1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Correct "it's" to "its" where necessary

it's = it is
its = belonging to it
This commit is contained in:
dmiller
2014-06-19 04:58:46 +00:00
parent d90d991571
commit ec9074f718
24 changed files with 35 additions and 35 deletions

View File

@@ -3402,7 +3402,7 @@ o [Nping] Substantially improved the Nping man page. You can read it
online at http://nmap.org/book/nping-man.html. [Luis, David]
o Documented the licenses of the third-party software used by Nmap and
it's sibling tools:
its sibling tools:
http://nmap.org/svn/docs/3rd-party-licenses.txt. [David]
o [NSE] Improved the SMB scripts so that they can run in parallel
@@ -4166,7 +4166,7 @@ o [NSE] Added 5 new MySQL NSE scripts and a MySQL library by Patrik Karlsson:
(http://nmap.org/nsedoc/scripts/mysql-empty-password.html).
- mysql-users queries MySQL for a list of database users
(http://nmap.org/nsedoc/scripts/mysql-users.html).
- mysql-variables queries MySQL for it's variables and their
- mysql-variables queries MySQL for its variables and their
settings (http://nmap.org/nsedoc/scripts/mysql-variables.html).
o Improved the passwords.lst database used by NSE by combining several
@@ -5560,7 +5560,7 @@ o [NSE] Added http-iis-webdav-vuln.nse, which detects the recently
o The Nmap Reference Guide has been translated to German by Open
Source Press and Indonesian by Tedi Heriyanto. You can now read it
in 16 languages at http://nmap.org/docs.html. We're always looking
for more translations of Nmap and it's documentation--if you'd like
for more translations of Nmap and its documentation--if you'd like
to help, see http://seclists.org/nmap-dev/2009/q2/0667.html.
o Open Source Press completed and released the German translation of
@@ -9295,7 +9295,7 @@ o Fixed a bug which caused nmap --iflist to crash (and might have
o Applied a bunch of code cleanup patches from Kris Katterjohn.
o Some scan types were fixed when used against localhost. The UDP Scan
doesn't find it's own port, the TCP Scan won't print a message (with -d)
doesn't find its own port, the TCP Scan won't print a message (with -d)
about an unexpected packet (for the same reason), and the IPProto Scan
won't list every port as "open" when using --data-length >= 8. [Kris]

View File

@@ -56,7 +56,7 @@ Ncat has support for HTTP "CONNECT" via an HTTP proxy server such as Squid.
It can also connect via a SOCKS4 server and is very flexible in terms of
how it shuffles your data around.
Ncat can also spawn it's own it's own HTTP CONNECT proxy server for your
Ncat can also spawn its own HTTP CONNECT proxy server for your
own relaying requirements.
Ncat has the ability to execute a program and handle the I/O for its data

View File

@@ -19226,7 +19226,7 @@ T7(R=Y%DF=N%T=7B-85%TG=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)
U1(DF=N%T=7B-85%TG=80%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(DFI=N%T=7B-85%TG=80%CD=S)
# Develop Ineo 350. Develop is a Konica Minolta reseller with it's own brands / marketing names. (The 250 and 350 builds seem to be identical.)
# Develop Ineo 350. Develop is a Konica Minolta reseller with its own brands / marketing names. (The 250 and 350 builds seem to be identical.)
Fingerprint Develop ineo 250 or 350 printer
Class Develop | embedded || printer
SEQ(SP=14-1E%GCD=FA00|1F400|2EE00|3E800|4E200%ISR=99-A3%TI=I%II=I%SS=S%TS=1)
@@ -19243,7 +19243,7 @@ T7(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)
U1(DF=N%T=3B-45%TG=40%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=0%RUD=G)
IE(DFI=S%T=3B-45%TG=40%CD=S)
# Develop Ineo 600. Develop is a Konica Minolta reseller with it's own brands / marketing names. (The 600 and 700 builds seem to be identical.)
# Develop Ineo 600. Develop is a Konica Minolta reseller with its own brands / marketing names. (The 600 and 700 builds seem to be identical.)
Fingerprint Develop ineo 600 or 700 printer
Class Develop | embedded || printer
SEQ(SP=14-1E%GCD=FA00|1F400|2EE00|3E800|4E200%ISR=99-A3%TI=I%TS=1)
@@ -76987,7 +76987,7 @@ T7(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S%F=ARF%O=%RD=0%Q=)
U1(R=N)
IE(DFI=N%T=3B-45%TG=40%CD=S)
# Cisco/Codian MCU 4210, according to it's boot messages - NetBSD inside
# Cisco/Codian MCU 4210, according to its boot messages - NetBSD inside
Fingerprint Tandberg Codian videoconferencing system (NetBSD)
Class Tandberg | NetBSD || media device
CPE cpe:/o:tandberg:netbsd auto

View File

@@ -484,7 +484,7 @@ static int l_get_port_state (lua_State *L)
}
/* this function must be used by version category scripts or any other
* lua code to check if a given port with it's protocol are in the
* lua code to check if a given port with its protocol are in the
* exclude directive found in the nmap-service-probes file.
* */
static int l_port_is_excluded (lua_State *L)

View File

@@ -45,7 +45,7 @@
-- </code>
--
-- Here's the longer version, with some explanatory text. To start using the Helper class,
-- the script has to create it's own instance. We do this by issuing the following:
-- the script has to create its own instance. We do this by issuing the following:
-- <code>
-- helper = afp.Helper:new()
-- </code>

View File

@@ -12,7 +12,7 @@
-- Created 01/12/2010 - v0.1 - Created by Patrik Karlsson <patrik@cqure.net>
-- Revised 01/28/2010 - v0.2 - Adapted to create a framework for SNMP, LDAP and future protocols
-- Revised 02/02/2010 - v0.3 - Changes: o Re-designed so that ASN1Encoder and ASN1Decoder are separate classes
-- o Each script or library should now create it's own Encoder and Decoder instance
-- o Each script or library should now create its own Encoder and Decoder instance
--
local bin = require "bin"

View File

@@ -511,10 +511,10 @@ DHCP6.Response = {
}
-- Table of option to string converters
-- Each option should have it's own function to convert an instance of option
-- Each option should have its own function to convert an instance of option
-- to a printable string.
--
-- TODO: These functions could eventually be moved to a method in it's
-- TODO: These functions could eventually be moved to a method in its
-- respective class.
OptionToString = {

View File

@@ -333,7 +333,7 @@ end
--- Classes by Signature command (2)
-- Returns reference types for all the classes loaded by the target VM which match the given signature.
--
-- Given the class signature (like "Ljava/lang/Class") returns it's reference ID which can be used to reference that class
-- Given the class signature (like "Ljava/lang/Class") returns its reference ID which can be used to reference that class
-- in other commands. Returns a list of tables containing following values:
-- * 'refTypeTag' JNI type tag
-- * 'referenceTypeID' Reference type of the class
@@ -1055,7 +1055,7 @@ function injectClass(socket,class_bytes)
local tag,injectedClassID
_,tag,injectedClassID = bin.unpack(">CL",injectedClass)
-- our class is now injected, but we need to find it's methods by calling Class.getMethods() on it
-- our class is now injected, but we need to find its methods by calling Class.getMethods() on it
-- and for that we need its runtime_type which is Class
local runtime_type
status, runtime_type = getRuntimeType(socket,0,injectedClassID) -- should be Class

View File

@@ -41,7 +41,7 @@ local err =stdnse.print_debug
-- Library methods for handling the BSON format
--
-- For more documentation about the BSON format,
---and more details about it's implementations, check out the
---and more details about its implementations, check out the
-- python BSON implementation which is available at
-- http://github.com/mongodb/mongo-python-driver/blob/master/pymongo/bson.py
-- and licensed under the Apache License, Version 2.0 http://www.apache.org/licenses/LICENSE-2.0)

View File

@@ -322,7 +322,7 @@ function decodeField( data, pos )
end
--- Decodes the result set header packet into it's sub components
--- Decodes the result set header packet into its sub components
--
-- ref: http://forge.mysql.com/wiki/MySQL_Internals_ClientServer_Protocol#Result_Set_Header_Packet
--

View File

@@ -2977,7 +2977,7 @@ Util =
return stdnse.tooctal(code)
end,
--- Converts a numeric ACL to it's character equivalent eg. (rwxr-xr-x)
--- Converts a numeric ACL to its character equivalent eg. (rwxr-xr-x)
--
-- @param mode number containing the ACL mode
-- @return string containing the ACL characters
@@ -3374,7 +3374,7 @@ Util =
return df, nil
end,
--- Converts a RPC program name to it's equivalent number
--- Converts a RPC program name to its equivalent number
--
-- @param prog_name string containing the name of the RPC program
-- @return num number containing the program ID
@@ -3396,7 +3396,7 @@ Util =
return
end,
--- Converts the RPC program number to it's equivalent name
--- Converts the RPC program number to its equivalent name
--
-- @param num number containing the RPC program identifier
-- @return string containing the RPC program name

View File

@@ -24,7 +24,7 @@ local function includes(t, value)
return false
end
--- Check if the port and it's protocol are in the exclude directive.
--- Check if the port and its protocol are in the exclude directive.
--
-- @param port A port number.
-- @param proto The protocol to match against, default <code>"tcp"</code>.
@@ -134,7 +134,7 @@ end
-- and <code>port_or_service</code> functions. The port, service, proto may
-- be single values or a list of values as in those functions.
-- This function can be used by version category scripts to check if a
-- given port and it's protocol are in the exclude directive.
-- given port and its protocol are in the exclude directive.
-- @usage portrule = shortport.version_port_or_service(22)
-- @usage portrule = shortport.version_port_or_service(nil, "ssh", "tcp")
-- @param services Service name or a list of names to run against.

View File

@@ -286,7 +286,7 @@ passwords = function(time_limit, count_limit)
return true, limited_iterator(iterator, time_limit, count_limit)
end
--- Returns a new iterator that iterates trough it's consecutive iterators,
--- Returns a new iterator that iterates through its consecutive iterators,
-- basically concatenating them.
-- @param iter1 First iterator to concatenate.
-- @param iter2 Second iterator to concatenate.
@@ -310,7 +310,7 @@ function concat_iterators (iter1, iter2)
return iterator
end
--- Returns a new iterator that filters it's results based on the filter.
--- Returns a new iterator that filters its results based on the filter.
-- @param iterator Iterator that needs to be filtered
-- @param filter Function that returns bool, which serves as a filter
-- @return function The filtered iterator.

View File

@@ -307,7 +307,7 @@ nsock_ssl nsi_getssl(nsock_iod nsockiod) {
#endif
}
/* Returns the SSL_SESSION of an nsock_iod, and increments it's usage count. */
/* Returns the SSL_SESSION of an nsock_iod, and increments its usage count. */
nsock_ssl_session nsi_get1_ssl_session(nsock_iod nsockiod) {
#if HAVE_OPENSSL
return SSL_get1_session(((struct niod *)nsockiod)->ssl);

View File

@@ -73,7 +73,7 @@ action = function(host, port)
--
-- Packets were intercepted from the Citrix Program Neighborhood client
-- They are used to query a server for it's list of servers
-- They are used to query a server for its list of servers
--
-- We're really not interested in the responses to the first two packets
-- The third response contains the list of published applications

View File

@@ -70,7 +70,7 @@ action = function(host, port)
--
-- Packets were intercepted from the Citrix Program Neighborhood client
-- They are used to query a server for it's list of published applications
-- They are used to query a server for its list of published applications
--
-- We're really not interested in the responses to the first two packets
-- The third response contains the list of published applications

View File

@@ -173,7 +173,7 @@ local function random_string()
end
-- generate a random hash with domains suffix
-- return both domain and it's hash
-- return both domain and its hash
local function generate_hash(domain, iter, salt)
local rand_str = random_string()
local random_domain = rand_str .. "." .. domain

View File

@@ -19,7 +19,7 @@ the final CRLF. After 10 seconds, second connection sends
additional header. Both connections then wait for server timeout.
If second connection gets a timeout 10 or more seconds after the
first one, we can conclude that sending additional header prolonged
it's timeout and that the server is vulnerable to slowloris DoS attack.
its timeout and that the server is vulnerable to slowloris DoS attack.
You can specify custom http User-agent field with <code>http.useragent</code>
script argument.

View File

@@ -52,7 +52,7 @@ portrule = shortport.port_or_service( 88, {"kerberos-sec"}, {"udp","tcp"}, {"ope
-- This an embryo of a Kerberos 5 packet creation and parsing class. It's very
-- tiny class and holds only the necessary functions to support this script.
-- This class be factored out into it's own library, once more scripts make use
-- This class be factored out into its own library, once more scripts make use
-- of it.
KRB5 = {

View File

@@ -11,7 +11,7 @@ the host and the NetBus service itself.
The extracted host information includes a list of running
applications, and the hosts sound volume settings.
The extracted service information includes it's access control list
The extracted service information includes its access control list
(acl), server information, and setup. The acl is a list of IP
addresses permitted to access the service. Server information
contains details about the server installation path, restart

View File

@@ -93,7 +93,7 @@ Default configuration of RMI registry allows loading classes from remote URLs wh
rmiArgs:addRaw(bin.pack("H", argsRaw));
-- reference: java/rmi/dgc/DGCImpl_Stub.java and java/rmi/dgc/DGCImpl_Skel.java
-- we are calling DGC's (it's objectId is 2) method with opnum 0
-- we are calling DGC's (its objectId is 2) method with opnum 0
-- DCG's hashcode is f6b6898d8bf28643 hex or -669196253586618813 dec
local status, j_array = registry.out:writeMethodCall(registry.out, 2, "f6b6898d8bf28643", 0, rmiArgs);
local status, retByte = registry.out.dis:readByte();

View File

@@ -23,7 +23,7 @@ Retrieves some basic information, including protocol version from a Vuze filesha
-- | Network id: Stable (0)
-- |_ Instance id: 2260473691
--
-- As Vuze doesn't have a default port for it's DHT service, this script has
-- As Vuze doesn't have a default port for its DHT service, this script has
-- some difficulties in determining when to run. Most scripts are triggered by
-- either a default port or a fingerprinted service. To get around this, there
-- are two options:

View File

@@ -207,7 +207,7 @@ used more than once to get even more verbosity"))
# Store the next argument in a specific list
nmap_args.append(parser.rargs[0])
# Remove the added argument from rargs to avoid it's latter
# Remove the added argument from rargs to avoid its later
# parsing by optparse
del parser.rargs[0]

View File

@@ -187,7 +187,7 @@ class HIGSpinnerImages:
if name not in self.static_pixbufs:
raise StaticPixbufNotFound
# self.rest_pixbuf holds the *real* pixbuf, not it's name
# self.rest_pixbuf holds the *real* pixbuf, not its name
self.rest_pixbuf = self.static_pixbufs[name]
def set_size(self, width, height):