1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Removes unused dependencies from all files in scripts folder.

This commit is contained in:
rewanth
2017-08-15 07:26:00 +00:00
parent c2a9a5bbe3
commit d9504537e6
42 changed files with 27 additions and 85 deletions

View File

@@ -1,5 +1,4 @@
local coroutine = require "coroutine" local coroutine = require "coroutine"
local datetime = require "datetime"
local formulas = require "formulas" local formulas = require "formulas"
local math = require "math" local math = require "math"
local nmap = require "nmap" local nmap = require "nmap"

View File

@@ -1,4 +1,3 @@
local bin = require "bin"
local ipOps = require "ipOps" local ipOps = require "ipOps"
local math = require "math" local math = require "math"
local nmap = require "nmap" local nmap = require "nmap"
@@ -1061,4 +1060,3 @@ action = function(host)
return report(scanner) return report(scanner)
end end

View File

@@ -5,7 +5,6 @@ local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string" local string = require "string"
local table = require "table" local table = require "table"
local sslcert = require "sslcert"
description = [[ description = [[
Checks if an FTP server allows anonymous logins. Checks if an FTP server allows anonymous logins.

View File

@@ -1,8 +1,6 @@
local ftp = require "ftp" local ftp = require "ftp"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table"
description = [[ description = [[
Sends FTP SYST and STAT commands and returns the result. Sends FTP SYST and STAT commands and returns the result.

View File

@@ -3,7 +3,6 @@ local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local slaxml = require "slaxml" local slaxml = require "slaxml"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
description = [[ description = [[
@@ -244,4 +243,3 @@ action = function( host, port )
if #state.result then return state.result end if #state.result then return state.result end
end end

View File

@@ -1,9 +1,7 @@
local http = require "http" local http = require "http"
local ipOps = require "ipOps" local ipOps = require "ipOps"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local slaxml = require "slaxml" local slaxml = require "slaxml"
local table = require "table"
description = [[ description = [[
Discovers hostnames that resolve to the target's IP address by querying the online Robtex service at http://ip.robtex.com/. Discovers hostnames that resolve to the target's IP address by querying the online Robtex service at http://ip.robtex.com/.

View File

@@ -4,7 +4,6 @@ local http = require "http"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
description = [[ description = [[

View File

@@ -4,7 +4,6 @@ local io = require "io"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
description = [[ description = [[

View File

@@ -1,4 +1,3 @@
local http = require "http"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"

View File

@@ -1,4 +1,3 @@
local bin = require "bin"
local os = require "os" local os = require "os"
local datetime = require "datetime" local datetime = require "datetime"
local http = require "http" local http = require "http"

View File

@@ -3,7 +3,6 @@ local shortport = require "shortport"
local slaxml = require "slaxml" local slaxml = require "slaxml"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local tab = require "tab" local tab = require "tab"
local table = require "table"
description = [[Enumerates users of a Subversion repository by examining logs of most recent commits. description = [[Enumerates users of a Subversion repository by examining logs of most recent commits.
]] ]]
@@ -131,4 +130,3 @@ action = function(host, port)
end end
end end
end end

View File

@@ -2,7 +2,6 @@ local http = require "http"
local shortport = require "shortport" local shortport = require "shortport"
local slaxml = require "slaxml" local slaxml = require "slaxml"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
description = [[Requests information from a Subversion repository. description = [[Requests information from a Subversion repository.
]] ]]

View File

@@ -37,7 +37,6 @@ categories = {"exploit","vuln"}
local http = require "http" local http = require "http"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local string = require "string"
local vulns = require "vulns" local vulns = require "vulns"
local stdnse = require "stdnse" local stdnse = require "stdnse"

View File

@@ -6,7 +6,6 @@ local string = require "string"
local table = require "table" local table = require "table"
local url = require "url" local url = require "url"
local vulns = require "vulns" local vulns = require "vulns"
local re = require "re"
local openssl = require "openssl" local openssl = require "openssl"
description = [[ description = [[

View File

@@ -4,7 +4,6 @@ local stdnse = require "stdnse"
local string = require "string" local string = require "string"
local vulns = require "vulns" local vulns = require "vulns"
local json = require "json" local json = require "json"
local base64 = require "base64"
local nmap = require "nmap" local nmap = require "nmap"
description = [[ description = [[
@@ -208,4 +207,3 @@ action = function(host, port)
cleanup() cleanup()
return report:make_output(vuln_table) return report:make_output(vuln_table)
end end

View File

@@ -1,23 +1,21 @@
local http = require "http" local http = require "http"
local shortport = require "shortport" local shortport = require "shortport"
local string = require "string"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local url = require "url"
local vulns = require "vulns" local vulns = require "vulns"
local json = require "json" local json = require "json"
description = [[ description = [[
Attempts to detect a privilege escalation vulnerability in Wordpress 4.7.0 and 4.7.1 that Attempts to detect a privilege escalation vulnerability in Wordpress 4.7.0 and 4.7.1 that
allows unauthenticated users to inject content in posts. allows unauthenticated users to inject content in posts.
The script connects to the Wordpress REST API to obtain the list of published posts and The script connects to the Wordpress REST API to obtain the list of published posts and
grabs the user id and date from there. Then it attempts to update the date field in the grabs the user id and date from there. Then it attempts to update the date field in the
post with the same date information we just obtained. If the request doesnt return an post with the same date information we just obtained. If the request doesnt return an
error, we mark the server as vulnerable. error, we mark the server as vulnerable.
References: References:
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
]] ]]
--- ---
@@ -33,13 +31,13 @@ https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-a
-- | Content Injection in Wordpress REST API -- | Content Injection in Wordpress REST API
-- | State: VULNERABLE (Exploitable) -- | State: VULNERABLE (Exploitable)
-- | IDs: CVE:CVE-2017-1001000 -- | IDs: CVE:CVE-2017-1001000
-- | Risk factor: Medium CVSSv2: 5.0 (MEDIUM) -- | Risk factor: Medium CVSSv2: 5.0 (MEDIUM)
-- | The privilege escalation vulnerability in WordPress REST API allows -- | The privilege escalation vulnerability in WordPress REST API allows
-- | the visitors to edit any post on the site -- | the visitors to edit any post on the site
-- | Versions 4.7.0 and 4.7.1 are known to be affected -- | Versions 4.7.0 and 4.7.1 are known to be affected
-- | -- |
-- | References: -- | References:
-- |_ https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html -- |_ https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
-- --
-- @xmloutput -- @xmloutput
-- <table key="CVE-2017-1001000"> -- <table key="CVE-2017-1001000">
@@ -106,7 +104,7 @@ Versions 4.7.0 and 4.7.1 are known to be affected.
return vulnReport:make_output(vuln_table) return vulnReport:make_output(vuln_table)
end end
--Modifying the uri and checking for response. --Modifying the uri and checking for response.
--Date modification request is being sent. --Date modification request is being sent.
uri = uri ..id..'/'..'?id=' .. id ..'abc'..'&date='..content uri = uri ..id..'/'..'?id=' .. id ..'abc'..'&date='..content

View File

@@ -3,7 +3,6 @@ local ipOps = require "ipOps"
local table = require "table" local table = require "table"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
description = [[ description = [[
A script to detect WebDAV installations. Uses the OPTIONS and PROPFIND methods. A script to detect WebDAV installations. Uses the OPTIONS and PROPFIND methods.
@@ -180,4 +179,3 @@ function action (host, port)
if #output > 0 then return output else return nil end if #output > 0 then return output else return nil end
end end

View File

@@ -1,7 +1,6 @@
local comm = require "comm" local comm = require "comm"
local os = require "os" local os = require "os"
local datetime = require "datetime" local datetime = require "datetime"
local bin = require "bin"
local shortport = require "shortport" local shortport = require "shortport"
local sslcert = require "sslcert" local sslcert = require "sslcert"
local stdnse = require "stdnse" local stdnse = require "stdnse"

View File

@@ -1,4 +1,3 @@
local http = require "http"
local geoip = require "geoip" local geoip = require "geoip"
local io = require "io" local io = require "io"
local stdnse = require "stdnse" local stdnse = require "stdnse"

View File

@@ -4,8 +4,6 @@ local ipmi = require "ipmi"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table"
description = [[ description = [[
Performs brute force password auditing against IPMI RPC server. Performs brute force password auditing against IPMI RPC server.

View File

@@ -5,7 +5,6 @@ local stdnse = require "stdnse"
local string = require "string" local string = require "string"
local table = require "table" local table = require "table"
local multicast = require "multicast" local multicast = require "multicast"
local math = require "math"
description = [[ description = [[
Uses Multicast Listener Discovery to list the multicast addresses subscribed to Uses Multicast Listener Discovery to list the multicast addresses subscribed to

View File

@@ -1,4 +1,3 @@
local bin = require "bin"
local comm = require "comm" local comm = require "comm"
local ldap = require "ldap" local ldap = require "ldap"
local shortport = require "shortport" local shortport = require "shortport"

View File

@@ -1,6 +1,4 @@
local io = require "io"
local string = require "string" local string = require "string"
local table = require "table"
local nmap = require "nmap" local nmap = require "nmap"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local shortport = require "shortport" local shortport = require "shortport"
@@ -9,7 +7,6 @@ local creds = require "creds"
local unpwdb = require "unpwdb" local unpwdb = require "unpwdb"
local drda = require "drda" local drda = require "drda"
local comm = require "comm" local comm = require "comm"
local nsedebug = require "nsedebug"
description = [[ description = [[
z/OS JES Network Job Entry (NJE) 'I record' password brute forcer. z/OS JES Network Job Entry (NJE) 'I record' password brute forcer.

View File

@@ -2,7 +2,6 @@ local bin = require "bin"
local comm = require "comm" local comm = require "comm"
local datetime = require "datetime" local datetime = require "datetime"
local os = require "os" local os = require "os"
local math = require "math"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"

View File

@@ -2,7 +2,6 @@ local bin = require "bin"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local table = require "table"
description = [[ description = [[
This NSE script is used to send a FINS packet to a remote device. The script This NSE script is used to send a FINS packet to a remote device. The script

View File

@@ -1,4 +1,3 @@
local bin = require "bin"
local ipOps = require "ipOps" local ipOps = require "ipOps"
local math = require "math" local math = require "math"
local nmap = require "nmap" local nmap = require "nmap"
@@ -398,4 +397,3 @@ action = function(host)
return "" .. MTUS[m] .. " <= PMTU < " .. MTUS[m - 1] return "" .. MTUS[m] .. " <= PMTU < " .. MTUS[m - 1]
end end
end end

View File

@@ -1,7 +1,6 @@
local comm = require "comm" local comm = require "comm"
local os = require "os" local os = require "os"
local datetime = require "datetime" local datetime = require "datetime"
local bin = require "bin"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local base64 = require "base64" local base64 = require "base64"

View File

@@ -1,4 +1,3 @@
local bin = require "bin"
local rmi = require "rmi" local rmi = require "rmi"
local shortport = require "shortport" local shortport = require "shortport"
local string = require "string" local string = require "string"

View File

@@ -1,4 +1,3 @@
local bin = require "bin"
local smb = require "smb" local smb = require "smb"
local vulns = require "vulns" local vulns = require "vulns"
local stdnse = require "stdnse" local stdnse = require "stdnse"

View File

@@ -1,6 +1,5 @@
local smb = require "smb" local smb = require "smb"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local nmap = require "nmap" local nmap = require "nmap"
description = [[ description = [[
@@ -23,8 +22,8 @@ script is the successor to the (removed) smbv2-enabled script.
-- @usage nmap -p139 --script smb-protocols <target> -- @usage nmap -p139 --script smb-protocols <target>
-- --
-- @output -- @output
-- | smb-protocols: -- | smb-protocols:
-- | dialects: -- | dialects:
-- | NT LM 0.12 (SMBv1) [dangerous, but default] -- | NT LM 0.12 (SMBv1) [dangerous, but default]
-- | 2.02 -- | 2.02
-- | 2.10 -- | 2.10
@@ -52,7 +51,7 @@ hostrule = function(host)
end end
action = function(host,port) action = function(host,port)
local status, supported_dialects, overrides local status, supported_dialects, overrides
local output = stdnse.output_table() local output = stdnse.output_table()
overrides = {} overrides = {}
status, supported_dialects = smb.list_dialects(host, overrides) status, supported_dialects = smb.list_dialects(host, overrides)
@@ -62,7 +61,7 @@ action = function(host,port)
supported_dialects[i] = v .. " (SMBv1) [dangerous, but default]" supported_dialects[i] = v .. " (SMBv1) [dangerous, but default]"
end end
end end
output.dialects = supported_dialects output.dialects = supported_dialects
end end
if #output.dialects>0 then if #output.dialects>0 then

View File

@@ -1,7 +1,6 @@
local msrpc = require "msrpc" local msrpc = require "msrpc"
local nmap = require "nmap" local nmap = require "nmap"
local smb = require "smb" local smb = require "smb"
local stdnse = require "stdnse"
local string = require "string" local string = require "string"
local table = require "table" local table = require "table"
local vulns = require "vulns" local vulns = require "vulns"

View File

@@ -1,8 +1,6 @@
local msrpc = require "msrpc"
local nmap = require "nmap" local nmap = require "nmap"
local smb = require "smb" local smb = require "smb"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
local vulns = require "vulns" local vulns = require "vulns"

View File

@@ -2,7 +2,6 @@ local msrpc = require "msrpc"
local nmap = require "nmap" local nmap = require "nmap"
local smb = require "smb" local smb = require "smb"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
local vulns = require "vulns" local vulns = require "vulns"

View File

@@ -1,7 +1,6 @@
local msrpc = require "msrpc" local msrpc = require "msrpc"
local nmap = require "nmap" local nmap = require "nmap"
local smb = require "smb" local smb = require "smb"
local stdnse = require "stdnse"
local string = require "string" local string = require "string"
local table = require "table" local table = require "table"
local vulns = require "vulns" local vulns = require "vulns"

View File

@@ -1,8 +1,6 @@
local msrpc = require "msrpc" local msrpc = require "msrpc"
local nmap = require "nmap" local nmap = require "nmap"
local smb = require "smb" local smb = require "smb"
local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
local vulns = require "vulns" local vulns = require "vulns"

View File

@@ -1,7 +1,6 @@
local smb = require "smb" local smb = require "smb"
local smb2 = require "smb2" local smb2 = require "smb2"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
local nmap = require "nmap" local nmap = require "nmap"
@@ -26,10 +25,10 @@ References:
-- @usage nmap -p 139 --script smb2-capabilities <target> -- @usage nmap -p 139 --script smb2-capabilities <target>
-- --
-- @output -- @output
-- | smb2-capabilities: -- | smb2-capabilities:
-- | 2.02: -- | 2.02:
-- | Distributed File System -- | Distributed File System
-- | 2.10: -- | 2.10:
-- | Distributed File System -- | Distributed File System
-- | Leasing -- | Leasing
-- | Multi-credit operations -- | Multi-credit operations
@@ -54,7 +53,7 @@ hostrule = function(host)
end end
action = function(host,port) action = function(host,port)
local status, smbstate, overrides local status, smbstate, overrides
local output = stdnse.output_table() local output = stdnse.output_table()
overrides = {} overrides = {}

View File

@@ -1,7 +1,6 @@
local smb = require "smb" local smb = require "smb"
local smb2 = require "smb2" local smb2 = require "smb2"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local table = require "table" local table = require "table"
local nmap = require "nmap" local nmap = require "nmap"
@@ -22,8 +21,8 @@ References:
-- @usage nmap -p 139 --script smb2-security-mode <target> -- @usage nmap -p 139 --script smb2-security-mode <target>
-- --
-- @output -- @output
-- | smb2-security-mode: -- | smb2-security-mode:
-- | 3.11: -- | 3.11:
-- |_ Message signing enabled but not required -- |_ Message signing enabled but not required
-- --
-- @xmloutput -- @xmloutput
@@ -41,7 +40,7 @@ hostrule = function(host)
end end
action = function(host,port) action = function(host,port)
local status, smbstate, overrides local status, smbstate, overrides
local output = stdnse.output_table() local output = stdnse.output_table()
overrides = overrides or {} overrides = overrides or {}
@@ -61,7 +60,7 @@ action = function(host,port)
-- Signing configuration. SMBv2 servers support two flags: -- Signing configuration. SMBv2 servers support two flags:
-- * Message signing enabled -- * Message signing enabled
-- * Message signing required -- * Message signing required
local signing_enabled, signing_required local signing_enabled, signing_required
if smbstate['security_mode'] & 0x01 == 0x01 then if smbstate['security_mode'] & 0x01 == 0x01 then
signing_enabled = true signing_enabled = true
end end
@@ -77,9 +76,9 @@ action = function(host,port)
table.insert(message_signing, "Message signing is disabled and not required!") table.insert(message_signing, "Message signing is disabled and not required!")
elseif not(signing_enabled) and signing_required then elseif not(signing_enabled) and signing_required then
table.insert(message_signing, "Message signing is disabled!") table.insert(message_signing, "Message signing is disabled!")
end end
output[stdnse.tohex(dialect[1], {separator = ".", group = 2})] = message_signing output[stdnse.tohex(dialect[1], {separator = ".", group = 2})] = message_signing
-- We exit after first accepted dialect, -- We exit after first accepted dialect,
-- SMB signing configuration appears to be global so -- SMB signing configuration appears to be global so
-- there is no point of trying other dialects. -- there is no point of trying other dialects.
break break

View File

@@ -1,7 +1,6 @@
local datetime = require "datetime" local datetime = require "datetime"
local os = require "os" local os = require "os"
local smtp = require "smtp" local smtp = require "smtp"
local bin = require "bin"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local base64 = require "base64" local base64 = require "base64"

View File

@@ -6,7 +6,6 @@ local packet = require "packet"
local shortport = require "shortport" local shortport = require "shortport"
local snmp = require "snmp" local snmp = require "snmp"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local unpwdb = require "unpwdb" local unpwdb = require "unpwdb"
description = [[ description = [[
@@ -269,4 +268,3 @@ action = function(host, port)
stdnse.debug1("An error occurred: "..result.msg) stdnse.debug1("An error occurred: "..result.msg)
end end
end end

View File

@@ -2,7 +2,6 @@ local io = require "io"
local nmap = require "nmap" local nmap = require "nmap"
local shortport = require "shortport" local shortport = require "shortport"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string"
local sslcert = require "sslcert" local sslcert = require "sslcert"
local tls = require "tls" local tls = require "tls"

View File

@@ -2,7 +2,6 @@ local coroutine = require "coroutine"
local ipOps = require "ipOps" local ipOps = require "ipOps"
local math = require "math" local math = require "math"
local nmap = require "nmap" local nmap = require "nmap"
local os = require "os"
local packet = require "packet" local packet = require "packet"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string" local string = require "string"

View File

@@ -1,5 +1,3 @@
local bin = require "bin"
local bit = require "bit"
local nmap = require "nmap" local nmap = require "nmap"
local rpc = require "rpc" local rpc = require "rpc"
local shortport = require "shortport" local shortport = require "shortport"