count = count + 1
else
table.insert(response, string.format("| Check %d (port %d/%s): CLEAN (%s)", checks, port, "udp", reason))
table.insert(response, string.format("Check %d (port %d/%s): CLEAN (%s)", checks, port, "udp", reason))
end
end

View File

@@ -77,16 +77,16 @@ determined with a fairly efficient bruteforce. For example, if the actual passwo
--@output
-- Host script results:
-- | smb-brute:
-- | | bad name:test => Valid credentials
-- | | consoletest:test => Valid credentials, password must be changed at next logon
-- | | guest:<anything> => Valid credentials, account disabled
-- | | mixcase:BuTTeRfLY1 => Valid credentials
-- | | test:password1 => Valid credentials, account expired
-- | | this:password => Valid credentials, account cannot log in at current time
-- | | thisisaverylong:password => Valid credentials
-- | | thisisaverylongname:password => Valid credentials
-- | | thisisaverylongnamev:password => Valid credentials
-- |_ |_ web:TeSt => Valid credentials, account disabled
-- | bad name:test => Valid credentials
-- | consoletest:test => Valid credentials, password must be changed at next logon
-- | guest:<anything> => Valid credentials, account disabled
-- | mixcase:BuTTeRfLY1 => Valid credentials
-- | test:password1 => Valid credentials, account expired
-- | this:password => Valid credentials, account cannot log in at current time
-- | thisisaverylong:password => Valid credentials
-- | thisisaverylongname:password => Valid credentials
-- | thisisaverylongnamev:password => Valid credentials
-- |_ web:TeSt => Valid credentials, account disabled
--
-- @args smblockout This argument will force the script to continue if it
-- locks out an account or thinks it will lock out an account.