1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 12:41:29 +00:00

Fixed comments about arguments on the script.

Fixed description.
This commit is contained in:
joao
2009-06-13 02:15:01 +00:00
parent 891fe08af8
commit e938e1a18f

View File

@@ -1,18 +1,16 @@
description=[[ description=[[
Checks if an open socks proxy is running on the target. Checks if an Socks proxy is open.
The script attempts to connect to a proxy server and send socks4 and The script attempts to connect to the proxy server and send the socks4 and socks5
socks5 payloads. It is considered an open proxy if the script receives payloads. If the script receives a Request Granted from server, the proxy is considered open.
a Request GRanted response from the target port.
The payloads request permission to open a connection with The payloads try to open a connection with www.google.com at port 80.
www.google.com at port 80. A different test host can be passed as
argument, as described below.
This script was strongly based on the http-open-proxy.nse script, written by Andre 'Buanzo' Busleiman. A different host can be passed as argument, as described below.
]] ]]
--- ---
--@args openproxy.host Host that will be requested to the proxy
--@output --@output
-- Interesting ports on scanme.nmap.org (64.13.134.52): -- Interesting ports on scanme.nmap.org (64.13.134.52):
-- PORT STATE SERVICE -- PORT STATE SERVICE
@@ -26,6 +24,7 @@ This script was strongly based on the http-open-proxy.nse script, written by And
author = "Joao Correa <joao@livewire.com.br>" author = "Joao Correa <joao@livewire.com.br>"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"default", "discovery", "external", "intrusive"} categories = {"default", "discovery", "external", "intrusive"}
require "shortport" require "shortport"
require "bin" require "bin"
require "nmap" require "nmap"
@@ -71,7 +70,7 @@ action = function(host, port)
payload = bin.pack("H",paystring) payload = bin.pack("H",paystring)
local socket = nmap.new_socket() local socket = nmap.new_socket()
socket:set_timeout(1000) socket:set_timeout(10000)
try = nmap.new_try(function() socket:close() end) try = nmap.new_try(function() socket:close() end)
try(socket:connect(host.ip, port.number)) try(socket:connect(host.ip, port.number))
try(socket:send(payload)) try(socket:send(payload))
@@ -101,7 +100,7 @@ action = function(host, port)
-- Send first Socks5 payload to estabilish connection without authentication -- Send first Socks5 payload to estabilish connection without authentication
local socket2 = nmap.new_socket() local socket2 = nmap.new_socket()
socket2:set_timeout(1000) socket2:set_timeout(10000)
try = nmap.new_try(function() socket2:close() end) try = nmap.new_try(function() socket2:close() end)
try(socket2:connect(host.ip, port.number)) try(socket2:connect(host.ip, port.number))
try(socket2:send(payload)) try(socket2:send(payload))