diff --git a/scripts/db2-das-info.nse b/scripts/db2-das-info.nse index bb448c19f..dc164d791 100644 --- a/scripts/db2-das-info.nse +++ b/scripts/db2-das-info.nse @@ -130,7 +130,7 @@ function parse_db2_packet(packet) local response = {} if packet.header.data_len < info_length_offset then - stdnse.print_debug( "db2-das-info: packet too short to be DB2 response...") + stdnse.debug1("packet too short to be DB2 response...") return end @@ -172,7 +172,7 @@ function read_db2_packet(socket) local ENDIANESS_OFFSET = 23 local catch = function() - stdnse.print_debug("%s", "db2-das-info: ERROR communicating with DB2 server") + stdnse.debug1("ERROR communicating with DB2 server") socket:close() end @@ -235,7 +235,7 @@ end function send_db2_packet( socket, packet ) local catch = function() - stdnse.print_debug("%s", "db2-das-info: ERROR communicating with DB2 server") + stdnse.debug1("ERROR communicating with DB2 server") socket:close() end @@ -290,7 +290,7 @@ action = function(host, port) -- do some exception handling / cleanup local catch = function() - stdnse.print_debug("%s", "db2-das-info: ERROR communicating with " .. host.ip .. " on port " .. port.number) + stdnse.debug1("ERROR communicating with " .. host.ip .. " on port " .. port.number) socket:close() end diff --git a/scripts/flume-master-info.nse b/scripts/flume-master-info.nse index a9672e2db..c6493a264 100644 --- a/scripts/flume-master-info.nse +++ b/scripts/flume-master-info.nse @@ -201,8 +201,7 @@ action = function( host, port ) end for logical,physical,hostname in string.gmatch(body, "([%w%.-_:]+)([%w%.]+)([%w%.]+)") do - stdnse.print_debug(2, "%s: %s (%s) %s", - SCRIPT_NAME, physical, logical, hostname) + stdnse.debug2("%s (%s) %s", physical, logical, hostname) if (table_count(nodes, hostname) == 0) then nodes[#nodes+1] = hostname add_target(hostname) diff --git a/scripts/http-headers.nse b/scripts/http-headers.nse index c3926cf38..cec781fbf 100644 --- a/scripts/http-headers.nse +++ b/scripts/http-headers.nse @@ -48,7 +48,7 @@ action = function(host, port) -- If head failed, try using GET if(status == false) then - stdnse.print_debug(1, "http-headers.nse: HEAD request failed, falling back to GET") + stdnse.debug1("HEAD request failed, falling back to GET") result = http.get(host, port, path) request_type = "GET" end diff --git a/scripts/http-methods.nse b/scripts/http-methods.nse index cb8695188..1ed1c8481 100644 --- a/scripts/http-methods.nse +++ b/scripts/http-methods.nse @@ -77,7 +77,7 @@ action = function(host, port) end -- Cache in case retest is requested. options_status_line = response["status-line"] - stdnse.print_debug("http-methods.nse: HTTP Status for OPTIONS is " .. response.status) + stdnse.debug1("HTTP Status for OPTIONS is " .. response.status) if not (response.header["allow"] or response.header["public"]) then return string.format("No Allow or Public header in OPTIONS response (status code %d)", response.status) diff --git a/scripts/http-unsafe-output-escaping.nse b/scripts/http-unsafe-output-escaping.nse index 9b86501c4..c974d4f44 100644 --- a/scripts/http-unsafe-output-escaping.nse +++ b/scripts/http-unsafe-output-escaping.nse @@ -46,9 +46,7 @@ categories = {"discovery", "intrusive"} portrule = shortport.http -local function dbg(str,...) - stdnse.print_debug(2,"%s:"..str, SCRIPT_NAME, ...) -end +local dbg = stdnse.debug2 local function getHostPort(parsed) local host, port = parsed.host, parsed.port diff --git a/scripts/http-userdir-enum.nse b/scripts/http-userdir-enum.nse index 82cc216b7..4ee879411 100644 --- a/scripts/http-userdir-enum.nse +++ b/scripts/http-userdir-enum.nse @@ -80,7 +80,7 @@ action = function(host, port) local i for i = 1, #usernames, 1 do if(nmap.registry.args.limit and i > tonumber(nmap.registry.args.limit)) then - stdnse.print_debug(1, "http-userdir-enum.nse: Reached the limit (%d), stopping", nmap.registry.args.limit) + stdnse.debug1("Reached the limit (%d), stopping", nmap.registry.args.limit) break; end @@ -95,7 +95,7 @@ action = function(host, port) -- Check for http.pipeline error if(results == nil) then - stdnse.print_debug(1, "http-userdir-enum.nse: http.pipeline returned nil") + stdnse.debug1("http.pipeline returned nil") if(nmap.debugging() > 0) then return "ERROR: http.pipeline returned nil" else @@ -106,7 +106,7 @@ action = function(host, port) local found = {} for i, data in pairs(results) do if(http.page_exists(data, result_404, known_404, "/~" .. usernames[i], true)) then - stdnse.print_debug(1, "http-userdir-enum.nse: Found a valid user: %s", usernames[i]) + stdnse.debug1("Found a valid user: %s", usernames[i]) table.insert(found, usernames[i]) end end @@ -136,8 +136,7 @@ function init() stdnse.get_script_args('userdir.users') local read, usernames = datafiles.parse_file(customlist or "nselib/data/usernames.lst", {}) if not read then - stdnse.debug1("%s", - usernames or "Unknown Error reading usernames list.") + stdnse.debug1("%s", usernames or "Unknown Error reading usernames list.") nmap.registry.userdir = {} return nil end diff --git a/scripts/http-vuln-cve2011-3192.nse b/scripts/http-vuln-cve2011-3192.nse index 44cdb11fa..c8675d8b0 100644 --- a/scripts/http-vuln-cve2011-3192.nse +++ b/scripts/http-vuln-cve2011-3192.nse @@ -79,7 +79,7 @@ overlapping byte ranges are requested.]], if not path then path = '/' - stdnse.print_debug(1, "Setting the request path to '/' since 'http-vuln-cve2011-3192.path' argument is missing.") + stdnse.debug1("Setting the request path to '/' since 'http-vuln-cve2011-3192.path' argument is missing.") end -- This first request will try to get a code 206 reply from the server by @@ -100,8 +100,7 @@ overlapping byte ranges are requested.]], local response = http.head(host, port, path, request_opts) if not response.status then - stdnse.print_debug(1, "%s: Functionality check HEAD request failed for %s (with path '%s').", - SCRIPT_NAME, hostname or host.ip, path) + stdnse.debug1("Functionality check HEAD request failed for %s (with path '%s').", hostname or host.ip, path) elseif response.status == 206 then -- The server handle range requests. Now try to request 11 ranges (one more -- than allowed). @@ -117,12 +116,10 @@ overlapping byte ranges are requested.]], elseif response.status == 206 then vuln.state = vulns.STATE.VULN else - stdnse.print_debug(1, "%s: Server isn't vulnerable (%i status code)", - SCRIPT_NAME, response.status) + stdnse.debug1("Server isn't vulnerable (%i status code)", response.status) end else - stdnse.print_debug(1, "%s: Server ignores the range header (%i status code)", - SCRIPT_NAME, response.status) + stdnse.debug1("Server ignores the range header (%i status code)", response.status) end return vuln_report:make_output(vuln) end diff --git a/scripts/http-vuln-wnr1000-creds.nse b/scripts/http-vuln-wnr1000-creds.nse index fe51a4de3..44c679972 100644 --- a/scripts/http-vuln-wnr1000-creds.nse +++ b/scripts/http-vuln-wnr1000-creds.nse @@ -80,12 +80,12 @@ action = function(host, port) local netgear_username = string.match(escape(payload_session.body), 'Router Admin Username.+align="left">(.+).+Router Admin') local netgear_password = string.match(escape(payload_session.body), 'Router Admin Password.+align="left">(.+).+MNUText') if (username ~= nil and password ~= nil) then - stdnse.print_debug(1, "%s: username : " .. escape(netgear_username), SCRIPT_NAME) - stdnse.print_debug(1, "%s: password : " .. escape(netgear_password), SCRIPT_NAME) + stdnse.debug1("username : %s", escape(netgear_username)) + stdnse.debug1("password : %s", escape(netgear_password)) else stdnse.debug1("We haven't been able to get username/password") end end end end -end \ No newline at end of file +end diff --git a/scripts/http-wordpress-plugins.nse b/scripts/http-wordpress-plugins.nse index 7cac0ee2c..2cf4fc583 100644 --- a/scripts/http-wordpress-plugins.nse +++ b/scripts/http-wordpress-plugins.nse @@ -153,7 +153,7 @@ action = function(host, port) for i, data in pairs(pipeline_returns) do -- if it's not a four-'o-four, it probably means that the plugin is present if http.page_exists(data, result_404, body_404, bfqueries[i][1], true) then - stdnse.print_debug(1, "http-wordpress-plugins.nse: Found a plugin: %s", bfqueries[i][2]) + stdnse.debug1("Found a plugin: %s", bfqueries[i][2]) table.insert(result, bfqueries[i][2]) end end diff --git a/scripts/telnet-brute.nse b/scripts/telnet-brute.nse index 654e1b1b9..ba6d1c73c 100644 --- a/scripts/telnet-brute.nse +++ b/scripts/telnet-brute.nse @@ -71,9 +71,7 @@ local detail_debug = 3 -- debug level for printing individual login steps -- @param level Verbosity level (mandatory, unlike stdnse.print_debug). -- @param fmt Format string. -- @param ... Arguments to format. -local print_debug = function (level, fmt, ...) - stdnse.print_debug(level, "%s: " .. fmt, SCRIPT_NAME, ...) -end +local debug = stdnse.debug local patt_login = U.atwordboundary(re.compile [[([uU][sS][eE][rR][nN][aA][mM][eE] / [lL][oO][gG][iI][nN]) %s* ':' %s* !.]]) @@ -478,7 +476,7 @@ Driver.methods.connect_autosize = function (self) end -- let's park the thread here till all the functioning threads finish self.target:inuse(false) - print_debug(detail_debug, "Retiring %s", tostring(coroutine.running())) + debug(detail_debug, "Retiring %s", tostring(coroutine.running())) while not self.target:idle() do self.thread_exit("wait") end -- pretend that it connected self.conn = Connection.GHOST @@ -538,7 +536,7 @@ Driver.methods.login = function (self, username, password) local loc = " in " .. tostring(coroutine.running()) local connection_error = function (msg) - print_debug(detail_debug, msg .. loc) + debug(detail_debug, msg .. loc) local err = brute.Error:new(msg) err:setRetry(true) return false, err @@ -546,7 +544,7 @@ Driver.methods.login = function (self, username, password) local passonly_error = function () local msg = "Password prompt encountered" - print_debug(critical_debug, msg .. loc) + debug(critical_debug, msg .. loc) local err = brute.Error:new(msg) err:setAbort(true) return false, err @@ -554,7 +552,7 @@ Driver.methods.login = function (self, username, password) local username_error = function () local msg = "Invalid username encountered" - print_debug(detail_debug, msg .. loc) + debug(detail_debug, msg .. loc) local err = brute.Error:new(msg) err:setInvalidAccount(username) return false, err @@ -562,23 +560,23 @@ Driver.methods.login = function (self, username, password) local login_error = function () local msg = "Login failed" - print_debug(detail_debug, msg .. loc) + debug(detail_debug, msg .. loc) return false, brute.Error:new(msg) end local login_success = function () local msg = "Login succeeded" - print_debug(detail_debug, msg .. loc) + debug(detail_debug, msg .. loc) return true, brute.Account:new(username, password, "OPEN") end local login_no_password = function () local msg = "Login succeeded without password" - print_debug(detail_debug, msg .. loc) + debug(detail_debug, msg .. loc) return true, brute.Account:new(username, "", "OPEN") end - print_debug(detail_debug, "Login attempt %s:%s%s", username, password, loc) + debug(detail_debug, "Login attempt %s:%s%s", username, password, loc) if conn == Connection.GHOST then -- reached when auto-sizing is enabled and all worker threads @@ -597,7 +595,7 @@ Driver.methods.login = function (self, username, password) if is_username_prompt(line) then -- being prompted for a username conn:discard_line() - print_debug(detail_debug, "Sending username" .. loc) + debug(detail_debug, "Sending username" .. loc) if not conn:send_line(username) then return connection_error(conn.error) end @@ -633,7 +631,7 @@ Driver.methods.login = function (self, username, password) elseif is_password_prompt(line) then -- being prompted for a password conn:discard_line() - print_debug(detail_debug, "Sending password" .. loc) + debug(detail_debug, "Sending password" .. loc) if not conn:send_line(password) then return connection_error(conn.error) end