mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Correct "it's" to "its" where necessary
it's = it is its = belonging to it
This commit is contained in:
@@ -3402,7 +3402,7 @@ o [Nping] Substantially improved the Nping man page. You can read it
|
||||
online at http://nmap.org/book/nping-man.html. [Luis, David]
|
||||
|
||||
o Documented the licenses of the third-party software used by Nmap and
|
||||
it's sibling tools:
|
||||
its sibling tools:
|
||||
http://nmap.org/svn/docs/3rd-party-licenses.txt. [David]
|
||||
|
||||
o [NSE] Improved the SMB scripts so that they can run in parallel
|
||||
@@ -4166,7 +4166,7 @@ o [NSE] Added 5 new MySQL NSE scripts and a MySQL library by Patrik Karlsson:
|
||||
(http://nmap.org/nsedoc/scripts/mysql-empty-password.html).
|
||||
- mysql-users queries MySQL for a list of database users
|
||||
(http://nmap.org/nsedoc/scripts/mysql-users.html).
|
||||
- mysql-variables queries MySQL for it's variables and their
|
||||
- mysql-variables queries MySQL for its variables and their
|
||||
settings (http://nmap.org/nsedoc/scripts/mysql-variables.html).
|
||||
|
||||
o Improved the passwords.lst database used by NSE by combining several
|
||||
@@ -5560,7 +5560,7 @@ o [NSE] Added http-iis-webdav-vuln.nse, which detects the recently
|
||||
o The Nmap Reference Guide has been translated to German by Open
|
||||
Source Press and Indonesian by Tedi Heriyanto. You can now read it
|
||||
in 16 languages at http://nmap.org/docs.html. We're always looking
|
||||
for more translations of Nmap and it's documentation--if you'd like
|
||||
for more translations of Nmap and its documentation--if you'd like
|
||||
to help, see http://seclists.org/nmap-dev/2009/q2/0667.html.
|
||||
|
||||
o Open Source Press completed and released the German translation of
|
||||
@@ -9295,7 +9295,7 @@ o Fixed a bug which caused nmap --iflist to crash (and might have
|
||||
o Applied a bunch of code cleanup patches from Kris Katterjohn.
|
||||
|
||||
o Some scan types were fixed when used against localhost. The UDP Scan
|
||||
doesn't find it's own port, the TCP Scan won't print a message (with -d)
|
||||
doesn't find its own port, the TCP Scan won't print a message (with -d)
|
||||
about an unexpected packet (for the same reason), and the IPProto Scan
|
||||
won't list every port as "open" when using --data-length >= 8. [Kris]
|
||||
|
||||
|
||||
@@ -56,7 +56,7 @@ Ncat has support for HTTP "CONNECT" via an HTTP proxy server such as Squid.
|
||||
It can also connect via a SOCKS4 server and is very flexible in terms of
|
||||
how it shuffles your data around.
|
||||
|
||||
Ncat can also spawn it's own it's own HTTP CONNECT proxy server for your
|
||||
Ncat can also spawn its own HTTP CONNECT proxy server for your
|
||||
own relaying requirements.
|
||||
|
||||
Ncat has the ability to execute a program and handle the I/O for its data
|
||||
|
||||
@@ -19226,7 +19226,7 @@ T7(R=Y%DF=N%T=7B-85%TG=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)
|
||||
U1(DF=N%T=7B-85%TG=80%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
|
||||
IE(DFI=N%T=7B-85%TG=80%CD=S)
|
||||
|
||||
# Develop Ineo 350. Develop is a Konica Minolta reseller with it's own brands / marketing names. (The 250 and 350 builds seem to be identical.)
|
||||
# Develop Ineo 350. Develop is a Konica Minolta reseller with its own brands / marketing names. (The 250 and 350 builds seem to be identical.)
|
||||
Fingerprint Develop ineo 250 or 350 printer
|
||||
Class Develop | embedded || printer
|
||||
SEQ(SP=14-1E%GCD=FA00|1F400|2EE00|3E800|4E200%ISR=99-A3%TI=I%II=I%SS=S%TS=1)
|
||||
@@ -19243,7 +19243,7 @@ T7(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)
|
||||
U1(DF=N%T=3B-45%TG=40%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=0%RUD=G)
|
||||
IE(DFI=S%T=3B-45%TG=40%CD=S)
|
||||
|
||||
# Develop Ineo 600. Develop is a Konica Minolta reseller with it's own brands / marketing names. (The 600 and 700 builds seem to be identical.)
|
||||
# Develop Ineo 600. Develop is a Konica Minolta reseller with its own brands / marketing names. (The 600 and 700 builds seem to be identical.)
|
||||
Fingerprint Develop ineo 600 or 700 printer
|
||||
Class Develop | embedded || printer
|
||||
SEQ(SP=14-1E%GCD=FA00|1F400|2EE00|3E800|4E200%ISR=99-A3%TI=I%TS=1)
|
||||
@@ -76987,7 +76987,7 @@ T7(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S%F=ARF%O=%RD=0%Q=)
|
||||
U1(R=N)
|
||||
IE(DFI=N%T=3B-45%TG=40%CD=S)
|
||||
|
||||
# Cisco/Codian MCU 4210, according to it's boot messages - NetBSD inside
|
||||
# Cisco/Codian MCU 4210, according to its boot messages - NetBSD inside
|
||||
Fingerprint Tandberg Codian videoconferencing system (NetBSD)
|
||||
Class Tandberg | NetBSD || media device
|
||||
CPE cpe:/o:tandberg:netbsd auto
|
||||
|
||||
@@ -484,7 +484,7 @@ static int l_get_port_state (lua_State *L)
|
||||
}
|
||||
|
||||
/* this function must be used by version category scripts or any other
|
||||
* lua code to check if a given port with it's protocol are in the
|
||||
* lua code to check if a given port with its protocol are in the
|
||||
* exclude directive found in the nmap-service-probes file.
|
||||
* */
|
||||
static int l_port_is_excluded (lua_State *L)
|
||||
|
||||
@@ -45,7 +45,7 @@
|
||||
-- </code>
|
||||
--
|
||||
-- Here's the longer version, with some explanatory text. To start using the Helper class,
|
||||
-- the script has to create it's own instance. We do this by issuing the following:
|
||||
-- the script has to create its own instance. We do this by issuing the following:
|
||||
-- <code>
|
||||
-- helper = afp.Helper:new()
|
||||
-- </code>
|
||||
|
||||
@@ -12,7 +12,7 @@
|
||||
-- Created 01/12/2010 - v0.1 - Created by Patrik Karlsson <patrik@cqure.net>
|
||||
-- Revised 01/28/2010 - v0.2 - Adapted to create a framework for SNMP, LDAP and future protocols
|
||||
-- Revised 02/02/2010 - v0.3 - Changes: o Re-designed so that ASN1Encoder and ASN1Decoder are separate classes
|
||||
-- o Each script or library should now create it's own Encoder and Decoder instance
|
||||
-- o Each script or library should now create its own Encoder and Decoder instance
|
||||
--
|
||||
|
||||
local bin = require "bin"
|
||||
|
||||
@@ -511,10 +511,10 @@ DHCP6.Response = {
|
||||
}
|
||||
|
||||
-- Table of option to string converters
|
||||
-- Each option should have it's own function to convert an instance of option
|
||||
-- Each option should have its own function to convert an instance of option
|
||||
-- to a printable string.
|
||||
--
|
||||
-- TODO: These functions could eventually be moved to a method in it's
|
||||
-- TODO: These functions could eventually be moved to a method in its
|
||||
-- respective class.
|
||||
OptionToString = {
|
||||
|
||||
|
||||
@@ -333,7 +333,7 @@ end
|
||||
--- Classes by Signature command (2)
|
||||
-- Returns reference types for all the classes loaded by the target VM which match the given signature.
|
||||
--
|
||||
-- Given the class signature (like "Ljava/lang/Class") returns it's reference ID which can be used to reference that class
|
||||
-- Given the class signature (like "Ljava/lang/Class") returns its reference ID which can be used to reference that class
|
||||
-- in other commands. Returns a list of tables containing following values:
|
||||
-- * 'refTypeTag' JNI type tag
|
||||
-- * 'referenceTypeID' Reference type of the class
|
||||
@@ -1055,7 +1055,7 @@ function injectClass(socket,class_bytes)
|
||||
local tag,injectedClassID
|
||||
_,tag,injectedClassID = bin.unpack(">CL",injectedClass)
|
||||
|
||||
-- our class is now injected, but we need to find it's methods by calling Class.getMethods() on it
|
||||
-- our class is now injected, but we need to find its methods by calling Class.getMethods() on it
|
||||
-- and for that we need its runtime_type which is Class
|
||||
local runtime_type
|
||||
status, runtime_type = getRuntimeType(socket,0,injectedClassID) -- should be Class
|
||||
|
||||
@@ -41,7 +41,7 @@ local err =stdnse.print_debug
|
||||
-- Library methods for handling the BSON format
|
||||
--
|
||||
-- For more documentation about the BSON format,
|
||||
---and more details about it's implementations, check out the
|
||||
---and more details about its implementations, check out the
|
||||
-- python BSON implementation which is available at
|
||||
-- http://github.com/mongodb/mongo-python-driver/blob/master/pymongo/bson.py
|
||||
-- and licensed under the Apache License, Version 2.0 http://www.apache.org/licenses/LICENSE-2.0)
|
||||
|
||||
@@ -322,7 +322,7 @@ function decodeField( data, pos )
|
||||
|
||||
end
|
||||
|
||||
--- Decodes the result set header packet into it's sub components
|
||||
--- Decodes the result set header packet into its sub components
|
||||
--
|
||||
-- ref: http://forge.mysql.com/wiki/MySQL_Internals_ClientServer_Protocol#Result_Set_Header_Packet
|
||||
--
|
||||
|
||||
@@ -2977,7 +2977,7 @@ Util =
|
||||
return stdnse.tooctal(code)
|
||||
end,
|
||||
|
||||
--- Converts a numeric ACL to it's character equivalent eg. (rwxr-xr-x)
|
||||
--- Converts a numeric ACL to its character equivalent eg. (rwxr-xr-x)
|
||||
--
|
||||
-- @param mode number containing the ACL mode
|
||||
-- @return string containing the ACL characters
|
||||
@@ -3374,7 +3374,7 @@ Util =
|
||||
return df, nil
|
||||
end,
|
||||
|
||||
--- Converts a RPC program name to it's equivalent number
|
||||
--- Converts a RPC program name to its equivalent number
|
||||
--
|
||||
-- @param prog_name string containing the name of the RPC program
|
||||
-- @return num number containing the program ID
|
||||
@@ -3396,7 +3396,7 @@ Util =
|
||||
return
|
||||
end,
|
||||
|
||||
--- Converts the RPC program number to it's equivalent name
|
||||
--- Converts the RPC program number to its equivalent name
|
||||
--
|
||||
-- @param num number containing the RPC program identifier
|
||||
-- @return string containing the RPC program name
|
||||
|
||||
@@ -24,7 +24,7 @@ local function includes(t, value)
|
||||
return false
|
||||
end
|
||||
|
||||
--- Check if the port and it's protocol are in the exclude directive.
|
||||
--- Check if the port and its protocol are in the exclude directive.
|
||||
--
|
||||
-- @param port A port number.
|
||||
-- @param proto The protocol to match against, default <code>"tcp"</code>.
|
||||
@@ -134,7 +134,7 @@ end
|
||||
-- and <code>port_or_service</code> functions. The port, service, proto may
|
||||
-- be single values or a list of values as in those functions.
|
||||
-- This function can be used by version category scripts to check if a
|
||||
-- given port and it's protocol are in the exclude directive.
|
||||
-- given port and its protocol are in the exclude directive.
|
||||
-- @usage portrule = shortport.version_port_or_service(22)
|
||||
-- @usage portrule = shortport.version_port_or_service(nil, "ssh", "tcp")
|
||||
-- @param services Service name or a list of names to run against.
|
||||
|
||||
@@ -286,7 +286,7 @@ passwords = function(time_limit, count_limit)
|
||||
return true, limited_iterator(iterator, time_limit, count_limit)
|
||||
end
|
||||
|
||||
--- Returns a new iterator that iterates trough it's consecutive iterators,
|
||||
--- Returns a new iterator that iterates through its consecutive iterators,
|
||||
-- basically concatenating them.
|
||||
-- @param iter1 First iterator to concatenate.
|
||||
-- @param iter2 Second iterator to concatenate.
|
||||
@@ -310,7 +310,7 @@ function concat_iterators (iter1, iter2)
|
||||
return iterator
|
||||
end
|
||||
|
||||
--- Returns a new iterator that filters it's results based on the filter.
|
||||
--- Returns a new iterator that filters its results based on the filter.
|
||||
-- @param iterator Iterator that needs to be filtered
|
||||
-- @param filter Function that returns bool, which serves as a filter
|
||||
-- @return function The filtered iterator.
|
||||
|
||||
@@ -307,7 +307,7 @@ nsock_ssl nsi_getssl(nsock_iod nsockiod) {
|
||||
#endif
|
||||
}
|
||||
|
||||
/* Returns the SSL_SESSION of an nsock_iod, and increments it's usage count. */
|
||||
/* Returns the SSL_SESSION of an nsock_iod, and increments its usage count. */
|
||||
nsock_ssl_session nsi_get1_ssl_session(nsock_iod nsockiod) {
|
||||
#if HAVE_OPENSSL
|
||||
return SSL_get1_session(((struct niod *)nsockiod)->ssl);
|
||||
|
||||
@@ -73,7 +73,7 @@ action = function(host, port)
|
||||
|
||||
--
|
||||
-- Packets were intercepted from the Citrix Program Neighborhood client
|
||||
-- They are used to query a server for it's list of servers
|
||||
-- They are used to query a server for its list of servers
|
||||
--
|
||||
-- We're really not interested in the responses to the first two packets
|
||||
-- The third response contains the list of published applications
|
||||
|
||||
@@ -70,7 +70,7 @@ action = function(host, port)
|
||||
|
||||
--
|
||||
-- Packets were intercepted from the Citrix Program Neighborhood client
|
||||
-- They are used to query a server for it's list of published applications
|
||||
-- They are used to query a server for its list of published applications
|
||||
--
|
||||
-- We're really not interested in the responses to the first two packets
|
||||
-- The third response contains the list of published applications
|
||||
|
||||
@@ -173,7 +173,7 @@ local function random_string()
|
||||
end
|
||||
|
||||
-- generate a random hash with domains suffix
|
||||
-- return both domain and it's hash
|
||||
-- return both domain and its hash
|
||||
local function generate_hash(domain, iter, salt)
|
||||
local rand_str = random_string()
|
||||
local random_domain = rand_str .. "." .. domain
|
||||
|
||||
@@ -19,7 +19,7 @@ the final CRLF. After 10 seconds, second connection sends
|
||||
additional header. Both connections then wait for server timeout.
|
||||
If second connection gets a timeout 10 or more seconds after the
|
||||
first one, we can conclude that sending additional header prolonged
|
||||
it's timeout and that the server is vulnerable to slowloris DoS attack.
|
||||
its timeout and that the server is vulnerable to slowloris DoS attack.
|
||||
|
||||
You can specify custom http User-agent field with <code>http.useragent</code>
|
||||
script argument.
|
||||
|
||||
@@ -52,7 +52,7 @@ portrule = shortport.port_or_service( 88, {"kerberos-sec"}, {"udp","tcp"}, {"ope
|
||||
|
||||
-- This an embryo of a Kerberos 5 packet creation and parsing class. It's very
|
||||
-- tiny class and holds only the necessary functions to support this script.
|
||||
-- This class be factored out into it's own library, once more scripts make use
|
||||
-- This class be factored out into its own library, once more scripts make use
|
||||
-- of it.
|
||||
KRB5 = {
|
||||
|
||||
|
||||
@@ -11,7 +11,7 @@ the host and the NetBus service itself.
|
||||
The extracted host information includes a list of running
|
||||
applications, and the hosts sound volume settings.
|
||||
|
||||
The extracted service information includes it's access control list
|
||||
The extracted service information includes its access control list
|
||||
(acl), server information, and setup. The acl is a list of IP
|
||||
addresses permitted to access the service. Server information
|
||||
contains details about the server installation path, restart
|
||||
|
||||
@@ -93,7 +93,7 @@ Default configuration of RMI registry allows loading classes from remote URLs wh
|
||||
rmiArgs:addRaw(bin.pack("H", argsRaw));
|
||||
|
||||
-- reference: java/rmi/dgc/DGCImpl_Stub.java and java/rmi/dgc/DGCImpl_Skel.java
|
||||
-- we are calling DGC's (it's objectId is 2) method with opnum 0
|
||||
-- we are calling DGC's (its objectId is 2) method with opnum 0
|
||||
-- DCG's hashcode is f6b6898d8bf28643 hex or -669196253586618813 dec
|
||||
local status, j_array = registry.out:writeMethodCall(registry.out, 2, "f6b6898d8bf28643", 0, rmiArgs);
|
||||
local status, retByte = registry.out.dis:readByte();
|
||||
|
||||
@@ -23,7 +23,7 @@ Retrieves some basic information, including protocol version from a Vuze filesha
|
||||
-- | Network id: Stable (0)
|
||||
-- |_ Instance id: 2260473691
|
||||
--
|
||||
-- As Vuze doesn't have a default port for it's DHT service, this script has
|
||||
-- As Vuze doesn't have a default port for its DHT service, this script has
|
||||
-- some difficulties in determining when to run. Most scripts are triggered by
|
||||
-- either a default port or a fingerprinted service. To get around this, there
|
||||
-- are two options:
|
||||
|
||||
@@ -207,7 +207,7 @@ used more than once to get even more verbosity"))
|
||||
# Store the next argument in a specific list
|
||||
nmap_args.append(parser.rargs[0])
|
||||
|
||||
# Remove the added argument from rargs to avoid it's latter
|
||||
# Remove the added argument from rargs to avoid its later
|
||||
# parsing by optparse
|
||||
del parser.rargs[0]
|
||||
|
||||
|
||||
@@ -187,7 +187,7 @@ class HIGSpinnerImages:
|
||||
if name not in self.static_pixbufs:
|
||||
raise StaticPixbufNotFound
|
||||
|
||||
# self.rest_pixbuf holds the *real* pixbuf, not it's name
|
||||
# self.rest_pixbuf holds the *real* pixbuf, not its name
|
||||
self.rest_pixbuf = self.static_pixbufs[name]
|
||||
|
||||
def set_size(self, width, height):
|
||||
|
||||
Reference in New Issue
Block a user