mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Fix some more typos and spelling errors
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Retrievs printer or scanner information from a remote device supporting the
|
||||
Retrieves printer or scanner information from a remote device supporting the
|
||||
BJNP protocol. The protocol is known to be supported by network based Canon
|
||||
devices.
|
||||
]]
|
||||
@@ -47,4 +47,4 @@ action = function(host, port)
|
||||
end
|
||||
helper:close()
|
||||
return stdnse.format_output(true, attrs)
|
||||
end
|
||||
end
|
||||
|
||||
@@ -9,7 +9,7 @@ local math = require "math"
|
||||
local string = require "string"
|
||||
|
||||
description = [[
|
||||
Discovers routers that are running PIM (Protocol Independant Multicast).
|
||||
Discovers routers that are running PIM (Protocol Independent Multicast).
|
||||
|
||||
This works by sending a PIM Hello message to the PIM multicast address
|
||||
224.0.0.13 and listening for Hello messages from other routers.
|
||||
|
||||
@@ -3,7 +3,7 @@ local stdnse = require "stdnse"
|
||||
local tab = require "tab"
|
||||
|
||||
description = [[
|
||||
Sends a message to a iOS device throught the Apple MobileMe web service. The
|
||||
Sends a message to a iOS device through the Apple MobileMe web service. The
|
||||
device has to be registered with an Apple ID using the Find My Iphone
|
||||
application.
|
||||
]]
|
||||
|
||||
@@ -8,7 +8,7 @@ local http = require "http"
|
||||
local comm = require "comm"
|
||||
|
||||
description = [[
|
||||
Tests a web server for vulnerability to the Slowloris DoS attack by launching a Slowlaris attack.
|
||||
Tests a web server for vulnerability to the Slowloris DoS attack by launching a Slowloris attack.
|
||||
|
||||
Slowloris was described at Defcon 17 by RSnake
|
||||
(see http://ha.ckers.org/slowloris/).
|
||||
|
||||
@@ -7,9 +7,9 @@ local tab = require "tab"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Checks whether a file has been determined as malware by virustotal. Virustotal
|
||||
Checks whether a file has been determined as malware by Virustotal. Virustotal
|
||||
is a service that provides the capability to scan a file or check a checksum
|
||||
against a number of the major AntiVirus vendors. The script uses the public
|
||||
against a number of the major antivirus vendors. The script uses the public
|
||||
API which requires a valid API key and has a limit on 4 queries per minute.
|
||||
A key can be acquired by registering as a user on the virustotal web page:
|
||||
* http://www.virustotal.com
|
||||
|
||||
@@ -5,8 +5,8 @@ local math = require "math"
|
||||
local string = require "string"
|
||||
local os = require "os"
|
||||
|
||||
description = [[ Generates a flood of Router Adverisments (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS),
|
||||
will start to compute IPv6 suffix and update their routing table to reflect the accepted annoucement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.
|
||||
description = [[ Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS),
|
||||
will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.
|
||||
|
||||
Vulnerable platforms:
|
||||
* All Cisco IOS ASA with firmware < November 2010
|
||||
|
||||
@@ -12,7 +12,7 @@ local unpwdb = require "unpwdb"
|
||||
local openssl = stdnse.silent_require "openssl"
|
||||
|
||||
description = [[
|
||||
Exploits the CVE-2012-3137 vulnerability, a weaknes in Oracle's
|
||||
Exploits the CVE-2012-3137 vulnerability, a weakness in Oracle's
|
||||
O5LOGIN authentication scheme. The vulnerability exists in Oracle 11g
|
||||
R1/R2 and allows linking the session key to a password hash. When
|
||||
initiating an authentication attempt as a valid user the server will
|
||||
|
||||
Reference in New Issue
Block a user