1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-25 15:49:02 +00:00

Document the external script category in docs/scripting.xml.

This commit is contained in:
david
2008-09-09 17:01:12 +00:00
parent 711223b6fe
commit b491d82218

View File

@@ -208,8 +208,8 @@ Nmap finished: 1 IP address (1 host up) scanned in 0.907 seconds
Currently defined categories are <literal>safe</literal>,
<literal>intrusive</literal>, <literal>malware</literal>,
<literal>version</literal>, <literal>discovery</literal>,
<literal>vuln</literal>, <literal>auth</literal> and
<literal>default</literal>.
<literal>vuln</literal>, <literal>auth</literal>,
<literal>external</literal> and <literal>default</literal>.
Category names are not case
sensitive. The following list describes each category.</para>
@@ -313,6 +313,27 @@ Nmap finished: 1 IP address (1 host up) scanned in 0.907 seconds
</listitem>
</varlistentry>
<varlistentry>
<term>
<indexterm><primary sortas="external script category">&ldquo;<literal>external</literal>&rdquo; script category</primary></indexterm>
<option>external</option>
</term>
<listitem>
<para>Scripts in this category may send data to a
third-party database or other network resource. An example
of this is <filename>whois.nse</filename>, which makes a
connection to a
whois<indexterm><primary>whois</primary></indexterm> server
to learn about the address of the target. There is always
the possibility that the operators of the third-party
database will record anything you send to them, which in
many cases will include your IP address and the address of
the target. Most scripts involve traffic strictly between
the scanning computer and the client; any that do not are
placed in this category.</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<indexterm><primary sortas="default script category">&ldquo;<literal>default</literal>&rdquo; script category</primary></indexterm>