1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Fix some more typos and spelling errors

This commit is contained in:
fyodor
2012-11-16 09:13:53 +00:00
parent 46e8ade6da
commit c58b302ee1
7 changed files with 10 additions and 10 deletions

View File

@@ -1,5 +1,5 @@
description = [[
Retrievs printer or scanner information from a remote device supporting the
Retrieves printer or scanner information from a remote device supporting the
BJNP protocol. The protocol is known to be supported by network based Canon
devices.
]]

View File

@@ -9,7 +9,7 @@ local math = require "math"
local string = require "string"
description = [[
Discovers routers that are running PIM (Protocol Independant Multicast).
Discovers routers that are running PIM (Protocol Independent Multicast).
This works by sending a PIM Hello message to the PIM multicast address
224.0.0.13 and listening for Hello messages from other routers.

View File

@@ -3,7 +3,7 @@ local stdnse = require "stdnse"
local tab = require "tab"
description = [[
Sends a message to a iOS device throught the Apple MobileMe web service. The
Sends a message to a iOS device through the Apple MobileMe web service. The
device has to be registered with an Apple ID using the Find My Iphone
application.
]]

View File

@@ -8,7 +8,7 @@ local http = require "http"
local comm = require "comm"
description = [[
Tests a web server for vulnerability to the Slowloris DoS attack by launching a Slowlaris attack.
Tests a web server for vulnerability to the Slowloris DoS attack by launching a Slowloris attack.
Slowloris was described at Defcon 17 by RSnake
(see http://ha.ckers.org/slowloris/).

View File

@@ -7,9 +7,9 @@ local tab = require "tab"
local table = require "table"
description = [[
Checks whether a file has been determined as malware by virustotal. Virustotal
Checks whether a file has been determined as malware by Virustotal. Virustotal
is a service that provides the capability to scan a file or check a checksum
against a number of the major AntiVirus vendors. The script uses the public
against a number of the major antivirus vendors. The script uses the public
API which requires a valid API key and has a limit on 4 queries per minute.
A key can be acquired by registering as a user on the virustotal web page:
* http://www.virustotal.com

View File

@@ -5,8 +5,8 @@ local math = require "math"
local string = require "string"
local os = require "os"
description = [[ Generates a flood of Router Adverisments (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS),
will start to compute IPv6 suffix and update their routing table to reflect the accepted annoucement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.
description = [[ Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS),
will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.
Vulnerable platforms:
* All Cisco IOS ASA with firmware < November 2010

View File

@@ -12,7 +12,7 @@ local unpwdb = require "unpwdb"
local openssl = stdnse.silent_require "openssl"
description = [[
Exploits the CVE-2012-3137 vulnerability, a weaknes in Oracle's
Exploits the CVE-2012-3137 vulnerability, a weakness in Oracle's
O5LOGIN authentication scheme. The vulnerability exists in Oracle 11g
R1/R2 and allows linking the session key to a password hash. When
initiating an authentication attempt as a valid user the server will