mirror of
https://github.com/nmap/nmap.git
synced 2025-12-24 08:29:04 +00:00
Commit a few NSE documenation changes I made while testing the new markup
parser; they work now.
This commit is contained in:
@@ -14,10 +14,10 @@ Both meta and HTTP redirects are supported.
|
||||
It is not advisable to run this against unknown hosts.
|
||||
\n\n
|
||||
NOTES\n
|
||||
* We may not have access to the servers true hostname.
|
||||
This means we cannot access virtually hosted sites and
|
||||
cannot follow absolute links when the hostname is
|
||||
different from the resolved ip address
|
||||
We may not have access to the servers true hostname.
|
||||
This means we cannot access virtually hosted sites and
|
||||
cannot follow absolute links when the hostname is
|
||||
different from the resolved ip address
|
||||
]]
|
||||
|
||||
require('url')
|
||||
|
||||
@@ -15,9 +15,9 @@ it is vulnerable to sniffing.
|
||||
\n\n
|
||||
Challenge/response passwords: If enabled, the server can accept any type of
|
||||
password:\n
|
||||
* Plaintext\n
|
||||
* LM and NTLM\n
|
||||
* LMv2 and NTLMv2\n
|
||||
* Plaintext
|
||||
* LM and NTLM
|
||||
* LMv2 and NTLMv2
|
||||
If it isn't set, the server can only accept plaintext passwords. Most servers
|
||||
are configured to use challenge/response these days. If a server is configured
|
||||
to accept plaintext passwords, it is vulnerable to sniffing.
|
||||
|
||||
@@ -80,7 +80,7 @@ the RIRs.
|
||||
--
|
||||
-- @output
|
||||
--
|
||||
-- Host script results:
|
||||
-- Host script results:
|
||||
-- \n| Whois: Record found at whois.arin.net
|
||||
-- \n| netrange: 64.13.134.0 - 64.13.134.63
|
||||
-- \n| netname: NET-64-13-143-0-26
|
||||
|
||||
Reference in New Issue
Block a user