From f4619edece53dcf1cfa91f08227189a2e1dd1f1f Mon Sep 17 00:00:00 2001 From: dmiller Date: Thu, 5 Nov 2015 20:41:05 +0000 Subject: [PATCH] Update http urls for nmap.org to https --- CHANGELOG | 368 +++++++++--------- FPEngine.cc | 2 +- HACKING | 4 +- README-WIN32 | 2 +- configure | 2 +- configure.ac | 2 +- docs/README | 2 +- docs/committers.txt | 6 +- docs/legal-notices.xml | 4 +- docs/man-xlate/nmap-de.1 | 44 +-- docs/man-xlate/nmap-es.1 | 4 +- docs/man-xlate/nmap-fr.1 | 4 +- docs/man-xlate/nmap-hr.1 | 4 +- docs/man-xlate/nmap-hu.1 | 36 +- docs/man-xlate/nmap-id.1 | 42 +- docs/man-xlate/nmap-it.1 | 56 +-- docs/man-xlate/nmap-ja.1 | 2 +- docs/man-xlate/nmap-man-de.xml | 50 +-- docs/man-xlate/nmap-man-es.xml | 4 +- docs/man-xlate/nmap-man-fr.xml | 4 +- docs/man-xlate/nmap-man-hr.xml | 4 +- docs/man-xlate/nmap-man-hu.xml | 46 +-- docs/man-xlate/nmap-man-id.xml | 50 +-- docs/man-xlate/nmap-man-it.xml | 58 +-- docs/man-xlate/nmap-man-ja.xml | 2 +- docs/man-xlate/nmap-man-pl.xml | 4 +- docs/man-xlate/nmap-man-pt_BR.xml | 4 +- docs/man-xlate/nmap-man-pt_PT.xml | 2 +- docs/man-xlate/nmap-man-ro.xml | 2 +- docs/man-xlate/nmap-man-ru.xml | 48 +-- docs/man-xlate/nmap-man-sk.xml | 4 +- docs/man-xlate/nmap-man-zh.xml | 4 +- docs/man-xlate/nmap-pl.1 | 4 +- docs/man-xlate/nmap-pt_BR.1 | 4 +- docs/man-xlate/nmap-pt_PT.1 | 2 +- docs/man-xlate/nmap-ro.1 | 2 +- docs/man-xlate/nmap-ru.1 | 40 +- docs/man-xlate/nmap-sk.1 | 4 +- docs/man-xlate/nmap-zh.1 | 4 +- docs/nmap-fo.xsl | 2 +- docs/nmap-install.xml | 40 +- docs/nmap-update.1 | 4 +- docs/nmap.1 | 50 +-- docs/nmap.xsl | 2 +- docs/nmap_gpgkeys.txt | 4 +- docs/refguide.xml | 46 +-- docs/scripting.xml | 46 +-- docs/win32-installer-zenmap-buildguide.txt | 2 +- docs/zenmap.1 | 12 +- docs/zenmap.xml | 8 +- libnetutil/netutil.h | 2 +- libnetutil/npacket.h | 2 +- nbase/nbase.h | 2 +- ncat/COPYING | 2 +- ncat/INSTALL | 2 +- ncat/docs/ncat.1 | 16 +- ncat/docs/ncat.usage.txt | 8 +- ncat/docs/ncat.xml | 4 +- ncat/docs/ncatguide.xml | 6 +- ncat/ncat.h | 2 +- ncat/ncat_ssl.c | 2 +- ndiff/COPYING | 4 +- ndiff/README | 2 +- ndiff/docs/ndiff.1 | 6 +- ndiff/docs/ndiff.xml | 2 +- ndiff/ndiff.py | 2 +- ndiff/scripts/ndiff | 2 +- nmap-os-db | 8 +- nmap-payloads | 4 +- nmap-protocols | 2 +- nmap-service-probes | 10 +- nmap-services | 2 +- nmap-update/nmap-update.c | 2 +- nmap.cc | 2 +- nmap.spec.in | 6 +- nmap_tty.cc | 2 +- nping/Makefile.in | 2 +- nping/docs/nping-man.xml | 30 +- nping/docs/nping-usage.txt | 2 +- nping/docs/nping.1 | 30 +- nping/nping-dev/NpingCommandLine.txt | 2 +- nping/nping-dev/echo_proposal.txt | 4 +- nping/nping.h | 2 +- nping/nping.spec | 4 +- nping/nping_winconfig.h | 2 +- nse_fs.cc | 2 +- nselib/afp.lua | 2 +- nselib/amqp.lua | 2 +- nselib/asn1.lua | 2 +- nselib/base32.lua | 2 +- nselib/base64.lua | 2 +- nselib/bitcoin.lua | 2 +- nselib/bittorrent.lua | 2 +- nselib/brute.lua | 2 +- nselib/cassandra.lua | 2 +- nselib/comm.lua | 2 +- nselib/creds.lua | 2 +- nselib/cvs.lua | 2 +- nselib/data/http-fingerprints.lua | 2 +- nselib/data/ike-fingerprints.lua | 2 +- nselib/data/jdwp-class/JDWPExecCmd.java | 4 +- nselib/data/jdwp-class/JDWPSystemInfo.java | 4 +- nselib/data/packetdecoders.lua | 2 +- nselib/data/psexec/nmap_service.c | 2 +- nselib/datafiles.lua | 2 +- nselib/dns.lua | 2 +- nselib/dnssd.lua | 2 +- nselib/drda.lua | 2 +- nselib/eap.lua | 2 +- nselib/eigrp.lua | 2 +- nselib/formulas.lua | 2 +- nselib/ftp.lua | 2 +- nselib/giop.lua | 2 +- nselib/http.lua | 4 +- nselib/ike.lua | 2 +- nselib/imap.lua | 2 +- nselib/informix.lua | 2 +- nselib/ipOps.lua | 2 +- nselib/iscsi.lua | 2 +- nselib/jdwp.lua | 2 +- nselib/json.lua | 2 +- nselib/ldap.lua | 2 +- nselib/listop.lua | 2 +- nselib/lpeg-utility.lua | 2 +- nselib/ls.lua | 2 +- nselib/match.lua | 2 +- nselib/mongodb.lua | 4 +- nselib/msrpc.lua | 2 +- nselib/msrpcperformance.lua | 2 +- nselib/mssql.lua | 2 +- nselib/mysql.lua | 2 +- nselib/ncp.lua | 2 +- nselib/netbios.lua | 2 +- nselib/nmap.luadoc | 2 +- nselib/nrpc.lua | 2 +- nselib/nsedebug.lua | 2 +- nselib/omp2.lua | 2 +- nselib/openssl.luadoc | 2 +- nselib/ospf.lua | 2 +- nselib/packet.lua | 2 +- nselib/pgsql.lua | 2 +- nselib/pop3.lua | 2 +- nselib/proxy.lua | 2 +- nselib/rdp.lua | 2 +- nselib/rmi.lua | 2 +- nselib/rpc.lua | 2 +- nselib/rtsp.lua | 2 +- nselib/sasl.lua | 2 +- nselib/shortport.lua | 2 +- nselib/sip.lua | 2 +- nselib/smb.lua | 2 +- nselib/smtp.lua | 2 +- nselib/snmp.lua | 2 +- nselib/srvloc.lua | 2 +- nselib/ssh1.lua | 2 +- nselib/ssh2.lua | 2 +- nselib/stdnse.lua | 2 +- nselib/strbuf.lua | 2 +- nselib/strict.lua | 2 +- nselib/tab.lua | 2 +- nselib/target.lua | 2 +- nselib/tftp.lua | 2 +- nselib/tns.lua | 2 +- nselib/unicode.lua | 2 +- nselib/unittest.lua | 2 +- nselib/unpwdb.lua | 2 +- nselib/vnc.lua | 2 +- nselib/vulns.lua | 2 +- nselib/wsdd.lua | 2 +- nselib/xmpp.lua | 2 +- nsock/tests/Makefile.in | 2 +- nsock/tests/basic.c | 2 +- nsock/tests/cancel.c | 2 +- nsock/tests/connect.c | 2 +- nsock/tests/ghheaps.c | 2 +- nsock/tests/ghlists.c | 2 +- nsock/tests/logs.c | 2 +- nsock/tests/run_tests.sh | 2 +- nsock/tests/test-common.h | 2 +- nsock/tests/tests_main.c | 2 +- nsock/tests/timer.c | 2 +- osscan.cc | 2 +- osscan.h | 2 +- osscan2.cc | 2 +- scan_engine_raw.cc | 2 +- scripts/acarsd-info.nse | 2 +- scripts/address-info.nse | 2 +- scripts/afp-brute.nse | 2 +- scripts/afp-ls.nse | 2 +- scripts/afp-path-vuln.nse | 2 +- scripts/afp-serverinfo.nse | 2 +- scripts/afp-showmount.nse | 2 +- scripts/ajp-auth.nse | 2 +- scripts/ajp-brute.nse | 2 +- scripts/ajp-headers.nse | 2 +- scripts/ajp-methods.nse | 6 +- scripts/ajp-request.nse | 2 +- scripts/allseeingeye-info.nse | 2 +- scripts/amqp-info.nse | 2 +- scripts/asn-query.nse | 2 +- scripts/auth-owners.nse | 2 +- scripts/auth-spoof.nse | 2 +- scripts/backorifice-brute.nse | 2 +- scripts/backorifice-info.nse | 2 +- scripts/bacnet-info.nse | 2 +- scripts/banner.nse | 2 +- scripts/bitcoin-getaddr.nse | 2 +- scripts/bitcoin-info.nse | 2 +- scripts/bitcoinrpc-info.nse | 2 +- scripts/bittorrent-discovery.nse | 2 +- scripts/broadcast-ataoe-discover.nse | 2 +- scripts/broadcast-avahi-dos.nse | 2 +- scripts/broadcast-bjnp-discover.nse | 2 +- scripts/broadcast-db2-discover.nse | 2 +- scripts/broadcast-dhcp-discover.nse | 2 +- scripts/broadcast-dhcp6-discover.nse | 2 +- scripts/broadcast-dns-service-discovery.nse | 2 +- scripts/broadcast-dropbox-listener.nse | 2 +- scripts/broadcast-eigrp-discovery.nse | 2 +- scripts/broadcast-igmp-discovery.nse | 2 +- scripts/broadcast-listener.nse | 2 +- scripts/broadcast-ms-sql-discover.nse | 2 +- scripts/broadcast-netbios-master-browser.nse | 2 +- scripts/broadcast-networker-discover.nse | 2 +- scripts/broadcast-novell-locate.nse | 2 +- scripts/broadcast-pc-anywhere.nse | 2 +- scripts/broadcast-pc-duo.nse | 2 +- scripts/broadcast-pim-discovery.nse | 2 +- scripts/broadcast-ping.nse | 2 +- scripts/broadcast-pppoe-discover.nse | 2 +- scripts/broadcast-rip-discover.nse | 2 +- scripts/broadcast-ripng-discover.nse | 2 +- scripts/broadcast-sybase-asa-discover.nse | 2 +- scripts/broadcast-tellstick-discover.nse | 2 +- scripts/broadcast-upnp-info.nse | 2 +- scripts/broadcast-versant-locate.nse | 2 +- scripts/broadcast-wake-on-lan.nse | 2 +- scripts/broadcast-wpad-discover.nse | 2 +- scripts/broadcast-wsdd-discover.nse | 2 +- scripts/broadcast-xdmcp-discover.nse | 2 +- scripts/cassandra-brute.nse | 2 +- scripts/cassandra-info.nse | 2 +- scripts/citrix-brute-xml.nse | 2 +- scripts/citrix-enum-apps-xml.nse | 2 +- scripts/citrix-enum-apps.nse | 2 +- scripts/citrix-enum-servers-xml.nse | 2 +- scripts/citrix-enum-servers.nse | 2 +- scripts/couchdb-databases.nse | 2 +- scripts/couchdb-stats.nse | 2 +- scripts/creds-summary.nse | 2 +- scripts/cups-info.nse | 2 +- scripts/cups-queue-info.nse | 2 +- scripts/cvs-brute-repository.nse | 2 +- scripts/cvs-brute.nse | 2 +- scripts/daap-get-library.nse | 2 +- scripts/daytime.nse | 2 +- scripts/db2-das-info.nse | 2 +- scripts/dhcp-discover.nse | 2 +- scripts/dict-info.nse | 2 +- scripts/distcc-cve2004-2687.nse | 2 +- scripts/dns-blacklist.nse | 2 +- scripts/dns-brute.nse | 2 +- scripts/dns-cache-snoop.nse | 2 +- scripts/dns-check-zone.nse | 2 +- scripts/dns-client-subnet-scan.nse | 2 +- scripts/dns-fuzz.nse | 2 +- scripts/dns-ip6-arpa-scan.nse | 2 +- scripts/dns-nsec-enum.nse | 2 +- scripts/dns-nsec3-enum.nse | 2 +- scripts/dns-nsid.nse | 2 +- scripts/dns-random-srcport.nse | 2 +- scripts/dns-random-txid.nse | 2 +- scripts/dns-recursion.nse | 2 +- scripts/dns-service-discovery.nse | 2 +- scripts/dns-srv-enum.nse | 2 +- scripts/dns-update.nse | 2 +- scripts/dns-zeustracker.nse | 2 +- scripts/dns-zone-transfer.nse | 2 +- scripts/docker-version.nse | 2 +- scripts/domcon-brute.nse | 2 +- scripts/domcon-cmd.nse | 2 +- scripts/domino-enum-users.nse | 2 +- scripts/dpap-brute.nse | 2 +- scripts/drda-brute.nse | 2 +- scripts/drda-info.nse | 2 +- scripts/duplicates.nse | 2 +- scripts/eap-info.nse | 2 +- scripts/enip-info.nse | 2 +- scripts/epmd-info.nse | 2 +- scripts/eppc-enum-processes.nse | 2 +- scripts/fcrdns.nse | 2 +- scripts/finger.nse | 2 +- scripts/firewalk.nse | 2 +- scripts/firewall-bypass.nse | 2 +- scripts/flume-master-info.nse | 2 +- scripts/freelancer-info.nse | 2 +- scripts/ftp-anon.nse | 2 +- scripts/ftp-bounce.nse | 2 +- scripts/ftp-brute.nse | 2 +- scripts/ftp-libopie.nse | 4 +- scripts/ftp-proftpd-backdoor.nse | 2 +- scripts/ftp-vsftpd-backdoor.nse | 2 +- scripts/ftp-vuln-cve2010-4221.nse | 2 +- scripts/ganglia-info.nse | 2 +- scripts/giop-info.nse | 2 +- scripts/gkrellm-info.nse | 2 +- scripts/gopher-ls.nse | 2 +- scripts/gpsd-info.nse | 2 +- scripts/hadoop-datanode-info.nse | 2 +- scripts/hadoop-jobtracker-info.nse | 2 +- scripts/hadoop-namenode-info.nse | 2 +- scripts/hadoop-secondary-namenode-info.nse | 2 +- scripts/hadoop-tasktracker-info.nse | 2 +- scripts/hbase-master-info.nse | 2 +- scripts/hbase-region-info.nse | 2 +- scripts/hddtemp-info.nse | 2 +- scripts/hnap-info.nse | 2 +- scripts/hostmap-bfk.nse | 2 +- scripts/hostmap-ip2hosts.nse | 2 +- scripts/hostmap-robtex.nse | 2 +- scripts/http-adobe-coldfusion-apsa1301.nse | 2 +- scripts/http-affiliate-id.nse | 2 +- scripts/http-apache-negotiation.nse | 2 +- scripts/http-auth-finder.nse | 2 +- scripts/http-auth.nse | 2 +- scripts/http-avaya-ipoffice-users.nse | 2 +- scripts/http-awstatstotals-exec.nse | 2 +- scripts/http-axis2-dir-traversal.nse | 2 +- scripts/http-backup-finder.nse | 2 +- scripts/http-barracuda-dir-traversal.nse | 2 +- scripts/http-brute.nse | 2 +- scripts/http-cakephp-version.nse | 2 +- scripts/http-chrono.nse | 2 +- scripts/http-cisco-anyconnect.nse | 2 +- scripts/http-coldfusion-subzero.nse | 2 +- scripts/http-comments-displayer.nse | 2 +- scripts/http-config-backup.nse | 2 +- scripts/http-cors.nse | 2 +- scripts/http-cross-domain-policy.nse | 2 +- scripts/http-csrf.nse | 2 +- scripts/http-date.nse | 2 +- scripts/http-default-accounts.nse | 2 +- scripts/http-devframework.nse | 2 +- scripts/http-dlink-backdoor.nse | 2 +- scripts/http-dombased-xss.nse | 2 +- scripts/http-domino-enum-passwords.nse | 2 +- scripts/http-drupal-enum-users.nse | 2 +- scripts/http-drupal-enum.nse | 2 +- scripts/http-enum.nse | 2 +- scripts/http-errors.nse | 2 +- scripts/http-exif-spider.nse | 2 +- scripts/http-favicon.nse | 2 +- scripts/http-feed.nse | 2 +- scripts/http-fetch.nse | 2 +- scripts/http-fileupload-exploiter.nse | 2 +- scripts/http-form-brute.nse | 2 +- scripts/http-form-fuzzer.nse | 2 +- scripts/http-frontpage-login.nse | 2 +- scripts/http-generator.nse | 2 +- scripts/http-git.nse | 2 +- scripts/http-gitweb-projects-enum.nse | 2 +- scripts/http-google-malware.nse | 2 +- scripts/http-grep.nse | 2 +- scripts/http-headers.nse | 2 +- scripts/http-huawei-hg5xx-vuln.nse | 2 +- scripts/http-icloud-findmyiphone.nse | 2 +- scripts/http-icloud-sendmsg.nse | 2 +- scripts/http-iis-short-name-brute.nse | 2 +- scripts/http-iis-webdav-vuln.nse | 4 +- scripts/http-joomla-brute.nse | 4 +- .../http-litespeed-sourcecode-download.nse | 2 +- scripts/http-ls.nse | 2 +- scripts/http-majordomo2-dir-traversal.nse | 2 +- scripts/http-malware-host.nse | 2 +- scripts/http-method-tamper.nse | 2 +- scripts/http-methods.nse | 2 +- scripts/http-mobileversion-checker.nse | 2 +- scripts/http-ntlm-info.nse | 2 +- scripts/http-open-proxy.nse | 2 +- scripts/http-open-redirect.nse | 2 +- scripts/http-passwd.nse | 2 +- scripts/http-php-version.nse | 2 +- scripts/http-phpmyadmin-dir-traversal.nse | 2 +- scripts/http-phpself-xss.nse | 2 +- scripts/http-proxy-brute.nse | 2 +- scripts/http-put.nse | 2 +- scripts/http-qnap-nas-info.nse | 2 +- scripts/http-referer-checker.nse | 2 +- scripts/http-rfi-spider.nse | 2 +- scripts/http-robots.txt.nse | 2 +- scripts/http-robtex-reverse-ip.nse | 2 +- scripts/http-robtex-shared-ns.nse | 2 +- scripts/http-server-header.nse | 2 +- scripts/http-shellshock.nse | 2 +- scripts/http-sitemap-generator.nse | 2 +- scripts/http-slowloris-check.nse | 2 +- scripts/http-slowloris.nse | 2 +- scripts/http-sql-injection.nse | 2 +- scripts/http-stored-xss.nse | 2 +- scripts/http-svn-enum.nse | 2 +- scripts/http-svn-info.nse | 2 +- scripts/http-title.nse | 2 +- scripts/http-tplink-dir-traversal.nse | 2 +- scripts/http-trace.nse | 2 +- scripts/http-traceroute.nse | 2 +- scripts/http-unsafe-output-escaping.nse | 2 +- scripts/http-useragent-tester.nse | 2 +- scripts/http-userdir-enum.nse | 2 +- scripts/http-vhosts.nse | 2 +- scripts/http-virustotal.nse | 2 +- scripts/http-vlcstreamer-ls.nse | 2 +- scripts/http-vmware-path-vuln.nse | 2 +- scripts/http-vuln-cve2006-3392.nse | 2 +- scripts/http-vuln-cve2009-3960.nse | 2 +- scripts/http-vuln-cve2010-0738.nse | 2 +- scripts/http-vuln-cve2010-2861.nse | 2 +- scripts/http-vuln-cve2011-3192.nse | 2 +- scripts/http-vuln-cve2011-3368.nse | 2 +- scripts/http-vuln-cve2012-1823.nse | 2 +- scripts/http-vuln-cve2013-0156.nse | 2 +- scripts/http-vuln-cve2013-7091.nse | 2 +- scripts/http-vuln-cve2014-2126.nse | 2 +- scripts/http-vuln-cve2014-2127.nse | 2 +- scripts/http-vuln-cve2014-2128.nse | 2 +- scripts/http-vuln-cve2014-2129.nse | 2 +- scripts/http-vuln-cve2015-1427.nse | 2 +- scripts/http-vuln-cve2015-1635.nse | 2 +- scripts/http-vuln-misfortune-cookie.nse | 2 +- scripts/http-vuln-wnr1000-creds.nse | 2 +- scripts/http-waf-detect.nse | 2 +- scripts/http-waf-fingerprint.nse | 2 +- scripts/http-webdav-scan.nse | 2 +- scripts/http-wordpress-brute.nse | 2 +- scripts/http-wordpress-enum.nse | 2 +- scripts/http-wordpress-users.nse | 2 +- scripts/http-xssed.nse | 2 +- scripts/iax2-brute.nse | 2 +- scripts/iax2-version.nse | 2 +- scripts/icap-info.nse | 2 +- scripts/ike-version.nse | 2 +- scripts/imap-brute.nse | 2 +- scripts/imap-capabilities.nse | 2 +- scripts/informix-brute.nse | 2 +- scripts/informix-query.nse | 2 +- scripts/informix-tables.nse | 2 +- scripts/ip-forwarding.nse | 2 +- scripts/ip-geolocation-geobytes.nse | 2 +- scripts/ip-geolocation-geoplugin.nse | 2 +- scripts/ip-geolocation-ipinfodb.nse | 2 +- scripts/ip-geolocation-maxmind.nse | 2 +- scripts/ip-https-discover.nse | 2 +- scripts/ipidseq.nse | 2 +- scripts/ipv6-ra-flood.nse | 2 +- scripts/irc-botnet-channels.nse | 2 +- scripts/irc-brute.nse | 2 +- scripts/irc-info.nse | 2 +- scripts/irc-sasl-brute.nse | 2 +- scripts/irc-unrealircd-backdoor.nse | 2 +- scripts/iscsi-brute.nse | 2 +- scripts/iscsi-info.nse | 2 +- scripts/isns-info.nse | 2 +- scripts/jdwp-exec.nse | 2 +- scripts/jdwp-info.nse | 2 +- scripts/jdwp-inject.nse | 2 +- scripts/jdwp-version.nse | 2 +- scripts/knx-gateway-discover.nse | 2 +- scripts/knx-gateway-info.nse | 2 +- scripts/krb5-enum-users.nse | 2 +- scripts/ldap-brute.nse | 2 +- scripts/ldap-novell-getpass.nse | 2 +- scripts/ldap-rootdse.nse | 2 +- scripts/ldap-search.nse | 2 +- scripts/lexmark-config.nse | 2 +- scripts/llmnr-resolve.nse | 2 +- scripts/lltd-discovery.nse | 2 +- scripts/maxdb-info.nse | 2 +- scripts/mcafee-epo-agent.nse | 2 +- scripts/membase-brute.nse | 2 +- scripts/membase-http-info.nse | 2 +- scripts/memcached-info.nse | 2 +- scripts/metasploit-info.nse | 2 +- scripts/metasploit-msgrpc-brute.nse | 2 +- scripts/metasploit-xmlrpc-brute.nse | 2 +- scripts/mikrotik-routeros-brute.nse | 2 +- scripts/mmouse-brute.nse | 2 +- scripts/modbus-discover.nse | 2 +- scripts/mongodb-brute.nse | 2 +- scripts/mongodb-databases.nse | 2 +- scripts/mongodb-info.nse | 2 +- scripts/mrinfo.nse | 2 +- scripts/ms-sql-brute.nse | 2 +- scripts/ms-sql-config.nse | 2 +- scripts/ms-sql-dac.nse | 2 +- scripts/ms-sql-dump-hashes.nse | 2 +- scripts/ms-sql-empty-password.nse | 2 +- scripts/ms-sql-hasdbaccess.nse | 2 +- scripts/ms-sql-info.nse | 2 +- scripts/ms-sql-query.nse | 2 +- scripts/ms-sql-tables.nse | 2 +- scripts/ms-sql-xp-cmdshell.nse | 2 +- scripts/msrpc-enum.nse | 2 +- scripts/mtrace.nse | 2 +- scripts/murmur-version.nse | 2 +- scripts/mysql-audit.nse | 2 +- scripts/mysql-brute.nse | 2 +- scripts/mysql-databases.nse | 2 +- scripts/mysql-dump-hashes.nse | 2 +- scripts/mysql-empty-password.nse | 2 +- scripts/mysql-enum.nse | 2 +- scripts/mysql-info.nse | 2 +- scripts/mysql-query.nse | 2 +- scripts/mysql-users.nse | 2 +- scripts/mysql-variables.nse | 2 +- scripts/mysql-vuln-cve2012-2122.nse | 2 +- scripts/nat-pmp-info.nse | 2 +- scripts/nat-pmp-mapport.nse | 2 +- scripts/nbstat.nse | 2 +- scripts/ncp-enum-users.nse | 2 +- scripts/ncp-serverinfo.nse | 2 +- scripts/ndmp-fs-info.nse | 2 +- scripts/ndmp-version.nse | 2 +- scripts/nessus-brute.nse | 2 +- scripts/nessus-xmlrpc-brute.nse | 2 +- scripts/netbus-auth-bypass.nse | 2 +- scripts/netbus-brute.nse | 2 +- scripts/netbus-info.nse | 2 +- scripts/netbus-version.nse | 2 +- scripts/nexpose-brute.nse | 2 +- scripts/nfs-ls.nse | 2 +- scripts/nfs-showmount.nse | 2 +- scripts/nfs-statfs.nse | 2 +- scripts/nping-brute.nse | 4 +- scripts/nrpe-enum.nse | 2 +- scripts/ntp-info.nse | 2 +- scripts/ntp-monlist.nse | 2 +- scripts/omp2-brute.nse | 2 +- scripts/omp2-enum-targets.nse | 2 +- scripts/omron-info.nse | 2 +- scripts/openlookup-info.nse | 2 +- scripts/openvas-otp-brute.nse | 2 +- scripts/oracle-brute-stealth.nse | 2 +- scripts/oracle-brute.nse | 2 +- scripts/oracle-enum-users.nse | 2 +- scripts/oracle-sid-brute.nse | 2 +- scripts/ovs-agent-version.nse | 2 +- scripts/p2p-conficker.nse | 2 +- scripts/path-mtu.nse | 2 +- scripts/pcanywhere-brute.nse | 2 +- scripts/pgsql-brute.nse | 2 +- scripts/pjl-ready-message.nse | 2 +- scripts/pop3-brute.nse | 2 +- scripts/pop3-capabilities.nse | 2 +- scripts/pptp-version.nse | 2 +- scripts/qconn-exec.nse | 2 +- scripts/qscan.nse | 2 +- scripts/quake1-info.nse | 2 +- scripts/quake3-info.nse | 2 +- scripts/quake3-master-getservers.nse | 2 +- scripts/rdp-enum-encryption.nse | 2 +- scripts/rdp-vuln-ms12-020.nse | 2 +- scripts/realvnc-auth-bypass.nse | 2 +- scripts/redis-brute.nse | 2 +- scripts/redis-info.nse | 2 +- scripts/resolveall.nse | 2 +- scripts/reverse-index.nse | 2 +- scripts/rexec-brute.nse | 2 +- scripts/rfc868-time.nse | 2 +- scripts/riak-http-info.nse | 2 +- scripts/rlogin-brute.nse | 2 +- scripts/rmi-dumpregistry.nse | 2 +- scripts/rmi-vuln-classloader.nse | 2 +- scripts/rpc-grind.nse | 2 +- scripts/rpcap-brute.nse | 2 +- scripts/rpcap-info.nse | 2 +- scripts/rpcinfo.nse | 2 +- scripts/rsync-brute.nse | 2 +- scripts/rsync-list-modules.nse | 2 +- scripts/rtsp-methods.nse | 2 +- scripts/rtsp-url-brute.nse | 2 +- scripts/s7-info.nse | 2 +- scripts/samba-vuln-cve-2012-1182.nse | 2 +- scripts/script.db | 48 --- scripts/servicetags.nse | 2 +- scripts/sip-brute.nse | 2 +- scripts/sip-call-spoof.nse | 2 +- scripts/sip-enum-users.nse | 2 +- scripts/sip-methods.nse | 2 +- scripts/skypev2-version.nse | 2 +- scripts/smb-brute.nse | 2 +- scripts/smb-enum-domains.nse | 2 +- scripts/smb-enum-groups.nse | 2 +- scripts/smb-enum-processes.nse | 2 +- scripts/smb-enum-sessions.nse | 2 +- scripts/smb-enum-shares.nse | 2 +- scripts/smb-enum-users.nse | 2 +- scripts/smb-flood.nse | 2 +- scripts/smb-ls.nse | 2 +- scripts/smb-mbenum.nse | 2 +- scripts/smb-os-discovery.nse | 2 +- scripts/smb-print-text.nse | 2 +- scripts/smb-psexec.nse | 4 +- scripts/smb-security-mode.nse | 2 +- scripts/smb-server-stats.nse | 2 +- scripts/smb-system-info.nse | 2 +- scripts/smb-vuln-conficker.nse | 2 +- scripts/smb-vuln-cve2009-3103.nse | 2 +- scripts/smb-vuln-ms06-025.nse | 2 +- scripts/smb-vuln-ms07-029.nse | 2 +- scripts/smb-vuln-ms08-067.nse | 2 +- scripts/smb-vuln-ms10-054.nse | 2 +- scripts/smb-vuln-ms10-061.nse | 2 +- scripts/smb-vuln-regsvc-dos.nse | 2 +- scripts/smbv2-enabled.nse | 2 +- scripts/smtp-brute.nse | 2 +- scripts/smtp-commands.nse | 2 +- scripts/smtp-enum-users.nse | 2 +- scripts/smtp-open-relay.nse | 2 +- scripts/smtp-strangeport.nse | 2 +- scripts/smtp-vuln-cve2010-4344.nse | 2 +- scripts/smtp-vuln-cve2011-1720.nse | 2 +- scripts/smtp-vuln-cve2011-1764.nse | 2 +- scripts/sniffer-detect.nse | 2 +- scripts/snmp-brute.nse | 2 +- scripts/snmp-hh3c-logins.nse | 2 +- scripts/snmp-info.nse | 2 +- scripts/snmp-interfaces.nse | 2 +- scripts/snmp-ios-config.nse | 2 +- scripts/snmp-netstat.nse | 2 +- scripts/snmp-processes.nse | 2 +- scripts/snmp-sysdescr.nse | 2 +- scripts/snmp-win32-services.nse | 2 +- scripts/snmp-win32-shares.nse | 2 +- scripts/snmp-win32-software.nse | 2 +- scripts/snmp-win32-users.nse | 2 +- scripts/socks-auth-info.nse | 2 +- scripts/socks-brute.nse | 2 +- scripts/socks-open-proxy.nse | 2 +- scripts/ssh-hostkey.nse | 2 +- scripts/ssh2-enum-algos.nse | 2 +- scripts/sshv1.nse | 2 +- scripts/ssl-ccs-injection.nse | 4 +- scripts/ssl-cert.nse | 2 +- scripts/ssl-date.nse | 2 +- scripts/ssl-enum-ciphers.nse | 2 +- scripts/ssl-google-cert-catalog.nse | 2 +- scripts/ssl-heartbleed.nse | 4 +- scripts/ssl-known-key.nse | 2 +- scripts/ssl-poodle.nse | 2 +- scripts/sslv2.nse | 2 +- scripts/stun-info.nse | 2 +- scripts/stun-version.nse | 2 +- scripts/stuxnet-detect.nse | 2 +- scripts/supermicro-ipmi-conf.nse | 2 +- scripts/svn-brute.nse | 2 +- scripts/targets-asn.nse | 2 +- scripts/targets-ipv6-map4to6.nse | 2 +- scripts/targets-ipv6-multicast-echo.nse | 2 +- .../targets-ipv6-multicast-invalid-dst.nse | 2 +- scripts/targets-ipv6-multicast-mld.nse | 2 +- scripts/targets-ipv6-multicast-slaac.nse | 2 +- scripts/targets-ipv6-wordlist.nse | 2 +- scripts/targets-sniffer.nse | 2 +- scripts/targets-traceroute.nse | 2 +- scripts/teamspeak2-version.nse | 2 +- scripts/telnet-brute.nse | 2 +- scripts/telnet-encryption.nse | 2 +- scripts/tftp-enum.nse | 2 +- scripts/tls-nextprotoneg.nse | 2 +- scripts/tor-consensus-checker.nse | 2 +- scripts/traceroute-geolocation.nse | 2 +- scripts/unittest.nse | 2 +- scripts/unusual-port.nse | 2 +- scripts/upnp-info.nse | 2 +- scripts/url-snarf.nse | 2 +- scripts/ventrilo-info.nse | 2 +- scripts/versant-info.nse | 2 +- scripts/vmauthd-brute.nse | 2 +- scripts/vnc-brute.nse | 2 +- scripts/vnc-info.nse | 2 +- scripts/voldemort-info.nse | 2 +- scripts/vuze-dht-info.nse | 2 +- scripts/wdb-version.nse | 2 +- scripts/weblogic-t3-info.nse | 2 +- scripts/whois-domain.nse | 2 +- scripts/whois-ip.nse | 2 +- scripts/wsdd-discover.nse | 2 +- scripts/x11-access.nse | 2 +- scripts/xdmcp-discover.nse | 2 +- scripts/xmlrpc-methods.nse | 2 +- scripts/xmpp-brute.nse | 2 +- scripts/xmpp-info.nse | 2 +- todo/done.txt | 62 +-- todo/nmap.txt | 10 +- todo/nping.txt | 6 +- zenmap.spec.in | 6 +- zenmap/COPYING | 2 +- zenmap/README | 2 +- zenmap/setup.py | 2 +- zenmap/share/zenmap/docs/help.html | 4 +- zenmap/share/zenmap/locale/de.po | 4 +- .../zenmap/locale/de/LC_MESSAGES/zenmap.mo | Bin 58751 -> 58753 bytes zenmap/share/zenmap/locale/fr.po | 4 +- .../zenmap/locale/fr/LC_MESSAGES/zenmap.mo | Bin 58440 -> 58442 bytes zenmap/share/zenmap/locale/hi.po | 2 +- .../zenmap/locale/hi/LC_MESSAGES/zenmap.mo | Bin 79717 -> 79718 bytes zenmap/share/zenmap/locale/hr.po | 4 +- .../zenmap/locale/hr/LC_MESSAGES/zenmap.mo | Bin 24046 -> 20322 bytes zenmap/share/zenmap/locale/it.po | 4 +- .../zenmap/locale/it/LC_MESSAGES/zenmap.mo | Bin 57699 -> 57701 bytes zenmap/share/zenmap/locale/ja.po | 4 +- .../zenmap/locale/ja/LC_MESSAGES/zenmap.mo | Bin 62296 -> 60838 bytes zenmap/share/zenmap/locale/pl.po | 2 +- .../zenmap/locale/pl/LC_MESSAGES/zenmap.mo | Bin 57119 -> 57120 bytes zenmap/share/zenmap/locale/pt_BR.po | 2 +- .../zenmap/locale/pt_BR/LC_MESSAGES/zenmap.mo | Bin 5063 -> 4814 bytes zenmap/share/zenmap/locale/ru.po | 2 +- .../zenmap/locale/ru/LC_MESSAGES/zenmap.mo | Bin 26565 -> 25379 bytes zenmap/share/zenmap/locale/zh.po | 4 +- .../zenmap/locale/zh/LC_MESSAGES/zenmap.mo | Bin 50454 -> 50456 bytes zenmap/zenmapCore/Name.py | 8 +- zenmap/zenmapCore/ScriptMetadata.py | 2 +- zenmap/zenmapGUI/BugReport.py | 2 +- 722 files changed, 1345 insertions(+), 1405 deletions(-) diff --git a/CHANGELOG b/CHANGELOG index 0862b2d87..dd15bf5c2 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -319,7 +319,7 @@ o All nmap.org pages are now available SSL-secured to improve privacy binaries as well: https://nmap.org/book/install.html#inst-integrity o [NSE] Added 25 NSE scripts from 17 authors, bringing the total up to 494! - They are all listed at http://nmap.org/nsedoc/, and the summaries are below + They are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors are listed in brackets): + bacnet-info gets device information from SCADA/ICS devices via BACnet @@ -648,7 +648,7 @@ o [NSE] Convert many more scripts to emit structured XML output (https://nmap.org/book/nse-api.html#nse-structured-output) [Daniel Miller] o [NSE] Added 24 NSE scripts from 12 authors, bringing the total up to 470. - They are all listed at http://nmap.org/nsedoc/, and the summaries are + They are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors are listed in brackets): + allseeingeye-info gathers information from games using this query protocol. @@ -823,7 +823,7 @@ Nmap 6.40 [2013-07-29] o [Ncat] Added --lua-exec. This feature is basically the equivalent of 'ncat --sh-exec "lua "' and allows you to run Lua scripts with Ncat, redirecting all stdin and stdout operations to the socket connection. See - http://nmap.org/book/ncat-man-command-options.html [Jacek Wielemborek] + https://nmap.org/book/ncat-man-command-options.html [Jacek Wielemborek] o Integrated all of your IPv4 OS fingerprint submissions since January (1,300 of them). Added 91 fingerprints, bringing the new total to 4,118. @@ -840,7 +840,7 @@ o Integrated all of your service/version detection fingerprints submitted o Integrated your latest IPv6 OS submissions and corrections. We're still low on IPv6 fingerprints, so please scan any IPv6 systems you own or - administer and submit them to http://nmap.org/submit/. Both new + administer and submit them to https://nmap.org/submit/. Both new fingerprints (if Nmap doesn't find a good match) and corrections (if Nmap guesses wrong) are useful. [David Fifield] @@ -854,7 +854,7 @@ o [Nsock] Added initial proxy support to Nsock. Nmap version detection described in the man page. [Henri Doreau] o [NSE] Added 14 NSE scripts from 6 authors, bringing the total up to 446. - They are all listed at http://nmap.org/nsedoc/, and the summaries are + They are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors are listed in brackets): + hostmap-ip2hosts finds hostnames that resolve to the target's IP address @@ -1197,7 +1197,7 @@ o Integrated all of your service/version detection fingerprints o Integrated your latest IPv6 OS submissions and corrections. We're still low on IPv6 fingerprints, so please scan any IPv6 systems you - own or administer and submit them to http://nmap.org/submit/. Both + own or administer and submit them to https://nmap.org/submit/. Both new fingerprints (if Nmap doesn't find a good match) and corrections (if Nmap guesses wrong) are useful. @@ -1209,7 +1209,7 @@ o Scripts can now return a structured name-value table so that results are query-able from XML output. Scripts can return a string as before, or a table, or a table and a string. In this last case, the table will go to XML output and the string will go to screen output. - See http://nmap.org/book/nse-api.html#nse-structured-output [Daniel + See https://nmap.org/book/nse-api.html#nse-structured-output [Daniel Miller, David Fifield, Patrick Donnelly] o [Nsock] Added new poll and kqueue I/O engines for improved @@ -1228,7 +1228,7 @@ o Moved some Windows dependencies, including OpenSSL, libsvn, and the reduces the bandwidth and storage required for an svn checkout. Folks who build Nmap on Windows will need to check out /nmap-mswin32-aux along with /nmap as described at - http://nmap.org/book/inst-windows.html#inst-win-source. + https://nmap.org/book/inst-windows.html#inst-win-source. o Many of the great features in this release were created by college and grad students generously sponsored by Google's Summer of Code @@ -1248,7 +1248,7 @@ o Updated our Nmap Scripting Engine to use Lua 5.2 (and then 5.2.1) details. [Patrick Donnelly] o [NSE] Added 85(!) NSE scripts, bringing the total up to 433. They - are all listed at http://nmap.org/nsedoc/, and the summaries are + are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors are listed in brackets): + ajp-auth retrieves the authentication scheme and realm of an AJP @@ -1941,7 +1941,7 @@ Nmap 6.00 [2012-05-21] o Most important release since Nmap 5.00 in July 2009! For a list of the most significant improvements and new features, see the - announcement at: http://nmap.org/6 + announcement at: https://nmap.org/6 o In XML output, "osclass" elements are now child elements of the "osmatch" they belong to. Old output was thus: @@ -2049,7 +2049,7 @@ o Integrated all of your service/version detection fingerprints o Integrated your latest IPv6 OS submissions and corrections. We're still low on IPv6 fingerprints, so please scan any IPv6 systems you - own or administer and submit them to http://nmap.org/submit/. Both + own or administer and submit them to https://nmap.org/submit/. Both new fingerprints (if Nmap doesn't find a good match) and corrections (if Nmap guesses wrong) are useful. @@ -2058,7 +2058,7 @@ o [NSE] Added a host-based registry which only persists (for the given registry saves information until it is deleted or the Nmap scan ends. That is a waste of memory for information which doesn't need to persist that long. Use the host based registry instead if you - can. See http://nmap.org/book/nse-api.html#nse-api-registry. [Patrik + can. See https://nmap.org/book/nse-api.html#nse-api-registry. [Patrik Karlsson] o IPv6 OS detection now includes a novelty detection system which @@ -2076,7 +2076,7 @@ o Refactored the nsock library to add the nsock-engines system. This specific Nsock IO engine. [Henri Doreau] o [NSE] Added 43(!) NSE scripts, bringing the total up to 340. They - are all listed at http://nmap.org/nsedoc/, and the summaries are + are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors are listed in brackets): + acarsd-info retrieves information from a listening acarsd @@ -2261,7 +2261,7 @@ o CPE (Common Platform Enumeration) OS classification is now supported o [NSE] The host.os table is now a structured array of table that include OS class information and CPE. See - http://nmap.org/book/nse-api.html for documentation of the new + https://nmap.org/book/nse-api.html for documentation of the new structure. [Henri Doreau, David] o [NSE] Service matches can now access CPE through the @@ -2400,14 +2400,14 @@ o [NSE] Added a new httpspider library which is used for recursively crawling web sites for information. New scripts using this functionality include http-backup-finder, http-email-harvest, http-grep, http-open-redirect, and http-unsafe-output-escaping. See - http://nmap.org/nsedoc/ or the list later in this file for details + https://nmap.org/nsedoc/ or the list later in this file for details on these. [Patrik] o Our Mac OS X packages are now x86-only (rather than universal), reducing the download size from 30 MB to about 17. If you still need a PowerPC version (Apple stopped selling those machines in 2006), you can use Nmap 5.51 or 5.61TEST2 from - http://nmap.org/dist/?C=M&O=D. + https://nmap.org/dist/?C=M&O=D. o We set up a new SVN server for the Nmap codebase. This one uses SSL for better security, WebDAV rather than svnserve for greater @@ -2433,11 +2433,11 @@ o [NSE] Added a new script force feature. You can force scripts to run against target ports (even if the "wrong" service is detected) by placing a plus in front of the script name passed to --script. See - http://nmap.org/book/nse-usage.html#nse-script-selection. [Martin + https://nmap.org/book/nse-usage.html#nse-script-selection. [Martin Swende] o [NSE] Added 51(!) NSE scripts, bringing the total up to 297. They - are all listed at http://nmap.org/nsedoc/, and the summaries are + are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors listed in brackets): + amqp-info gathers information (a list of all server properties) @@ -2805,11 +2805,11 @@ o Added IPv6 OS detection system! The new system utilizes many tests you are certain that you know what the target system is running). Usage and results output are basically the same as with IPv4, but we will soon document the internal mechanisms at - http://nmap.org/book/osdetect.html, just as we have for IPv4. For an + https://nmap.org/book/osdetect.html, just as we have for IPv4. For an example, try "nmap -6 -O scanme.nmap.org". [David, Luis] o [NSE] Added 3 scripts, bringing the total to 246! You can learn - more about them at http://nmap.org/nsedoc/. Here they are (authors + more about them at https://nmap.org/nsedoc/. Here they are (authors listed in brackets): + lltd-discovery uses the Microsoft LLTD protocol to discover hosts @@ -2824,7 +2824,7 @@ o [NSE] Added 3 scripts, bringing the total to 246! You can learn o Improved AIX support for raw scans. This includes some patches originally written by Peter O'Gorman and Florian Schmid. It also involved various build fixes found necessary on AIX 6.1 and 7.1. See - http://nmap.org/book/inst-other-platforms.html . [David] + https://nmap.org/book/inst-other-platforms.html . [David] o Fixed Nmap so that it again compiles and runs on Solaris 10, including IPv6 support. [David] @@ -2833,7 +2833,7 @@ o [NSE] Moved our brute force authentication cracking scripts (*-brute) from the "auth" category into a new "brute" category. Nmap's brute force capabilities have grown tremendously! You can see all 32 of them at - http://nmap.org/nsedoc/categories/brute.html . It isn't clear + https://nmap.org/nsedoc/categories/brute.html . It isn't clear whether dns-brute should be in the brute category, so for now it isn't. [Fyodor] @@ -2880,7 +2880,7 @@ o Integrated your latest (IPv4) OS detection submissions and guess wrong. o [NSE] Added 27 scripts, bringing the total to 243! You can learn - more about any of them at http://nmap.org/nsedoc/. Here are the new + more about any of them at https://nmap.org/nsedoc/. Here are the new ones (authors listed in brackets): + address-info shows extra information about IPv6 addresses, such as @@ -3046,7 +3046,7 @@ o [NSE] Fixed a bug in the ssh2-enum-algos script that would prevent it from displaying any output unless run in debug mode. [Patrik] o [NSE] Added 4 more protocol libraries. You can learn more about any - of them at http://nmap.org/nsedoc/. Here are the new ones (authors + of them at https://nmap.org/nsedoc/. Here are the new ones (authors listed in brackets): + bittorrent supports the BitTorrent file sharing protocol [Gorjan @@ -3225,7 +3225,7 @@ o [NSE] Renamed http-wp-plugins to http-wordpress-plugins script for Nmap 5.59BETA1 [2011-06-30] o [NSE] Added 40 scripts, bringing the total to 217! You can learn - more about any of them at http://nmap.org/nsedoc/. Here are the new + more about any of them at https://nmap.org/nsedoc/. Here are the new ones (authors listed in brackets): + afp-ls: Lists files and their attributes from Apple Filing @@ -3419,7 +3419,7 @@ o Nmap now determines the filesystem location it is being run from and (such as nmap-services). This reduces the likelihood of needing to specify --datadir or getting data files from a different version of Nmap installed on the system. For full details, see - http://nmap.org/book/data-files-replacing-data-files.html . Thanks + https://nmap.org/book/data-files-replacing-data-files.html . Thanks to Solar Designer for implementation advice. [David] o Created a page on our SecWiki for collecting Nmap script ideas! If @@ -3434,7 +3434,7 @@ o The development pace has greatly increased because Google (again) the team: http://seclists.org/nmap-dev/2011/q2/312 o [NSE] Added 7 new protocol libraries, bringing the total to 66. You - can read about them all at http://nmap.org/nsedoc/. Here are the new + can read about them all at https://nmap.org/nsedoc/. Here are the new ones (authors listed in brackets): + creds: Handles storage and retrieval of discovered credentials @@ -3501,7 +3501,7 @@ o [NSE] Added a credential storage library (creds.lua) and modified o [Ncat] Created a portable version of ncat.exe that you can just drop onto Microsoft Windows systems without having to run any installer or copy over extra library files. See the Ncat page - (http://nmap.org/ncat/) for binary downloads and a link to build + (https://nmap.org/ncat/) for binary downloads and a link to build instructions. [Shinnok] o Fix a segmentation fault which could occur when running Nmap on @@ -3679,10 +3679,10 @@ o [Nping] Added echo mode, a novel technique for discovering how your try it out against our public Nping echo server using this command: nping --echo-client "public" echo.nmap.org' Or learn more about echo mode at - http://nmap.org/book/nping-man-echo-mode.html . [Luis] + https://nmap.org/book/nping-man-echo-mode.html . [Luis] o [NSE] Added an amazing 46 scripts, bringing the total to 177! You - can learn more about any of them at http://nmap.org/nsedoc/. Here + can learn more about any of them at https://nmap.org/nsedoc/. Here are the new ones (authors listed in brackets): + broadcast-dns-service-discovery: Attempts to discover hosts' @@ -3916,7 +3916,7 @@ o [NSE] Nmap has two new NSE script scanning phases. The new pre-scan different way. One idea is a reverse index which provides a list of services discovered during a network scan, along with a list of IPs found to be running each service. See - http://nmap.org/book/nse-usage.html#nse-script-types. [Djalal] + https://nmap.org/book/nse-usage.html#nse-script-types. [Djalal] o [NSE] A new --script-help option describes all scripts matching a given specification. It accepts the same specification format as @@ -3937,8 +3937,8 @@ o Dramatically improved nmap.xsl (used for converting Nmap XML output closed/filtered ports are shown or not (they are now hidden by default if Javascript is enabled). Many smaller improvements were made as well. You can find the new - file at http://nmap.org/svn/docs/nmap.xsl, and here is an example - scan processed through it: http://nmap.org/tmp/newxsl.html . [Tom] + file at https://nmap.org/svn/docs/nmap.xsl, and here is an example + scan processed through it: https://nmap.org/tmp/newxsl.html . [Tom] o [NSE] Created a new "broadcast" script category for the broadcast-* scripts. These perform network discovery by broadcasting on the @@ -3963,7 +3963,7 @@ o XML output now excludes output for down hosts when only doing host o Updated the Windows build process to work with (and require) Visual C++ 2010 rather than 2008. If you want to build Zenmap too, you now need Python 2.7 (rather than 2.6) and GTK+ 2.22. See - http://nmap.org/book/inst-windows.html#inst-win-source [David, Rob + https://nmap.org/book/inst-windows.html#inst-win-source [David, Rob Nicholls, KX] o Merged port names in the nmap-services file with allocated names @@ -4013,11 +4013,11 @@ o [NSE] Added the ability to send and receive on unconnected sockets. unconnected UDP sockets. [David, Patrik] o [Nping] Substantially improved the Nping man page. You can read it - online at http://nmap.org/book/nping-man.html . [Luis, David] + online at https://nmap.org/book/nping-man.html . [Luis, David] o Documented the licenses of the third-party software used by Nmap and its sibling tools: - http://nmap.org/svn/docs/3rd-party-licenses.txt . [David] + https://nmap.org/svn/docs/3rd-party-licenses.txt . [David] o [NSE] Improved the SMB scripts so that they can run in parallel rather than using a mutex to force serialization. This quadrupled @@ -4025,7 +4025,7 @@ o [NSE] Improved the SMB scripts so that they can run in parallel http://seclists.org/nmap-dev/2010/q3/819. [Ron] o Added a simple Nmap NSE script template to make writing new scripts - easier: http://nmap.org/svn/docs/sample-script.nse. [Ron] + easier: https://nmap.org/svn/docs/sample-script.nse. [Ron] o [Zenmap] Made the topology node radiuses grow logarithmically instead of linearly, so that hosts with thousands of open ports @@ -4035,7 +4035,7 @@ o [Zenmap] Made the topology node radiuses grow logarithmically o [NSE] Added the get_script_args NSE function for parsing script arguments in a clean and standardized way - (http://nmap.org/nsedoc/lib/stdnse.html#get_script_args). [Djalal] + (https://nmap.org/nsedoc/lib/stdnse.html#get_script_args). [Djalal] o Increased the initial RTT timeout for ARP scans from 100 ms to 200 ms. Some wireless and VPN links were taking around 300 ms to @@ -4259,7 +4259,7 @@ o [NSE] Added 17 scripts, bringing the total to 131! They are ms-sql-config, ms-sql-empty-password, ms-sql-hasdbaccess, ms-sql-query, ms-sql-tables, ms-sql-xp-cmdshell, nfs-ls, ntp-monlist . - Learn more about any of these at: http://nmap.org/nsedoc/ + Learn more about any of these at: https://nmap.org/nsedoc/ o Performed a major OS detection integration run. The database has grown to 2,608 fingerprints (an increase of 262) and many of the @@ -4396,7 +4396,7 @@ o David made many improvements to the NSEDoc for individual scripts, He also improved the generated HTML with features like auto-generating usage strings if the scripts don't include their own and allowing the giant sidebar lists of scripts/libraries to expand - and contract. See http://nmap.org/nsedoc/. + and contract. See https://nmap.org/nsedoc/. o UDP payloads are now stored in an external data file, nmap-payloads, instead of being hard-coded in the executable. This makes it easier @@ -4439,7 +4439,7 @@ o Nmap now works if you specify several target host names which machine. [David] o Made a list of current Nmap SVN committers: - http://nmap.org/svn/docs/committers.txt + https://nmap.org/svn/docs/committers.txt o Added a new library, libnetutil, which contains about 2,700 lines of networking related code which is now shared between Nmap and Nping @@ -4625,7 +4625,7 @@ o Updated IANA IP address space assignment list for random IP (-iR) o Created a new directory for storing todo lists for Nmap and related projects. You can see what we're working on and planning by - visiting http://nmap.org/svn/todo/. + visiting https://nmap.org/svn/todo/. o [NSE] Removed explicit time limit checking from ms-sql-brute, pgsql-brute, mysql-brute, ldap-brute, and afp-brute. The unpwdb @@ -4676,29 +4676,29 @@ o [NSE] Added 37 scripts, bringing the total to 117! They are snmp-processes snmp-win32-services snmp-win32-shares snmp-win32-software snmp-win32-users ssl-enum-ciphers . - Learn more about any of these at: http://nmap.org/nsedoc/ + Learn more about any of these at: https://nmap.org/nsedoc/ o [NSE] New script afp-path-vuln detects and can exploit a major Mac OS X AFP directory traversal vulnerability (CVE-2010-0533) discovered by Nmap developer Patrik Karlsson. See - http://nmap.org/nsedoc/scripts/afp-path-vuln.html and + https://nmap.org/nsedoc/scripts/afp-path-vuln.html and http://bit.ly/nmapafp. o An ALPHA TEST VERSION of Nping, a packet generator written by Luis MartinGarcia and Fyodor last summer, is now included in the Nmap distribution. While it works, we consider the application unfinished and we hope to improve it greatly as a Summer of Code project this - summer and then do an official release. See http://nmap.org/nping/. + summer and then do an official release. See https://nmap.org/nping/. o [NSE] Added RPC library and three new NFS scripts. Modified the rpcinfo and nfs-showmount scripts to use the new library. The new scripts are: - nfs-acls shows the owner and directory mode of NFS exports - (http://nmap.org/nsedoc/scripts/nfs-acls.html). + (https://nmap.org/nsedoc/scripts/nfs-acls.html). - nfs-dirlist lists the contents of NFS exports - (http://nmap.org/nsedoc/scripts/nfs-dirlist.html) + (https://nmap.org/nsedoc/scripts/nfs-dirlist.html) - nfs-statfs shows file system statistics for NFS exports - (http://nmap.org/nsedoc/scripts/nfs-statfs.html). + (https://nmap.org/nsedoc/scripts/nfs-statfs.html). [Patrik] o [NSE] Added the new dns-service-discovery script which uses DNS-SD @@ -4706,16 +4706,16 @@ o [NSE] Added the new dns-service-discovery script which uses DNS-SD technologies known by names such as Bonjour, Rendezvous, and Zeroconf. This one script can provide as much information as a full port scan in some cases. See - http://nmap.org/nsedoc/scripts/dns-service-discovery.html . [Patrik + https://nmap.org/nsedoc/scripts/dns-service-discovery.html . [Patrik Karlsson] o [NSE] New script afp-brute for brute force authentication attempts against the Apple AFP filesharing protocol. See - http://nmap.org/nsedoc/scripts/afp-brute.html . [Patrik] + https://nmap.org/nsedoc/scripts/afp-brute.html . [Patrik] o [NSE] Added a new script afp-showmount which displays Apple AFP shares and their permissions. See - http://nmap.org/nsedoc/scripts/afp-showmount.html . [Patrik] + https://nmap.org/nsedoc/scripts/afp-showmount.html . [Patrik] o [NSE] Added the qscan script to repeatedly probe ports on a host to gather round-trip times for each port. The script then uses these @@ -4723,66 +4723,66 @@ o [NSE] Added the qscan script to repeatedly probe ports on a host to trip times. Ports in different groups could be the result of things such as port forwarding to hosts behind a NAT. It is based on work by Doug Hoyte. This script also utilizes the new NSE raw IP sending - functionality. See http://nmap.org/nsedoc/scripts/qscan.html . [Kris] + functionality. See https://nmap.org/nsedoc/scripts/qscan.html . [Kris] o [NSE] Added a new script, db2-das-info.nse, that connects to the IBM DB2 Administration Server (DAS) exports the server profile. No authentication is required for this request. The script will also set the port product and version if a version scan is requested. See - http://nmap.org/nsedoc/scripts/db2-das-info.html . [Patrik Karlsson, + https://nmap.org/nsedoc/scripts/db2-das-info.html . [Patrik Karlsson, Tom Sellers] o [NSE] Added a new library for ASN.1 parsing and adapted the SNMP library to make use of it. Added 5 SNMP scripts that use the new libraries: - snmp-netstat shows listening and connected - sockets (http://nmap.org/nsedoc/scripts/snmp-netstat.html). + sockets (https://nmap.org/nsedoc/scripts/snmp-netstat.html). - snmp-processes shows process information including name, pid, path - & parameters (http://nmap.org/nsedoc/scripts/snmp-processes.html). + & parameters (https://nmap.org/nsedoc/scripts/snmp-processes.html). - snmp-win32-services shows the names of running Windows services - (http://nmap.org/nsedoc/scripts/snmp-win32-services.html). + (https://nmap.org/nsedoc/scripts/snmp-win32-services.html). - snmp-win32-shares shows the names and path of Windows shares - (http://nmap.org/nsedoc/scripts/snmp-win32-shares.html). + (https://nmap.org/nsedoc/scripts/snmp-win32-shares.html). - snmp-win32-software shows a list of installed Windows software - (http://nmap.org/nsedoc/scripts/snmp-win32-software.html). + (https://nmap.org/nsedoc/scripts/snmp-win32-software.html). - snmp-win32-users shows a list of local Windows users - (http://nmap.org/nsedoc/scripts/snmp-win32-users.html). + (https://nmap.org/nsedoc/scripts/snmp-win32-users.html). [Patrik] o [NSE] Added the snmp-interfaces script by Thomas Buchanan, which enumerates network interfaces over SNMP. See - http://nmap.org/nsedoc/scripts/snmp-interfaces.html . + https://nmap.org/nsedoc/scripts/snmp-interfaces.html . o [NSE] Added http-vmware-path-vuln.nse, which checks for a critical and easy to exploit path-traversal vulnerability in VMWare (CVE-2009-3733). See - http://nmap.org/nsedoc/scripts/http-vmware-path-vuln.html . [Ron] + https://nmap.org/nsedoc/scripts/http-vmware-path-vuln.html . [Ron] o [NSE] Added a new library for LDAP and three new scripts by Patrik: - ldap-brute uses the unpwdb library to guess credentials for LDAP - (http://nmap.org/nsedoc/scripts/ldap-brute.html). + (https://nmap.org/nsedoc/scripts/ldap-brute.html). - ldap-rootdse retrieves the LDAP root DSA-specific Entry (DSE) - (http://nmap.org/nsedoc/scripts/ldap-rootdse.html). + (https://nmap.org/nsedoc/scripts/ldap-rootdse.html). - ldap-search queries a LDAP directory for either all, or a number of pre-defined object types - (http://nmap.org/nsedoc/scripts/ldap-search.html). + (https://nmap.org/nsedoc/scripts/ldap-search.html). o [NSE] Added a new library for PostgreSQL and the script pgsql-brute that uses it to guess credentials. See - http://nmap.org/nsedoc/scripts/pgsql-brute.html . [Patrik] + https://nmap.org/nsedoc/scripts/pgsql-brute.html . [Patrik] o [NSE] Added 5 new MySQL NSE scripts and a MySQL library by Patrik Karlsson: - mysql-brute uses the unpwdb library to guess credentials for MySQL - (http://nmap.org/nsedoc/scripts/mysql-brute.html). + (https://nmap.org/nsedoc/scripts/mysql-brute.html). - mysql-databases queries MySQL for a list of databases - (http://nmap.org/nsedoc/scripts/mysql-databases.html). + (https://nmap.org/nsedoc/scripts/mysql-databases.html). - mysql-empty-password attempts to authenticate anonymously or as root with an empty password - (http://nmap.org/nsedoc/scripts/mysql-empty-password.html). + (https://nmap.org/nsedoc/scripts/mysql-empty-password.html). - mysql-users queries MySQL for a list of database users - (http://nmap.org/nsedoc/scripts/mysql-users.html). + (https://nmap.org/nsedoc/scripts/mysql-users.html). - mysql-variables queries MySQL for its variables and their - settings (http://nmap.org/nsedoc/scripts/mysql-variables.html). + settings (https://nmap.org/nsedoc/scripts/mysql-variables.html). o Improved the passwords.lst database used by NSE by combining several leaked password databases collected by Ron Bowes. The size of the @@ -4813,43 +4813,43 @@ o [NSE] Added the ipidseq script to classify a host's IP ID sequence suitability for Nmap's Idle Scan (-sI), i.e. check if a host is an idle zombie. This is the first script to use the new raw IP sending functionality in NSE. See - http://nmap.org/nsedoc/scripts/ipidseq.html . [Kris] + https://nmap.org/nsedoc/scripts/ipidseq.html . [Kris] o [NSE] Added the ssl-enum-ciphers script by Mak Kolybabi. It lists the ciphers and compressors supported by SSL/TLS servers. See - http://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html . + https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html . o [NSE] Added two new scripts for the MongoDB database from Martin Holst Swende. mongodb-info - (http://nmap.org/nsedoc/scripts/mongodb-info.html) gets information + (https://nmap.org/nsedoc/scripts/mongodb-info.html) gets information like the version number, memory use, and operating system, while mongodb-databases - (http://nmap.org/nsedoc/scripts/mongodb-databases.html) lists the + (https://nmap.org/nsedoc/scripts/mongodb-databases.html) lists the databases and their size on disk. o [NSE] Added the scripts couchdb-databases and couchdb-stats, which list CouchDB databases and show access statistics, and a new json.lua library they depend on. See - http://nmap.org/nsedoc/scripts/couchdb-databases.html and - http://nmap.org/nsedoc/scripts/couchdb-stats.html [Martin Holst + https://nmap.org/nsedoc/scripts/couchdb-databases.html and + https://nmap.org/nsedoc/scripts/couchdb-stats.html [Martin Holst Swende] o [NSE] Added the new lexmark-config script that lists product information and configuration for Lexmark printers. See - http://nmap.org/nsedoc/scripts/lexmark-config.html . [Patrik + https://nmap.org/nsedoc/scripts/lexmark-config.html . [Patrik Karlsson] o [NSE] Added the new daap-get-library script which uses the Digital Audio Access Protocol to enumerate the contents of a library. The contents contain the name of the artist, album and song. See - http://nmap.org/nsedoc/scripts/daap-get-library.html . [Patrik] + https://nmap.org/nsedoc/scripts/daap-get-library.html . [Patrik] o [NSE] Added jdwp-version.nse, a script by Michael Schierl that finds the version of a Java Debug Wire Protocol server. This is a dangerous service to find running as it does not provide any security against malicious attackers who can inject their own bytecode into the debugged process. See - http://nmap.org/nsedoc/scripts/jdwp-version.html . + https://nmap.org/nsedoc/scripts/jdwp-version.html . o [NSE] Added the smtp-enum-users script from Duarte Silva, which attempts to find user account names over SMTP by brute force testing @@ -4863,7 +4863,7 @@ o [NSE] The unpwdb library now has a default time limit on the - unpwdb.passlimit Limit on number of passwords. - unpwdb.timelimit Time limit in seconds. Pass 0 for any of these limits to disable it. For more details, see - http://nmap.org/nsedoc/lib/unpwdb.html . [David] + https://nmap.org/nsedoc/lib/unpwdb.html . [David] o When --open is used, Nmap no longer prints output for hosts which don't have any open ports. All output formats are treated the same @@ -4875,7 +4875,7 @@ o [NSE] Added the script http-methods from Bernd Stroessenreuther. supported by the server, highlights potentially risky methods, and optionally tests each method to see if they are restricted by IP address or something similar. See - http://nmap.org/nsedoc/scripts/http-methods.html . + https://nmap.org/nsedoc/scripts/http-methods.html . o The -v and -d options are now handled in the same way. These three forms are equivalent: @@ -4908,7 +4908,7 @@ o [NSE] Raw packet sending at the IP layer is now supported, in addition to the existing Ethernet sending functionality. Packets to send start with an IPv4 header and can be sent to arbitrary hosts. For details, see - http://nmap.org/book/nse-api.html#nse-api-networkio-raw [Kris] + https://nmap.org/book/nse-api.html#nse-api-networkio-raw [Kris] o Added version detection match line for the Arucer backdoor, which was found packaged with drivers for the Energizer USB recharger product @@ -5105,7 +5105,7 @@ o Removed the nmap_service.exe helper program for smb-psexec, as it was still being flagged by malware detection even after the bit-flipping in the next release. In fact, the obfuscation backfired and caused more false positives! You can now download it from - http://nmap.org/psexec/nmap_service.exe. (The script will remind you + https://nmap.org/psexec/nmap_service.exe. (The script will remind you if you run the script and it's not installed.) o Added service probes and UDP payloads for games based on the Quake 2 @@ -5219,7 +5219,7 @@ o Dramatically improved the version detection database, integrating o [NSE] Added a new script, oracle-sid-brute, which queries the Oracle TNS-listener for default instance/sid names. The SID enumeration list was prepared by Red Database security. See - http://nmap.org/nsedoc/scripts/oracle-sid-brute.html . [Patrik + https://nmap.org/nsedoc/scripts/oracle-sid-brute.html . [Patrik Karlsson] o [Ncat] The --ssl, --output, and --hex-dump options now work with @@ -5251,7 +5251,7 @@ o [NSE] Replaced our runlevel system for managing the order of script scripts) and NSE manages the order. Dependencies only enforce ordering, they cannot pull in scripts which the user didn't specify. See - http://nmap.org/book/nse-script-format.html#nse-format-dependencies + https://nmap.org/book/nse-script-format.html#nse-format-dependencies [Patrick] o [Ncat] For compatibility with Hobbit's original Netcat, The -p @@ -5261,7 +5261,7 @@ o [Ncat] For compatibility with Hobbit's original Netcat, The -p o A new script argument, http.useragent, lets you modify the User-Agent header sent by NSE from its default of "Mozilla/5.0 - (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)". + (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)". Set it to the empty string to disable the User-Agent entirely. [David, Tom Sellers, Jah] @@ -5324,33 +5324,33 @@ o Fixed a bug in the WinPcap installer: If the "Start the WinPcap Nmap 5.10BETA2 [2009-12-24] o Added 7 new NSE scripts for a grand total of 79! You can learn about - them all at http://nmap.org/nsedoc/. Here are the new ones: + them all at https://nmap.org/nsedoc/. Here are the new ones: * nfs-showmount displays NFS exports like "showmount -e" does. See - http://nmap.org/nsedoc/scripts/nfs-showmount.html . [Patrik + https://nmap.org/nsedoc/scripts/nfs-showmount.html . [Patrik Karlsson] * ntp-info prints the time and configuration variables provided by an NTP service. It may get such interesting information as the operating system, server build date, and upstream time server IP address. See - http://nmap.org/nsedoc/scripts/ntp-info.html . [Richard Sammet] + https://nmap.org/nsedoc/scripts/ntp-info.html . [Richard Sammet] * citrix-brute-xml uses the unpwdb library to guess credentials for the Citrix PN Web Agent Service. See - http://nmap.org/nsedoc/scripts/citrix-brute-xml.html . [Patrik Karlsson] + https://nmap.org/nsedoc/scripts/citrix-brute-xml.html . [Patrik Karlsson] * citrix-enum-apps and citrix-enum-apps-xml print a list of published applications from the Citrix ICA Browser or XML service, respectively. See - http://nmap.org/nsedoc/scripts/citrix-enum-apps.html and - http://nmap.org/nsedoc/scripts/citrix-enum-apps-xml.html . [Patrik Karlsson] + https://nmap.org/nsedoc/scripts/citrix-enum-apps.html and + https://nmap.org/nsedoc/scripts/citrix-enum-apps-xml.html . [Patrik Karlsson] * citrix-enum-servers and citrix-enum-servers-xml print a list of Citrix servers from the Citrix ICA Browser or XML service, respectively. See - http://nmap.org/nsedoc/scripts/citrix-enum-servers.html and - http://nmap.org/nsedoc/scripts/citrix-enum-servers-xml.html . [Patrik + https://nmap.org/nsedoc/scripts/citrix-enum-servers.html and + https://nmap.org/nsedoc/scripts/citrix-enum-servers-xml.html . [Patrik Karlsson] o We performed a memory consumption audit and made changes to @@ -5450,7 +5450,7 @@ o [NSE] Improved db2-info to set port product and state (rather than Nmap 5.10BETA1 [2009-11-23] o Added 14 new NSE scripts for a grand total of 72! You can learn - about them all at http://nmap.org/nsedoc/. Here are the new ones: + about them all at https://nmap.org/nsedoc/. Here are the new ones: + smb-psexec implements remote process execution similar to the Sysinternals' psexec tool (or Metasploit's psexec "exploit"), @@ -5458,27 +5458,27 @@ o Added 14 new NSE scripts for a grand total of 72! You can learn and read the output. This is great for gathering information about servers, running the same tool on a range of system, or even installing a backdoor on a collection of computers. See - http://nmap.org/nsedoc/scripts/smb-psexec.html [Ron] + https://nmap.org/nsedoc/scripts/smb-psexec.html [Ron] + dhcp-discover sends out DHCP probes on UDP/67 and displays all interesting results (or, with verbosity, all results). Optionally, multiple probes can be sent and the MAC address can be randomized in an attempt to exhaust the DHCP server's address pool and potentially create a denial of service condition. See - http://nmap.org/nsedoc/scripts/dhcp-discover.html . [Ron] + https://nmap.org/nsedoc/scripts/dhcp-discover.html . [Ron] + http-enum enumerates URLs used by popular web applications and servers and reports which ones exist on a target web server. See - http://nmap.org/nsedoc/scripts/http-enum.html . [Ron, Andrew Orr, + https://nmap.org/nsedoc/scripts/http-enum.html . [Ron, Andrew Orr, Rob Nicholls] + ssl-cert retrieves and prints a target server's SSL certificate. See - http://nmap.org/nsedoc/scripts/ssl-cert.html . [David] + https://nmap.org/nsedoc/scripts/ssl-cert.html . [David] + x11-access checks whether access to an X11 server is allowed (as with "xhost +" for example). See - http://nmap.org/nsedoc/scripts/x11-access.html . [jlanthea] + https://nmap.org/nsedoc/scripts/x11-access.html . [jlanthea] + db2-info enhances DB2 database instance detection. It provides detection when version probes fail, but will default to the @@ -5486,44 +5486,44 @@ o Added 14 new NSE scripts for a grand total of 72! You can learn detects the server platform and database instance name. The DB2 version detection port ranges were broadened to 50000-50025 and 60000-60025 as well. See - http://nmap.org/nsedoc/scripts/db2-info.html . [Tom] + https://nmap.org/nsedoc/scripts/db2-info.html . [Tom] + smbv2-enabled checks if the smbv2 protocol is enabled on target servers. SMBv2 has already suffered from at least one major security vulnerability. See - http://nmap.org/nsedoc/scripts/smbv2-enabled.html . [Ron] + https://nmap.org/nsedoc/scripts/smbv2-enabled.html . [Ron] + http-favicon obtains the favicon file (/favicon.ico or whatever is specified by the HTML link tag) and tries to identify its source (such as a certain web application) using a database lookup. See - http://nmap.org/nsedoc/scripts/http-favicon.html . [Vladz] + https://nmap.org/nsedoc/scripts/http-favicon.html . [Vladz] + http-date obtains the Date: header field value from an HTTP server then displays it along with how much it differs from local - time. See http://nmap.org/nsedoc/scripts/http-date.html . [David] + time. See https://nmap.org/nsedoc/scripts/http-date.html . [David] + http-userdir-enum attempts to enumerate users on a system by trying URLs with common usernames in the Apache mod_userdir format (e.g. http://target-server.com/~john). See - http://nmap.org/nsedoc/scripts/http-userdir-enum.html . [Jah] + https://nmap.org/nsedoc/scripts/http-userdir-enum.html . [Jah] + pjl-ready-message allows viewing and setting the status message on printers which support the Printer Job Language (many HP printers - do). See http://nmap.org/nsedoc/scripts/pjl-ready-message.html . + do). See https://nmap.org/nsedoc/scripts/pjl-ready-message.html . [Aaron Leininger] + http-headers performs a GET request for the root folder ("/") of a web server and displays the HTTP headers returned. See - http://nmap.org/nsedoc/scripts/http-headers.html . [Ron] + https://nmap.org/nsedoc/scripts/http-headers.html . [Ron] + http-malware-host is designed to discover hosts that are serving malware (perhaps because they were compromised), but so far it only checks for one specific attack. See - http://nmap.org/nsedoc/scripts/http-malware-host.html . [Ron] + https://nmap.org/nsedoc/scripts/http-malware-host.html . [Ron] + smb-enum-groups displays a list of groups on the remote system along with their membership (like enum.exe -G). See - http://nmap.org/nsedoc/scripts/smb-enum-users.html [Ron] + https://nmap.org/nsedoc/scripts/smb-enum-users.html [Ron] o Nmap's --traceroute has been rewritten for better performance. Probes are sent in parallel to individual hosts, not just across all @@ -5544,7 +5544,7 @@ o [Zenmap] After performing or loading a scan, you can now filter This makes it easy to select just Linux hosts, or those running a certain version of Apache, or whatever interests you. You can easily modify the filter or remove it to see the whole scan again. See - http://nmap.org/book/zenmap-filter.html . [Josh Marlow] + https://nmap.org/book/zenmap-filter.html . [Josh Marlow] o For some UDP ports, Nmap will now send a protocol-specific payload that is more likely to get a response than an empty packet is. This @@ -5567,7 +5567,7 @@ o [NSE] For all the services which are commonly tunneled over SSL (pop3, http, imap, irc, smtp, etc.), we audited the scripts to ensure they can support that tunneling. The com.tryssl function was added for easy SSL detection. See - http://nmap.org/nsedoc/lib/comm.html [Joao] + https://nmap.org/nsedoc/lib/comm.html [Joao] o Nmap now prefers to display the hostname supplied by the user instead of the reverse-DNS name in most places. If a reverse DNS record @@ -5613,13 +5613,13 @@ o The Nmap source tarball (and RPMs) now included man page o [NSE] Added a function for scripts to format their output in a consistent way. See - http://nmap.org/nsedoc/lib/stdnse.html#format_output. [Ron] + https://nmap.org/nsedoc/lib/stdnse.html#format_output. [Ron] o [NSE] Now supports worker threads so that a single script can perform multiple network operations concurrently. This patch also includes condition variables for synchronization. See - http://nmap.org/nsedoc/lib/stdnse.html#new_thread, - http://nmap.org/nsedoc/lib/nmap.html#condvar, and + https://nmap.org/nsedoc/lib/stdnse.html#new_thread, + https://nmap.org/nsedoc/lib/nmap.html#condvar, and http://seclists.org/nmap-dev/2009/q4/294. o Fixed a problem in which the Nmap installer wrongly reported that @@ -5701,7 +5701,7 @@ o [Ncat] Ncat now prints a message like "Connection refused." by o Zenmap no longer displays down hosts in the GUI. [Josh] o The Ndiff man page was dramatically improved with examples and - sample output. See http://nmap.org/ndiff/man.html . + sample output. See https://nmap.org/ndiff/man.html . [David] o [NSE] At debug level 2 or higher (-d2), Nmap now prints all active @@ -5875,7 +5875,7 @@ o Added a check for a SMBv2 vulnerability (CVE-2009-3103) to smb-check-vulns. Due to its nature (it performs a DoS, then checks if the system is still online), the script isn't run by default and requires a special script-arg to work. See - http://nmap.org/nsedoc/scripts/smb-check-vulns.html . [Ron] + https://nmap.org/nsedoc/scripts/smb-check-vulns.html . [Ron] o Fixed an integer overflow in uptime calculation which could occur when a target with a low TCP timestamp clock frequency uses large @@ -5913,7 +5913,7 @@ o There is a new OS detection pseudo-test, SCAN.DC, which records how and DS=1%DC=D (a true one-hop connection.) [David] o Canonicalized the list of OS detection device types to a smaller set - with descriptions: http://nmap.org/svn/docs/device-types.txt . + with descriptions: https://nmap.org/svn/docs/device-types.txt . [David, Fyodor, Doug] o [Ncat] The --idle-timeout option now exits when *both* stdin and the @@ -6168,21 +6168,21 @@ o [NSE] Added http-iis-webdav-vuln.nse, which detects the recently discovered WebDAV unicode bug in MS IIS 5.1/6.0 web server which can allow arbitrary users to access password protected folders without authentication. See - http://nmap.org/svn/scripts/http-iis-webdav-vuln.nse. [Ron] + https://nmap.org/svn/scripts/http-iis-webdav-vuln.nse. [Ron] o The Nmap Reference Guide has been translated to German by Open Source Press and Indonesian by Tedi Heriyanto. You can now read it - in 16 languages at http://nmap.org/docs.html . We're always looking + in 16 languages at https://nmap.org/docs.html . We're always looking for more translations of Nmap and its documentation--if you'd like to help, see http://seclists.org/nmap-dev/2009/q2/0667.html . o Open Source Press completed and released the German translation of the official Nmap book (Nmap Network Scanning). Learn more at - http://nmap.org/book/#translations. + https://nmap.org/book/#translations. o [NSE] Added socks-open-proxy.nse for scanning networks for open SOCKS proxy servers. See - http://nmap.org/nsedoc/scripts/socks-open-proxy.html . [Joao Correa] + https://nmap.org/nsedoc/scripts/socks-open-proxy.html . [Joao Correa] o [NSE] http-open-proxy.nse has been updated to attempt HEAD and CONNECT methods as well as previously supported GET method. It @@ -6231,7 +6231,7 @@ o Changed the default UDP ping (-PU) port from 31338 to 40125. This o [NSE] Added the imap-capabilities script, which uses the CAPABILITY command to determine the capabilities of a target IMAP mail server. A simple supporting IMAP library was added as well. See - http://nmap.org/nsedoc/scripts/imap-capabilities.html . [Brandon] + https://nmap.org/nsedoc/scripts/imap-capabilities.html . [Brandon] o [NSE] Brandon Enright from UCSD reports that, thanks to all the NSE fixes in this release, he no longer sees any Nmap crashes in his @@ -6264,10 +6264,10 @@ o The --packet-trace/--version-trace options now shows the names of o The GPG detached signatures for Nmap releases now use the more standard .asc extension rather than .gpg.txt. They can still be - found at http://nmap.org/dist/sigs/ and the .gpg.txt versions for + found at https://nmap.org/dist/sigs/ and the .gpg.txt versions for previous releases are still available for compatibility reasons. For instructions on verifying Nmap package integrity, see - http://nmap.org/book/install.html#inst-integrity. [Fyodor] + https://nmap.org/book/install.html#inst-integrity. [Fyodor] o [Zenmap] Fixed two bugs: 1) When two scans are performed in Zenmap and aggregated, the first one was being modified in the process, @@ -6495,7 +6495,7 @@ o [NSE] Added Boolean Operators for --script. You may now use ("and", precedence too. For example, you can now run: nmap --script "(default or safe or intrusive) and not http-*" scanme.nmap.org For more details, see - http://nmap.org/book/nse-usage.html#nse-args. [Patrick] + https://nmap.org/book/nse-usage.html#nse-args. [Patrick] o [Ncat] The HTTP proxy server now works on Windows too. [David] @@ -6567,7 +6567,7 @@ o Fixed a bug in the su-to-zenmap.sh script so that, in the cases -C. [Michal Januszewski, Henry Gebhardt] o Overhaul the NSE documentation "Usage and Examples" section and add - many more examples: http://nmap.org/book/nse-usage.html [David] + many more examples: https://nmap.org/book/nse-usage.html [David] o [NSE] Made hexify in nse_nsock.cc take an unsigned char * to work around an assertion in Visual C++ in Debug mode. The isprint, @@ -6626,7 +6626,7 @@ o New Conficker versions eliminate the loophole we were using to - Added new p2p-conficker script which detects Conficker using its P2P update ports rather than MSRPC. This is based on some new research by Symantec. See - http://nmap.org/nsedoc/scripts/p2p-conficker.html [Ron] + https://nmap.org/nsedoc/scripts/p2p-conficker.html [Ron] - Since new Conficker variants prevent detection by our previous MSRPC check in smb-check-vulns, we've added a new check which still works. It involves calling netpathcanonicalize on "\" rather than @@ -6738,15 +6738,15 @@ o Improvements to the Conficker detection script (smb-check-vulns): The other improved message is for NT_STATUS_OBJECT_NAME_NOT_FOUND. [David] -o The NSEDoc portal at http://nmap.org/nsedoc/ now provides download +o The NSEDoc portal at https://nmap.org/nsedoc/ now provides download links from the script and module pages to browse or download recent versions of the code. It isn't quite as up-to-date as obtaining them from svn directly, but may be more convenient. For an example, see - http://nmap.org/nsedoc/scripts/smb-check-vulns.html . [David, Fyodor] + https://nmap.org/nsedoc/scripts/smb-check-vulns.html . [David, Fyodor] o A copy of the Nmap public svn repository (/nmap, plus its zenmap, nsock, nbase, and ncat externals) is now available at - http://nmap.org/svn/. We'll be updating this regularly, but it may + https://nmap.org/svn/. We'll be updating this regularly, but it may be slightly behind the SVN version. This is particularly useful when you need to link to files in the tree, since browsers generally don't handle svn:// repository links. [Fyodor] @@ -6934,7 +6934,7 @@ o Doug performed one of the largest version detection integration runs o Released the new Ncat guide which contains practical real-life Ncat usage examples for Ncat's major features. It complements the more - option-centric man page. Read it here: http://nmap.org/ncat/guide/ + option-centric man page. Read it here: https://nmap.org/ncat/guide/ [David, Fyodor] o Ndiff is now included in the Windows zip distribution. For space @@ -6980,7 +6980,7 @@ o You can now use '-' by itself in a target IP specification to mean o Nmap was discovered in another movie! In the Russian film Khottabych, teenage hacker Gena uses Nmap (and telnet) to hack Microsoft. In response, MS sends a pretty female hacker to flush - him out. More details and screenshots: http://nmap.org/movies.html . + him out. More details and screenshots: https://nmap.org/movies.html . o Improved operating system support for the smb-enum-sessions NSE script; previous revisions worked on Windows 2003 or Windows 2000, @@ -7094,7 +7094,7 @@ o [NSEDoc] Scripts that use modules automatically have the script arguments defined by those modules included in their documentation. It's no longer necessary to manually supply @args for the arguments in the modules you use. For those who haven't seen the NSEDoc portal - yet, check out http://nmap.org/nsedoc/. [David] + yet, check out https://nmap.org/nsedoc/. [David] o An integer overflow in the scan progress meter was fixed. It caused nonsense output like @@ -7119,7 +7119,7 @@ o [Zenmap] Fix auto-scroll behavior while Nmap is producing output, as o [Zenmap] The network topology feature (Radialnet) has been internationalized so its strings will be localized as well (as soon as the relevant language's translation files are updated. To help - out, see http://nmap.org/book/zenmap-lang.html . Some remaining search + out, see https://nmap.org/book/zenmap-lang.html . Some remaining search interface elements were internationalized as well. [David] o Improved the efficiency of the xml_convert() routine which handles @@ -7204,7 +7204,7 @@ o Made a few improvements to nmap.xsl (details: o [Zenmap] New translation: French (contributed by Gutek) o Updated the mswin32 installer build guide and posted it to - http://nmap.org/data/win32-installer-zenmap-buildguide.txt [Fyodor] + https://nmap.org/data/win32-installer-zenmap-buildguide.txt [Fyodor] o The xampp-default-auth.nse script was renamed to ftp-brute.nse since it has become more general. @@ -7219,7 +7219,7 @@ o Added Ncat, a much-improved reimplementation of the venerable Netcat redirection, connection brokering (facilitating connections between machines which are behind NAT gateways), and much more. It is cross-platform (Linux, Windows, Mac, etc.) and supports IPv6 as well - as standard IPv4. See http://nmap.org/ncat/ for details. It is now + as standard IPv4. See https://nmap.org/ncat/ for details. It is now included in our binary packages (Windows, Linux, and Mac OS X), and built by default. You can skip it with the --without-ncat configure option. Thanks to Kris and David for their great work on this! @@ -7228,7 +7228,7 @@ o Added the Ndiff utility, which compares the results of two Nmap scans and describes the new/removed hosts, newly open/closed ports, changed operating systems, etc. This makes it trivial to scan your networks on a regular basis and create a report (XML or text format) - on all the changes. See http://nmap.org/ndiff/ and ndiff/README for + on all the changes. See https://nmap.org/ndiff/ and ndiff/README for more information. Ndiff is included in our binary packages and built by default, though you can prevent it from being built by specifying the --without-ndiff configure flag. Thanks to David and Michael @@ -7244,7 +7244,7 @@ o Released Nmap Network Scanning: The Official Nmap Project Guide to tasks. It was briefly the #1 selling computer book on Amazon. Translations to the German, Korean, and Brazilian Portuguese languages are forthcoming. More than half of the book is already - free online. For more, see http://nmap.org/book/. + free online. For more, see https://nmap.org/book/. o David spent more than a month working on algorithms to improve port scan performance while retaining or improving accuracy. The changes @@ -7255,10 +7255,10 @@ o David spent more than a month working on algorithms to improve port reduction! o Introduced the NSE documentation portal, which documents every NSE - script and library included with Nmap. See http://nmap.org/nsedoc/. + script and library included with Nmap. See https://nmap.org/nsedoc/. Script documentation was improved substantially in the process. Scripts and libraries must use the new NSEDoc format, which is - described at http://nmap.org/book/nsedoc.html . Thanks to Patrick + described at https://nmap.org/book/nsedoc.html . Thanks to Patrick and David for their great work on this. o The 2nd Generation OS Detection System was dramatically improved for @@ -7326,7 +7326,7 @@ o Zenmap now runs ndiff to for its "Compare Results" function. This o Added a Russian translation of the Nmap Reference Guide by Guz Alexander. We now have translations in 15 languages available from - http://nmap.org/docs.html . More volunteer translators are welcome, + https://nmap.org/docs.html . More volunteer translators are welcome, as we are still missing some important languages. Translation instructions are available from that docs.html page. @@ -7365,7 +7365,7 @@ o [Zenmap] Internationalization has been fixed [David]. Currently - Brazilian Portuguese by Adriano Monteiro Marques (partial) For details on using an existing translation or localizing Zenmap into your own native language, see - http://nmap.org/book/zenmap-lang.html . [David] + https://nmap.org/book/zenmap-lang.html . [David] o Zenmap no longer outputs XML elements and attributes that are not in the Nmap XML DTD. This was done mostly by removing things from @@ -7430,7 +7430,7 @@ o [NSE] We now have a canonical way for scripts to check for dependency libraries such as OpenSSL. This allows them to handle the issue gracefully (by exiting or doing some of their work if possible) rather than flooding the console with error messages as - before. See http://nmap.org/nsedoc/modules/openssl.html . [Pattrick, + before. See https://nmap.org/nsedoc/modules/openssl.html . [Pattrick, David, Fyodor] o Nmap now reports a proper error message when you combine an IPv6 @@ -7469,7 +7469,7 @@ o Fixed a division by zero error in the packet rate measuring code start of a scan. [Jah] o Substantially updated the Nmap Scripting Engine guide/chapter - (http://nmap.org/book/nse.html) so that it is up-to-date with all + (https://nmap.org/book/nse.html) so that it is up-to-date with all the latest NSE improvements. o Fixed a bug in the IP validation code which would have let a specially @@ -7789,7 +7789,7 @@ o [Zenmap] Added a new Scan Topology system. The idea is that if we into Zenmap. Joao Medeiros has been developing RadialNet for more than a year. For details, complete with some of the most beautiful Zenmap screen shots ever, visit - http://nmap.org/book/zenmap-topology.html . The integration work was + https://nmap.org/book/zenmap-topology.html . The integration work was done by SoC student Vladimir Mitrovic and his mentor David Fifield. o [Zenmap] Another exciting new Zenmap feature is Scan Aggregation. @@ -7798,7 +7798,7 @@ o [Zenmap] Another exciting new Zenmap feature is Scan Aggregation. scan one network, analyze the results a bit, then scan some of the machines more intensely or add a completely new subnet to the scan. The new results are seamlessly added to the old, as described - at http://nmap.org/book/zenmap-scanning.html#aggregation. [David, + at https://nmap.org/book/zenmap-scanning.html#aggregation. [David, Vladimir] o Expanded nmap-services to include information on how frequently each @@ -7841,7 +7841,7 @@ o David integrated all of your OS detection fingerprint and correction o Nmap now works with Windows 2000 again, after being broken by our IPv6 support improvements in version 4.65. A couple new dependencies are required to run on Win2K, as described at - http://nmap.org/book/inst-windows.html#inst-win2k . + https://nmap.org/book/inst-windows.html#inst-win2k . o [Zenmap] Added a context-sensitive help system to the Profile Editor. You can now mouse-over options to learn more about what @@ -7897,7 +7897,7 @@ o Fyodor made a number of performance tweaks, such as: o Added a new NSE binlib library, which offers bin.pack() and bin.unpack() functions for dealing with storing values in and extracting them from binary strings. For details, see - http://nmap.org/book/nse-library.html#nse-binlib . [Philip + https://nmap.org/book/nse-library.html#nse-binlib . [Philip Pickering] o Added a new NSE DNS library. See this thread: @@ -8222,7 +8222,7 @@ o Doug integrated all of your version detection submissions and o Nmap compilation on Windows is now done with Visual C++ Express 2008 rather than 2005. Windows compilation instructions have been - updated at http://nmap.org/book/inst-windows.html#inst-win-source . + updated at https://nmap.org/book/inst-windows.html#inst-win-source . [Kris] o The Nmap Windows self-installer now automatically installs the MS @@ -8252,7 +8252,7 @@ o Added a new NSE Comm (common communication) library for common o The Nmap Scripting Engine now supports mutexes for gracefully handling concurrency issues. Mutexes are documented at - http://nmap.org/book/nse-api.html#nse-mutex . [Patrick] + https://nmap.org/book/nse-api.html#nse-mutex . [Patrick] o Added a UDP SNMPv3 probe to version detection, along with 9 vendor match lines. The patch was from Tom Sellers, who contributed other @@ -8282,7 +8282,7 @@ o The robots.nse script has been improved to print output more o The Nmap NSE scripts have been re-categorized in a more logical fashion. The new categories are described at - http://nmap.org/book/nse-usage.html#nse-categories . [Kris] + https://nmap.org/book/nse-usage.html#nse-categories . [Kris] o Improve AIX support by linking against -lodm and -lcfg on that platform. [David] @@ -8406,7 +8406,7 @@ Nmap 4.65 [2008-6-1] o A Mac OS X Nmap/Zenmap installer is now available from the Nmap download page! It is rather straightforward, but detailed instructions are available anyway at - http://nmap.org/book/inst-macosx.html . As a universal installer, + https://nmap.org/book/inst-macosx.html . As a universal installer, it works on both Intel and PPC Macs. It is distributed as a disk image file (.dmg) containing an mpkg package. The installed Nmap does include OpenSSL support. It also supports Authorization @@ -8513,7 +8513,7 @@ o Nbase now generates pseudo-random numbers itself rather than using implementation. [Brandon] o Made a number of updates and improvements to the Zenmap Users' Guide - at http://nmap.org/book/zenmap.html . [David] + at https://nmap.org/book/zenmap.html . [David] o Fixed the way Zenmap handles command-line entry to prevent your custom command-line to be overwritten with the current profile's @@ -8608,7 +8608,7 @@ o Added a new --min-rate option that allows specifying a minimum rate congestion control algorithms and request that Nmap try to keep at least the rate you specify. The rate is given in packets per second. Read more in the Nmap man page - (http://nmap.org/book/man-performance.html) [David] + (https://nmap.org/book/man-performance.html) [David] o Create /nmap/macosx directory in SVN with files necessary to build binary Mac OS X Nmap/Zenmap packages. We are trying to create @@ -8764,7 +8764,7 @@ o Canonicalize NSE script license text--more than half did not even spell license correctly. They all still say that they are under Nmap's license, just with consistent capitalization and spelling, and now a link to Nmap legal page at - http://nmap.org/man/man-legal.html . + https://nmap.org/man/man-legal.html . o Updated ripeQuery.nse to not print extraneous whitespace. [Kris] @@ -8784,7 +8784,7 @@ o Allocate 128 characters for the idle scan ScanProgressMeter Nmap 4.60 [2008-3-15] o Nmap has moved. Everything at http://insecure.org/nmap/ can now be - found at http://nmap.org . That should save your fingers from a + found at https://nmap.org . That should save your fingers from a little bit of typing. Even though transparent redirectors are in place for the old URLs, please update your links and bookmarks. And if you don't have a link to Nmap on your web site, now is a good @@ -8800,7 +8800,7 @@ o All of your OS detection fingerprints up until March 10, 2008 have hundreds of broadband routers, VoIP phones, printers, some crazy oscilloscope, etc. We get a ton of new fingerprint submissions, but not as many corrections. Please remember to visit - http://nmap.org/submit/ if Nmap gives you bad results, whether they + https://nmap.org/submit/ if Nmap gives you bad results, whether they are completely wrong or just a slight mistake (like Nmap says Linux 2.6.20-2.6.23, but you're running 2.6.24). Of course you need to be certain you know exactly what is running on the target before you do @@ -8811,7 +8811,7 @@ o All of your service fingerprints and corrections submitted until documented his adventures at http://hcsw.org/blog.pl/33 . More than a hundred signatures were added, growing the database to 4,645 signatures for 457 services. Corrections are welcome for service - detection too -- visit http://nmap.org/submit/ if you get incorrect results. + detection too -- visit https://nmap.org/submit/ if you get incorrect results. o Nmap now saves the target name (if any) specified on the command line, since this can differ from the reverse DNS results. It can be @@ -8930,7 +8930,7 @@ o Updated IANA assignment IP list for random IP (-iR) generation. [Kris] o The DocBook XML source code to the Nmap Scripting Engine docs - (http://nmap.org/nse/) is now in SVN under docs/scripting.xml . + (https://nmap.org/nse/) is now in SVN under docs/scripting.xml . Nmap 4.53 [2008-1-12] @@ -8985,7 +8985,7 @@ o Added a new version detection probe for the Trend Micro OfficeScan Nmap 4.51BETA [2007-12-21] -o David wrote a detailed Zenmap guide: http://nmap.org/book/zenmap.html +o David wrote a detailed Zenmap guide: https://nmap.org/book/zenmap.html o Added rpcinfo.nse script, which contacts a listening RPC portmapper and reports the listening services and port information (like @@ -9028,7 +9028,7 @@ o Fixed a bug that prevented the --resume option from working on mflags 000 00006: The parameter is incorrect.(87) [Fixed by David, reported by Rob Nicholls] -o Zenmap's new web page (http://nmap.org/zenmap/) is now shown in the +o Zenmap's new web page (https://nmap.org/zenmap/) is now shown in the Zenmap about dialogue. o On Windows, paths beginning with \ are now considered absolute when @@ -9883,7 +9883,7 @@ o Changed the IP protocol scan so that it sends proper IGMP headers when o Improved the algorithm for classifying the TCP timestamp frequency for OS detection. The new algorithm is described at - http://nmap.org/osdetect/osdetect-methods.html#osdetect-ts . + https://nmap.org/osdetect/osdetect-methods.html#osdetect-ts . o Fixed the way Nmap detects whether one of its data files (such as nmap-services) exists and has permissions which allow it to be read. @@ -9929,7 +9929,7 @@ o Integrated the Nmap Scripting Engine (NSE) into mainline Nmap. accepting (and writing) general purpose scripts to put into Nmap proper, and you can also write personal scripts to deal with issues specific to your environment. The system is documented at - http://nmap.org/nse/ . + https://nmap.org/nse/ . o Updated nmap-mac-prefixes to reflect the latest OUI DB from the IEEE (http://standards.ieee.org/regauth/oui/oui.txt) as of December 7. @@ -10046,7 +10046,7 @@ o Integrated the newly submitted OS fingerprints. The DB now contains o Nmap 2nd generation OS detection now has a more sophisticated mechanism for guessing a target OS when there is no exact match in the - database (see http://nmap.org/osdetect/osdetect-guess.html ) + database (see https://nmap.org/osdetect/osdetect-guess.html ) o Rewrote mswin32/nmap.rc to remove cruft and hopefully reduce some MFC-related compilation problems we've seen. Thanks to KX @@ -10095,14 +10095,14 @@ o Worked with Zhao to improve the new OS detection system with now ready to start growing the new database! If Nmap gives you fingerprints, please submit them at the given URL. The DB is still extremely small. The new system is extensively documented at - http://nmap.org/osdetect/ . + https://nmap.org/osdetect/ . o Nmap now supports IP options with the new --ip-options flag. You can specify any options in hex, or use "R" (record route), "T" (record timestamp), "U") (record route & timestamp), "S [route]" (strict source route), or "L [route]" (loose source route). Specify --packet-trace to display IP options of responses. For further - information and examples, see http://nmap.org/man/ and + information and examples, see https://nmap.org/man/ and http://seclists.org/nmap-dev/2006/q3/0052.html . Thanks to Marek Majkowski for writing and sending the patch. @@ -10216,7 +10216,7 @@ o Added a fix for the crash in the new OS detection which would come Nmap 4.20ALPHA1 [2006-6-24] o Integrated initial 2nd generation OS detection patch! The system is - documented at http://nmap.org/osdetect/ . Thanks to Zhao Lei + documented at https://nmap.org/osdetect/ . Thanks to Zhao Lei for helping with the coding and design. o portlist.cc was refactored to remove some code duplication. Thanks @@ -10315,7 +10315,7 @@ o Nmap now ignores certain ICMP error message rate limiting (rather limits when encountered. For a SYN scan, this may cause closed ports to be labeled 'filtered' because Nmap refused to slow down enough to correspond to the rate limiting. Learn more about this - new option at http://nmap.org/man/ . Thanks to Martin + new option at https://nmap.org/man/ . Thanks to Martin Macok (martin.macok(a)underground.cz) for writing the patch that these changes were based on. @@ -10323,7 +10323,7 @@ o Moved my Nmap development environment to Visual C++ 2005 Express edition. In typical "MS Upgrade Treadmill" fashion, Visual Studio 2003 users will no longer be able to compile Nmap using the new solution files. The compilation, installation, and execution - instructions at http://nmap.org/install/inst-windows.html have been + instructions at https://nmap.org/install/inst-windows.html have been upgraded. o Automated my Windows build system so that I just have to type a @@ -10633,7 +10633,7 @@ o Fixed compilation to again work with gcc-derivatives such as Nmap 3.98BETA1 [2006-1-22] o Added run time interaction as documented at - http://nmap.org/man/man-runtime-interaction.html . + https://nmap.org/man/man-runtime-interaction.html . While Nmap is running, you can now press 'v' to increase verbosity, 'd' to increase the debugging level, 'p' to enable packet tracing, or the capital versions (V,D,P) to do the opposite. Any other key @@ -10755,11 +10755,11 @@ o Made a change to libdnet so that Windows interfaces are listed as o Ceased including foreign translations in the Nmap tarball as they take up too much space. HTML versions can be found at - http://nmap.org/docs.html , while XML and NROFF versions - are available from http://nmap.org/data/man-xlate/ . + https://nmap.org/docs.html , while XML and NROFF versions + are available from https://nmap.org/data/man-xlate/ . o Changed INSTALL and README-WIN32 files to mostly just reference the - new Nmap Install Guide at http://nmap.org/install/ . + new Nmap Install Guide at https://nmap.org/install/ . o Included docs/nmap-man.xml in the tarball distribution, which is the DocBook XML source for the Nmap man page. Patches to Nmap that are @@ -10850,13 +10850,13 @@ Nmap 3.94ALPHA1 [2005-11-27] o Wrote a new man page from scratch. It is much more comprehensive (more than twice as long) and (IMHO) better organized than the - previous one. Read it online at http://nmap.org/man/ + previous one. Read it online at https://nmap.org/man/ or docs/nmap.1 from the Nmap distribution. Let me know if you have any ideas for improving it. o Wrote a new "help screen", which you get when running Nmap without arguments. It is also reproduced in the man page and at - http://nmap.org/data/nmap.usage.txt . I gave up trying + https://nmap.org/data/nmap.usage.txt . I gave up trying to fit it within a 25-line, 80-column terminal window. It is now 78 lines and summarizes all but the most obscure Nmap options. @@ -10877,7 +10877,7 @@ o Made the version detection "ports" directive (in bit. The patch was done by Doug Hoyte (doug(a)hcsw.org). o Added the --webxml option, which does the same thing as - --stylesheet http://nmap.org/data/nmap.xsl , without + --stylesheet https://nmap.org/data/nmap.xsl , without requiring you to remember the exact URL or type that whole thing. o Fixed a crash occurred when the --exclude option was used with @@ -11055,7 +11055,7 @@ o Nmap distribution signing has changed. Release files are now signed generated a new key for himself (KeyID 33599B5F). The Nmap key has been signed by Fyodor's new key, which has been signed by Fyodor's old key so that you know they are legit. The new keys are available - at http://nmap.org/data/nmap_gpgkeys.txt , as + at https://nmap.org/data/nmap_gpgkeys.txt , as docs/nmap_gpgkeys.txt in the Nmap source tarball, and on the public keyserver network. Here are the fingerprints: pub 1024D/33599B5F 2005-04-24 @@ -11319,7 +11319,7 @@ o Nmap now ships with and installs (in the same directory as other privacy reasons (avoid loading of an external URL when you view results), Nmap uses the local file system by default. If you would like the latest version of the stylesheet loaded from the web when - rendering, specify --stylesheet http://nmap.org/data/nmap.xsl . + rendering, specify --stylesheet https://nmap.org/data/nmap.xsl . o Fixed fragmentation option (-f). One -f now sets sends fragments with just 8 bytes after the IP header, while -ff sends 16 bytes to @@ -11495,7 +11495,7 @@ o Fixed nmap_fetchfile() to better find custom versions of data files o Changed XML output so that the MAC address
element comes right after the IPv4/IPv6
element. Apparently this is - needed to comply with the DTD ( http://nmap.org/data/nmap.dtd ). + needed to comply with the DTD ( https://nmap.org/data/nmap.dtd ). Thanks to Adam Morgan (adam.morgan(a)Q1Labs.com) and Florian Ebner (Florian.Ebner(a)e-bros.de) for the problem reports. @@ -11778,7 +11778,7 @@ o Modified the mswine32/nmap_performance.reg Windows registry file to should apply the new registry changes by clicking on the .reg file. Or do it manually as described in README-WIN32. This file is also now available in the data directory at - http://nmap.org/data/nmap_performance.reg + https://nmap.org/data/nmap_performance.reg o Applied patch from Gisle Vanem (giva(a)bgnett.no) which allows the Windows version of Nmap to work with WinPCAP 3.1BETA (and probably @@ -12110,7 +12110,7 @@ o Applied a one-line patch from Dmitry V. Levin (ldv(a)altlinux.org) Nmap 3.40PVT17 [2003-9-12] o Wrote and posted a new paper on version scanning to - http://nmap.org/versionscan.html . Updated nmap-service-probes and + https://nmap.org/versionscan.html . Updated nmap-service-probes and the Nmap man page to simply refer to this URL. o Integrated more service signatures from my own scanning as well as @@ -13022,11 +13022,11 @@ o Applied patch by Max Schubert (nmap(a)webwizarddesign.com) which adds o Added German translation of Nmap man page by Marc Ruef (marc.ruef(a)computec.ch). It is also available at - http://nmap.org/data/nmap_manpage-de.html + https://nmap.org/data/nmap_manpage-de.html o Includes a brand new French translation of the man page by Sebastien Blanchet. You could probably guess that it is available at - http://nmap.org/data/nmap_manpage-fr.html + https://nmap.org/data/nmap_manpage-fr.html o Applied some patches from Chad Loder (cloder(a)loder.us) which update the random IP allocation pool and improve OpenBSD support. Some @@ -14298,7 +14298,7 @@ o Fixed strtol() integer overflow problem found by Renaud Deraison (deraison(a)cvs.nessus.org) o The HTML translation of the Man page at - http://nmap.org/nmap_manpage.html should now be + https://nmap.org/nmap_manpage.html should now be complete (man2html was dropping lines before). o Added a note in the man page that Nmap 2.0+ is believed to be diff --git a/FPEngine.cc b/FPEngine.cc index b759aee74..8a5abec46 100644 --- a/FPEngine.cc +++ b/FPEngine.cc @@ -2,7 +2,7 @@ /*************************************************************************** * FPEngine.cc -- Routines used for IPv6 OS detection via TCP/IP * * fingerprinting. * For more information on how this works in Nmap, see * - * http://nmap.org/osdetect/ * + * https://nmap.org/osdetect/ * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/HACKING b/HACKING index f9d86f03f..f23ac138c 100644 --- a/HACKING +++ b/HACKING @@ -25,7 +25,7 @@ send them. Nmap is a community project and has already benefited greatly from outside contributors (for examples, see the CHANGELOG at -http://nmap.org/changelog.html). Bugfixes, and portability changes +https://nmap.org/changelog.html). Bugfixes, and portability changes will almost always be accepted. Even if you do not have time to track down and patch a problem, bug reports are always welcome. @@ -62,7 +62,7 @@ o Nmap GUI improvements -- Zenmap is the Nmap GUI. If you have (http://rubynmap.sourceforge.net). One of the best ways to help is to join the nmap-dev list -( http://nmap.org/mailman/listinfo/dev ). Requests for +( https://nmap.org/mailman/listinfo/dev ). Requests for assistance and new Nmap-related projects are often posted there. How to make code contributions diff --git a/README-WIN32 b/README-WIN32 index c2808f461..345bc9fcc 100644 --- a/README-WIN32 +++ b/README-WIN32 @@ -1,4 +1,4 @@ Details on installation, compilation, and limitation of the Nmap Security Scanner on the Windows platform is now available in the Nmap -Installation Guide at http://nmap.org/install/ . +Installation Guide at https://nmap.org/install/ . diff --git a/configure b/configure index 37c71243d..335648146 100755 --- a/configure +++ b/configure @@ -1440,7 +1440,7 @@ Optional Packages: and DIR/lib. This is NOT RECOMMENDED because we have made many important fixes to our included libdnet, as described at - http://nmap.org/svn/libdnet-stripped/NMAP_MODIFICATIONS + ./libdnet-stripped/NMAP_MODIFICATIONS --with-libdnet=included Use the libdnet version included with Nmap (default) --with-liblua=DIR Use an existing (compiled) lua lib from DIR/include and DIR/lib. diff --git a/configure.ac b/configure.ac index 79b7dab67..8d5959bdb 100644 --- a/configure.ac +++ b/configure.ac @@ -547,7 +547,7 @@ LIBDNETDIR=libdnet-stripped # specifically asked to use a system version. This is because we have # made many improvements and fixes to our version of dnet. AC_ARG_WITH(libdnet, -AC_HELP_STRING([--with-libdnet=DIR], [Use an existing (compiled) dnet lib from DIR/include and DIR/lib. This is NOT RECOMMENDED because we have made many important fixes to our included libdnet, as described at http://nmap.org/svn/libdnet-stripped/NMAP_MODIFICATIONS]) +AC_HELP_STRING([--with-libdnet=DIR], [Use an existing (compiled) dnet lib from DIR/include and DIR/lib. This is NOT RECOMMENDED because we have made many important fixes to our included libdnet, as described at ./libdnet-stripped/NMAP_MODIFICATIONS]) AC_HELP_STRING([--with-libdnet=included], [Use the libdnet version included with Nmap (default)]), [ case "$with_libdnet" in yes) diff --git a/docs/README b/docs/README index 11b2875bf..24da0ad0f 100644 --- a/docs/README +++ b/docs/README @@ -1,3 +1,3 @@ Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation -site ( http://nmap.org ). +site ( https://nmap.org ). diff --git a/docs/committers.txt b/docs/committers.txt index 2a511e4f0..c6b85d7fb 100644 --- a/docs/committers.txt +++ b/docs/committers.txt @@ -1,6 +1,6 @@ This is a list of fine folks who help bring you Nmap! But not an exclusive list, as many people who contribute greatly to Nmap are not -committers. See the CHANGELOG (http://nmap.org/changelog.html) for a +committers. See the CHANGELOG (https://nmap.org/changelog.html) for a broader list of contributions. These people have earned commit access to the Nmap SVN repository and @@ -39,11 +39,11 @@ bmenrigh - Brandon Enright specializes in large-scale scanning and math/crypto batrick - Patrick Donnelly is a Lua expert and specializes in NSE internals ithilgore - Ithilgore wrote the Ncrack authentication cracker - (http://nmap.org/ncrack/) + (https://nmap.org/ncrack/) luis - Luis MartinGarcia wrote and maintains the Nping tool for packet generation, response analysis, and response time - measurement (http://nmap.org/nping/) + measurement (https://nmap.org/nping/) majek04 - Marek Majkowski wrote a lot of low-level code and several NSE scripts diff --git a/docs/legal-notices.xml b/docs/legal-notices.xml index b0bfb2f8f..f6f01d2e4 100644 --- a/docs/legal-notices.xml +++ b/docs/legal-notices.xml @@ -206,7 +206,7 @@ language The IPv6 +url="https://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6">IPv6 OS detection machine learning techniques. @@ -225,7 +225,7 @@ is included in the LICENSES files. -This software was supported in part through the Google Summer of Code and the DARPA CINDER program (DARPA-BAA-10-84). +This software was supported in part through the Google Summer of Code and the DARPA CINDER program (DARPA-BAA-10-84). diff --git a/docs/man-xlate/nmap-de.1 b/docs/man-xlate/nmap-de.1 index e8962b92e..a29313b9e 100644 --- a/docs/man-xlate/nmap-de.1 +++ b/docs/man-xlate/nmap-de.1 @@ -108,13 +108,13 @@ Nmap done: 1 IP address (1 host up) scanned in 17\&.00 seconds .\} .PP Die neueste Version von Nmap erhält man unter -\m[blue]\fB\%http://nmap.org\fR\m[], und die neueste Version der Manpage ist unter -\m[blue]\fB\%http://nmap.org/book/man.html\fR\m[] +\m[blue]\fB\%https://nmap.org\fR\m[], und die neueste Version der Manpage ist unter +\m[blue]\fB\%https://nmap.org/book/man.html\fR\m[] verfügbar\&. .SH "ÜBERSICHT DER OPTIONEN" .PP Diese Übersicht wird ausgegeben, wenn Nmap ohne Argumente aufgerufen wird; die neueste Version davon ist immer unter -\m[blue]\fB\%http://nmap.org/data/nmap.usage.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/data/nmap.usage.txt\fR\m[] verfügbar\&. Sie hilft dabei, sich die am häufigsten benutzten Optionen zu merken, ist aber kein Ersatz für die detaillierte Dokumentation im Rest dieses Handbuchs\&. Einige obskure Optionen werden hier nicht einmal erwähnt\&. .\" Optionsübersicht .\" Kommandozeilenoptionen: von Nmap @@ -228,7 +228,7 @@ EXAMPLES: nmap \-v \-A scanme\&.nmap\&.org nmap \-v \-sP 192\&.168\&.0\&.0/16 10\&.0\&.0\&.0/8 nmap \-v \-iR 10000 \-PN \-p 80 -SEE THE MAN PAGE (http://nmap\&.org/book/man\&.html) FOR MORE OPTIONS AND EXAMPLES +SEE THE MAN PAGE (https://nmap\&.org/book/man\&.html) FOR MORE OPTIONS AND EXAMPLES .fi .if n \{\ .RE @@ -781,7 +781,7 @@ Port ansieht\&. Nmap verhält sich genauso wie beim Scan\-Basistyp, nur mit dem \fB\-sI \fR\fB\fIzombie host\fR\fR\fB[:\fIprobeport\fR]\fR (Idle\-Scan) .\" -sI .\" Idle-Scan .RS 4 Diese fortgechrittene Scan\-Methode ermöglicht einen wirklich blinden TCP\-Port\-Scan des Ziels, d\&.h\&. es werden keine Pakete von Ihrer wahren IP\-Adresse an das Ziel gesendet\&. Stattdessen wird mit einem Angriff auf einem parallelen Kanal eine vorhersagbare Erzeugung von Folgen von IP\-Fragmentation\-IDs auf dem Zombie\-Host ausgebeutet, um an Information über offene Ports auf dem Ziel zu gelangen\&. IDS\-Systeme zeigen als Urheber des Scans den Zombie\-Rechner an, den Sie angeben (der aktiv sein und einige bestimmte Bedingungen erfüllen muss)\&. -Da dieser faszinierende Scan\-Typ zu komplex ist, um ihn in diesem Handbuch vollständig zu beschreiben, habe ich einen Artikel mit vollständigen Details dazu geschrieben und unter \m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[] veröffentlicht\&. +Da dieser faszinierende Scan\-Typ zu komplex ist, um ihn in diesem Handbuch vollständig zu beschreiben, habe ich einen Artikel mit vollständigen Details dazu geschrieben und unter \m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[] veröffentlicht\&. .sp Dieser Scan\-Typ ist nicht nur extrem unauffällig (wegen seiner Blindheit), sondern erlaubt auch, IP\-basierte Vetrauensbeziehungen zwischen Rechnern festzustellen\&. Die Portliste zeigt offene Ports \fIaus der Sicht des Zombie\-Hosts\fR @@ -939,7 +939,7 @@ Offene|gefilterte TCP\-Ports werden genauso behandelt\&. Beachten Sie, dass die Nmap\-Option \fB\-A\fR unter anderem auch die Versionserkennung einschaltet\&. -A paper documenting the workings, usage, and customization of version detection is available at \m[blue]\fB\%http://nmap.org/book/vscan.html\fR\m[]\&. +A paper documenting the workings, usage, and customization of version detection is available at \m[blue]\fB\%https://nmap.org/book/vscan.html\fR\m[]\&. .PP Wenn Nmap Antworten von einem Dienst erhält, aber keine Übereinstimmungen dafür in seiner Datenbank finden kann, gibt es einen speziellen Fingerprint und eine URL aus, damit Sie diese Antwort einsenden können, falls Sie genau wissen, was auf diesem Port läuft\&. Bitte nehmen Sie sich ein paar Minuten Zeit, um sie einzusenden, damit Ihr Fund für alle ein Gewinn sein kann\&. Dank dieser Beiträge hat Nmap über 3000 Musterübereinstimmungen für über 350 Protokolle wie SMTP, FTP, HTTP usw\&..\" Einsenden von Dienst-Fingerprints .PP @@ -1026,7 +1026,7 @@ aktiviert ist, wird auch die IP\-ID\-Sequenzerzeugung berichtet\&. Die meisten R .PP Eine weitere zusätzliche Information, die die Betriebssystem\-Erkennung aktiviert, ist eine Schätzung der Betriebszeit des Zielhosts\&. Dabei wird die TCP\-Timestamp\-Option (\m[blue]\fBRFC 1323\fR\m[]\&\s-2\u[7]\d\s+2) benutzt, um zu raten, wann ein Rechner das letzte Mal neu gestartet wurde\&. Wenn der Timestamp\-Zähler nicht bei null gestartet wurde oder der Zähler überläuft und wieder von vorn zählt, kann diese Schätzung ungenau werden, weshalb sie nur im ausführlichen Modus ausgegeben wird\&. .PP -A paper documenting the workings, usage, and customization of OS detection is available at \m[blue]\fB\%http://nmap.org/book/osdetect.html\fR\m[]\&. +A paper documenting the workings, usage, and customization of OS detection is available at \m[blue]\fB\%https://nmap.org/book/osdetect.html\fR\m[]\&. .PP Eingeschaltet und gesteuert wird die Betriebssystem\-Erkennung mit den folgenden Optionen: .PP @@ -1078,10 +1078,10 @@ vuln, auth und default\&. Sie alle werden -at \m[blue]\fB\%http://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. +at \m[blue]\fB\%https://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. .PP Die Nmap Scripting Engine wird detailliert -at \m[blue]\fB\%http://nmap.org/book/nse.html\fR\m[] +at \m[blue]\fB\%https://nmap.org/book/nse.html\fR\m[] beschrieben und wird mit den folgenden Optionen gesteuert: .PP \fB\-sC\fR .\" -sC @@ -1108,7 +1108,7 @@ lauten\&. .sp Nmap\-Scripts werden standardmäßig in einem scripts\-Unterverzeichnis des Nmap\-Datenverzeichnisses gespeichert -(see \m[blue]\fB\%http://nmap.org/book/data-files.html\fR\m[])\&. +(see \m[blue]\fB\%https://nmap.org/book/data-files.html\fR\m[])\&. Aus Effizienzgründen werden Scripts in einer Datenbank indiziert, die in scripts/script\&.db\&..\" script.db gespeichert ist und für jedes Script auflistet, in welche Kategorie bzw\&. Kategorien es gehört\&. Um alle Scripts in der Nmap\-Script\-Datenbank auszuführen, geben Sie das Argument @@ -1578,7 +1578,7 @@ Cisco\&. Diese Option betrifft nur Scans mit rohen Paketen wie den SYN\-Scan ode \fB\-\-badsum\fR (sendet Pakete mit falschen TCP/UDP\-Prüfsummen) .\" --badsum .\" TCP-Prüfsumme .\" Prüfsummen .RS 4 Verlangt von Nmap, bei den an Zielhosts gesendeten Paketen ungültige TCP\- oder UDP\-Prüfsummen zu benutzen\&. Da so gut wie alle Host\-IP\-Stacks solche Pakete verwerfen, kommen eventuelle Antworten sehr wahrscheinlich von einer Firewall oder einem IDS, das sich nicht die Mühe macht, die Prüfsumme zu überprüfen\&. Mehr Details zu dieser Methode finden Sie unter -\m[blue]\fB\%http://nmap.org/p60-12.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/p60-12.html\fR\m[]\&. .RE .\" .\" @@ -1681,7 +1681,7 @@ interaktiven Ausgabe\&. Verlangt, dass eine XML\-Ausgabe in der angegebenen Datei gespeichert wird\&. Nmap fügt eine DTD (Document Type Definition) hinzu, mit der XML\-Parser Nmaps XML\-Ausgabe validieren können\&. Diese ist vor allem für die Benutzung durch Programme gedacht, kann aber auch Menschen bei der Interpretation von Nmaps XML\-Ausgabe helfen\&. Die DTD definiert die gültigen Elemente des Formats und zählt an vielen Stellen die dafür erlaubten Attribute und Werte auf\&. Die neueste Version ist immer unter -\m[blue]\fB\%http://nmap.org/data/nmap.dtd\fR\m[] +\m[blue]\fB\%https://nmap.org/data/nmap.dtd\fR\m[] verfügbar\&. .sp XML bietet ein stabiles Format, das man mit Software leicht parsen kann\&. Solche XML\-Parser sind für alle wichtigen Programmiersprachen wie C/C++, Perl, Python und Java gratis verfügbar\&. Manche Leute haben sogar Anbindungen für die meisten dieser Sprachen geschrieben, um speziell die Ausgabe und Ausführung von Nmap zu steuern\&. Beispiele sind @@ -1735,7 +1735,7 @@ und Version info\&. .sp Wie bei der XML\-Ausgabe kann diese Manpage auch hier nicht das vollständige Format dokumentieren\&. Eine detailliertere Betrachtung des grepbaren Ausgabeformats in Nmap finden Sie -from \m[blue]\fB\%http://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. +from \m[blue]\fB\%https://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. .RE .PP \fB\-oA \fR\fB\fIbasename\fR\fR (Ausgabe in allen Formaten) .\" -oA @@ -1890,7 +1890,7 @@ nmap\&.xsl im Dateisystem finden und benutzen, um die Ergebnisse darzustellen\&. Wenn Sie ein anderes Stylesheet benutzen möchten, geben Sie es als Argument für \fB\-\-stylesheet\fR an\&. Dabei müssen Sie den vollständigen Pfadnamen oder die URL angeben\&. Sehr häufig wird -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR benutzt\&. Das sagt einem Browser, dass er die neueste Version des Stylesheets von Nmap\&.Org laden soll\&. Die Option \fB\-\-webxml\fR macht dasselbe, verlangt aber weniger Tipparbeit und Merkfähigkeit\&. Wenn man das XSL von Nmap\&.Org lädt, wird es einfacher, die Ergebnisse auf einem Rechner anzuschauen, auf dem kein Nmap (und folglich auch kein @@ -1902,7 +1902,7 @@ im lokalen Dateisystem benutzt\&. \fB\-\-webxml\fR (lade Stylesheet von Nmap\&.Org) .\" --webxml .RS 4 Diese bequeme Option ist nur ein Alias für -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR\&. +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR\&. .RE .PP \fB\-\-no\-stylesheet\fR (lasse XSL\-Stylesheet\-Deklaration im XML weg) .\" --no-stylesheet @@ -2115,7 +2115,7 @@ Das scannt 4096 IPs nach Webservern (ohne sie anzupingen) und speichert die Ausg Auch wenn dieser Reference Guide alle wesentlichen Nmap\-Optionen genau beschreibt, kann er nicht vollständig zeigen, wie man diese Features anwendet, um Aufgaben der realen Welt zu lösen\&. Zu diesem Zweck haben wir das Buch Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning\&. Es zeigt, wie man Firewalls und Intrusion Detection\-Systeme unterwandert, die Performance von Nmap optimiert, und wie man häufige Netzwerkaufgaben mit der Nmap Scripting Engine automatisiert\&. Außerdem enthält es Tipps und Anleitungen für häufige Nmap\-Aufgaben wie die Netzwerkinventarisierung, Penetrationstests, die Erkennung schurkischer Wireless Access Points und das Verhindern von Wurmausbrüchen im Netzwerk\&. Dabei zeigt es mit Beispielen und Diagrammen, wie die Kommunikation auf der Leitung aussieht\&. Mehr als die Hälfte des Buches ist online frei verfügbar\&. Weitere Informationen finden Sie unter -\m[blue]\fB\%http://nmap.org/book\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book\fR\m[]\&. .PP Die deutsche Übersetzung dieses Buches von Dinu Gherman ist im Mai 2009 unter dem Titel \m[blue]\fBNmap: Netzwerke scannen, analysieren und absichern\fR\m[]\&\s-2\u[14]\d\s+2 @@ -2125,7 +2125,7 @@ im .\" Fehlerberichte .PP Wie sein Autor ist auch Nmap selbst nicht perfekt\&. Aber Sie können helfen, es zu verbessern, indem Sie Fehlerberichte schicken oder sogar Patches schreiben\&. Falls Nmap sich nicht wie erwartet verhält, sollten Sie zuerst auf die neueste Version aktualisieren, die unter -\m[blue]\fB\%http://nmap.org\fR\m[] +\m[blue]\fB\%https://nmap.org\fR\m[] verfügbar ist\&. Wenn das Problem anhält, versuchen Sie herauszufinden, ob es bereits erkannt und bearbeitet wurde\&. Suchen Sie nach der Fehlermeldung auf unserer Suchseite unter \m[blue]\fB\%http://insecure.org/search.html\fR\m[] oder bei Google\&. Stöbern Sie in den @@ -2135,10 +2135,10 @@ Lesen Sie auch diese Manpage vollständig\&. Wenn Sie keine Lösung finden, schi \&. Beschreiben Sie darin bitte alles, was Sie über das Problem wissen, inklusive der Nmap\-Version und der Betriebssystemversion, unter der Sie Nmap einsetzen\&. Berichte von Problemen und Fragen zur Anwendung von Nmap werden sehr viel wahrscheinlicher beantwortet, wenn sie an geschickt werden statt direkt an Fyodor\&. Wenn Sie sich erst auf der nmap\-dev\-Liste eintragen, bevor Sie Ihre E\-Mail schicken, entgeht Ihre Nachricht auch der Moderation und kommt schneller an\&. Eintragen können Sie sich unter -\m[blue]\fB\%http://nmap.org/mailman/listinfo/dev\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/mailman/listinfo/dev\fR\m[]\&. .PP Code\-Patches zur Behebung von Fehlern sind noch besser als Fehlerberichte\&. Eine einfache Anweisung für die Erstellung von Patch\-Dateien mit Ihren Änderungen ist unter -\m[blue]\fB\%http://nmap.org/data/HACKING\fR\m[] +\m[blue]\fB\%https://nmap.org/data/HACKING\fR\m[] verfügbar\&. Patches können an nmap\-dev (empfohlen) oder direkt an Fyodor geschickt werden\&. @@ -2151,7 +2151,7 @@ Fyodor Über die Jahre haben hunderte von Menschen wertvolle Beiträge zu Nmap geleistet\&. Sie sind detailliert in der Datei CHANGELOG.\" changelog aufgeführt, die mit dem Nmap\-Quellcode verbreitet wird und auch unter -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[] +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[] verfügbar ist\&. .SH "" .PP @@ -2223,7 +2223,7 @@ Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning .RS 4 -\%http://nmap.org/book/ +\%https://nmap.org/book/ .RE .IP "14." 4 Nmap: Netzwerke scannen, analysieren und absichern @@ -2238,5 +2238,5 @@ Open Source Press .IP "16." 4 English version .RS 4 -\%http://nmap.org/book/man-legal.html +\%https://nmap.org/book/man-legal.html .RE diff --git a/docs/man-xlate/nmap-es.1 b/docs/man-xlate/nmap-es.1 index 5a114b135..ab1dbca90 100644 --- a/docs/man-xlate/nmap-es.1 +++ b/docs/man-xlate/nmap-es.1 @@ -713,7 +713,7 @@ abierto|filtrado\&. Nmap se comportará igual que para el sondeo tipo base, con \fB\-sI \fR (Sondeo ocioso) .RS 4 Este es un método de sondeo avanzado que le permite hacer un sondeo de puertos TCP a ciegas de verdad (lo que significa que no se envía ningún paquete al sistema objetivo desde su dirección IP real)\&. En lugar de ésto se utiliza un ataque con un canal alternativo que se aprovecha de la generación de la secuencia de los identificadores de fragmentación IP del sistema zombi para obtener información de los puertos abiertos en el objetivo\&. Los sistemas IDS mostrarán que el sondeo lo está realizando el sistema zombi que especifique (que debe estar vivo y cumplir algunos requisitos)\&. Este tipo de sondeo tan fascinante es demasiado complejo como para describirlo por completo en esta guía de referencia por lo que escribí y publiqué un documento informal que contiene todos los detalles, el documento está disponible en -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Además de ser extraordinariamente sigiloso (debido a su funcionamiento a ciegas), este tipo de sondeo permite determinar las relaciones basadas en IP entre distintos sistemas\&. El listado de puertos muestra los puertos abiertos \fIdesde la perspectiva del sistema zombi\&.\fR @@ -1192,7 +1192,7 @@ Cisco\&. \fB\-\-badsum\fR (Envía paquetes con sumas de comprobación TCP/UDP erróneas) .RS 4 Esta opción le indica a Nmap que debe generar sumas de comprobación inválidas para los paquetes que se envíen a los equipos objetivos\&. Cualquier respuesta que se reciba vendrá de un cortafuegos o un IDS que no comprobó la suma, dado que la mayoría de las pilas IP descartan estos paquetes\&. Para obtener más información de esta técnica puede consultar -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[] .RE .SH "SALIDA" .PP diff --git a/docs/man-xlate/nmap-fr.1 b/docs/man-xlate/nmap-fr.1 index 3a40864fe..820a7767d 100644 --- a/docs/man-xlate/nmap-fr.1 +++ b/docs/man-xlate/nmap-fr.1 @@ -692,7 +692,7 @@ ouvert|filtré\&. Nmap se comportera de la même façon que le type de scan de b .PP \fB\-sI \fR(Scan passif \-\- idlescan) .RS 4 -Cette méthode de scan avancé permet de faire un véritable scan de port TCP en aveugle, (dans le sens où aucun paquet n\*(Aqest envoyé directement à la cible depuis votre vraie adresse IP)\&. En effet, la technique employée consiste à récolter des informations sur les ports ouverts de la cible en utilisant un exploit basé sur la prédictibilité de la génération des identifiants de fragmentation IP de l\*(Aqhôte relais (le zombie)\&. Les systèmes IDS considéreront que le scan provient de la machine zombie que vous avez spécifié (qui doit remplir certains critères)\&. Le mécanisme de cette incroyable technique est trop complexe pour être expliqué en détail dans ce guide; un papier informel a été posté pour rendre compte de tous ces détails:\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +Cette méthode de scan avancé permet de faire un véritable scan de port TCP en aveugle, (dans le sens où aucun paquet n\*(Aqest envoyé directement à la cible depuis votre vraie adresse IP)\&. En effet, la technique employée consiste à récolter des informations sur les ports ouverts de la cible en utilisant un exploit basé sur la prédictibilité de la génération des identifiants de fragmentation IP de l\*(Aqhôte relais (le zombie)\&. Les systèmes IDS considéreront que le scan provient de la machine zombie que vous avez spécifié (qui doit remplir certains critères)\&. Le mécanisme de cette incroyable technique est trop complexe pour être expliqué en détail dans ce guide; un papier informel a été posté pour rendre compte de tous ces détails:\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp En plus de son incroyable furtivité (en raison du caractère aveugle de la technique), ce type de scan permet de déterminer les relations de confiance entre les machines\&. La liste des ports ouverts est établie \fIdu point de vue de l\*(Aqhôte zombie\&.\fR @@ -1368,7 +1368,7 @@ Si vous souhaitez voir les options dans les paquets envoyés et recus, spécifie \fB\-\-badsum\fR (Envoyer des paquets avec des sommes de contrôle TCP/UDP erronnées) .RS 4 Demande a Nmap d\*(Aqutiliser une somme de contrôle TCP ou UDP erronnée pour les paquets envoyés aux hôtes cibles\&. Comme virtuellement toutes les piles IP des hôtes rejettent ces paquets, toute réponse recue doivent venir d\*(Aqun pare\-feu ou d\*(Aqun IDS qui ne se préoccuppe pas de vérifier les sommes de contrôle\&. Pour plus de détails sur cette technique, voir -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[] .RE .PP \fB\-\-ttl \fR (Règle la valeur du champ IP de durée de vie (time\-to\-live)) diff --git a/docs/man-xlate/nmap-hr.1 b/docs/man-xlate/nmap-hr.1 index b170e0e48..b5e995d55 100644 --- a/docs/man-xlate/nmap-hr.1 +++ b/docs/man-xlate/nmap-hr.1 @@ -647,7 +647,7 @@ otvoren|filtriran\&. Nmap će se ponašati isto kao što se ponaša kod specific \fB\-sI \fR (Idlescan) .RS 4 Ova napredna metoda skeniranja omogućava slijepo skeniranje ciljanog računala (niti jedan paket nije poslan na ciljano računalo s vaše stvarne IP adrese)\&.Umjesto toga koristite zombie host računalo i predvidljiv IP fragmentation ID na njemu kako bi dobili informaciju o tome koji su portovi otvoreni na ciljanom računalu\&. IDS sustavi će pokazati da scan dolazi sa zombie mašine kojju ste specificirali kod pokretanja ovog tipa skeniranja (zombie mora biti upaljen i mora zadovoljavati neke kriterije)\&. Ovaj način skeniranja je prekompleksan da bi ga ovdje opisali u potpunosti, pa sam napisao i postao informativni članak sa svim detaljima na -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Osim što je nevjerovatno nevidljiv (zbog načina na koji radi) ovaj tip skeniranja omogućava mapiranje IP baziranih pravila između računala\&. Ispis portova pokazuje otvorene portove \fIkako ih vidi zombi računalo\&.\fR @@ -1131,7 +1131,7 @@ Cisco\&. \fB\-\-badsum\fR (Šalji pakete s lažnim TCP/UDP checksumom) .RS 4 Ova opcija traži od Nmap\-a da koristi neispravne TCP i UDP checksume za pakete koje šalje na ciljano računalo\&. Kako skoro svaki IP stack odbacuje takve pakete, svaki odgovor koji dobijete najvjerovatnie dolazi od vatrozida ili IDS sustava koji nisu provjeravali checksum\&. Za više detalja o ovoj tehnici, pogledajte: -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[]\&. .RE .SH "IZVJEšTAJI" .PP diff --git a/docs/man-xlate/nmap-hu.1 b/docs/man-xlate/nmap-hu.1 index bd15f3d5e..52e6e29a2 100644 --- a/docs/man-xlate/nmap-hu.1 +++ b/docs/man-xlate/nmap-hu.1 @@ -113,9 +113,9 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88\&.392 seconds .\} .PP Az Nmap legújabb változata a -\m[blue]\fB\%http://nmap.org\fR\m[] +\m[blue]\fB\%https://nmap.org\fR\m[] címről tölthető le\&. A legfrissebb kézikönyv a -\m[blue]\fB\%http://nmap.org/man/\fR\m[] +\m[blue]\fB\%https://nmap.org/man/\fR\m[] címről tölthető le\&. .SH "MEGJEGYZéS A FORDíTáSHOZ" .PP @@ -128,7 +128,7 @@ alapján szabadon módosítható és terjeszthető\&. .SH "PARAMéTER öSSZEFOGLALó" .PP Ez az összefoglaló akkor jelenik meg, amikor az Nmap programot paraméterek nélkül indítjuk el\&. A legfrissebb változata a -\m[blue]\fB\%http://nmap.org/data/nmap.usage.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/data/nmap.usage.txt\fR\m[] címen érhető el\&. Ez a lista segít emlékezni a legáltalánosabb paraméterekre, de nem helyettesíti az útmutatóban található részletes dokumentációt\&. Néhány rejtett paraméter szintén nem található meg ebben a listában\&. .PP .if n \{\ @@ -765,7 +765,7 @@ nyitott|szűrt \fB\-sI \fR (Üresjárati letapogatás) .\" -sI .\" Üresjárati letapogatás .RS 4 Ez a fejlett eljárás egy igazi vakon végzett TCP letapogatást hajt végre a célállomáson (ez azt jelenti, hogy a saját IP címéről semmilyen csomag nem lesz elküldve a célállomásra)\&. Ehelyett kihasználjuk azt, hogy a zombi gépen megjósolható az IP töredezettségmező sorszámgenerátorának következő értéke és ezzel az oldaltámadással szerzünk információt a célgépen lévő nyitott kapukról\&. A behatolásérzékelő rendszerek úgy látják majd, hogy a letapogatás a zombi állomás felől érkezett (melynek élőnek kell lennie és meg kell felelnie bizonyos követelményeknek)\&. Ez az elbűvölő letapogatás túl bonyolult ahhoz, hogy ebben a leírásban részletesen is foglalkozhassunk vele, ezért írtam egy részletes leírást róla, mely a -\m[blue]\fB\%http://nmap.org/idlescan.html\fR\m[] +\m[blue]\fB\%https://nmap.org/idlescan.html\fR\m[] címen olvasható\&. .sp Amellett, hogy különösen rejtett, ezzel a letapogatással kihasználható a gépek közötti, IP alapú bizalmi viszony\&. A nyitott kapuk ebben az esetben @@ -896,7 +896,7 @@ nyitott|szűrt TCP kapukat hasonló módon kezeli\&. Jegyezze meg, hogy az Nmap \fB\-A\fR paramétere más dolgok mellett a változat érzékelést is engedélyezi\&. A változat érzékelés működéséről, használatáról és paraméterezéséről a -\m[blue]\fB\%http://nmap.org/vscan/\fR\m[] +\m[blue]\fB\%https://nmap.org/vscan/\fR\m[] címen talál részletes leírást\&. .PP Ha az Nmap kap ugyan választ egy szolgáltatástól, de az adatbázis alapján nem tudja azonosítani, kinyomtat egy különleges ujjlenyomatot és egy URL\-t\&. Ha biztos abban, hogy milyen szolgáltatás fut az adott kapun, a megadott címen az ujjlenyomat segítségével megadhatja a szolgáltatás típusát\&. Szánjon erre pár percet, hogy mindenki élvezhesse az Ön felfedezésének eredményét\&. Ezeknek az adatoknak köszönhetően az Nmap kb\&. 3000 mintát ismer több, mint 350 protokollhoz\&. @@ -979,7 +979,7 @@ paraméter mellett használja, az IP ID sorszám előállításról is jelentés osztályba tartozik, ami azt jelenti, hogy minden egyes elküldött csomagnál növelik az IP fejléc ID mezőjének értékét\&. Ez sebezhetővé teszi őket néhány fejlett információ gyűjtési és megtévesztési támadással szemben\&. .PP Az operációs rendszer érzékelésének működésével, használatával és testreszabásával kapcsolatban a -\m[blue]\fB\%http://nmap.org/osdetect/\fR\m[] +\m[blue]\fB\%https://nmap.org/osdetect/\fR\m[] címen talál egy leírást\&. .PP Az operációs rendszer érzékelése és vezérlése a következő paraméterekkel lehetséges: @@ -1018,7 +1018,7 @@ Amikor az Nmap operációs rendszer érzékelést végez egy célponton és nem Az Nmap parancsfájl motor (NSE) egyesíti az Nmap hatékony hálózatkezelését a \m[blue]\fBLua\fR\m[]\&\s-2\u[8]\d\s+2 könnyűsúlyú parancsnyelv sokoldalúságával, így kínálva számtalan lehetőséget\&. A -\m[blue]\fB\%http://nmap.org/nse/\fR\m[] +\m[blue]\fB\%https://nmap.org/nse/\fR\m[] címen bőséges dokumentációt talál az NSE\-ről (beleértve a programozói felületet is)\&. Az NSE célja, hogy hatékony környezetet biztosítson az Nmap képességeinek kiterjesztéséhez és a felhasználók számára egyszerűbbé tegye testreszabott tesztek létrehozását\&. Az NSE felhasználási területei: .PP \fIKiterjesztett változat érzékelés\fR @@ -1065,7 +1065,7 @@ vagy ssl), a kapu mögött futó szolgáltatás nevéhez és feltételesen a változat érzékeléssel megszerzett információkhoz\&. Az NSE parancsfájlok hagyományosan rendelkeznek egy nse kiterjesztéssel\&. Bár jelenleg nem szükséges követnie ezt a szokást, ez a jövőben változhat\&. Az Nmap figyelmeztetni fogja, ha egy fájlnak más a kiterjesztése\&. Az NSE\-ről további bőséges dokumentációt találhat (beleértve a programozói felület leírását) a -\m[blue]\fB\%http://nmap.org/nse/\fR\m[] +\m[blue]\fB\%https://nmap.org/nse/\fR\m[] címen\&. .PP \fB\-sC\fR .\" -sC @@ -1494,7 +1494,7 @@ Cisco\&. \fB\-\-badsum\fR (Csomagok küldése hamis TCP/UDP ellenőrző összeggel) .\" --badsum .RS 4 Az Nmap a csomagokat hamis TCP vagy UDP ellenőrző összeggel fogja elküldeni a célpont felé\&. Mivel elméletileg minden állomás IP verme az ilyen csomagokat helyesen eldobja, ezért bármilyen válasz tűzfalra vagy IDS rendszerre utal, melyek nem foglalkoznak az ellenőrző összeg vizsgálatával\&. További részletek erről a technikáról a -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[] címen\&. .RE .SH "KIMENET" @@ -1594,7 +1594,7 @@ interaktív kimenettől\&. Ezzel a kéréssel az XML kimenet a megadott nevű fájlba lesz átirányítva\&. Az Nmap a fájlhoz hozzáfűz egy dokumentum típusmeghatározást si (DTD), így az XML feldolgozók ellenőrizhetik az Nmap XML kimenetét\&. Bár ez elsősorban programbeli felhasználásra készült, de segítséget nyújt az embereknek is az Nmap XML kimenetének értelmezésében\&. A DTD leírja a formátum érvényes elemeit és gyakran felsorolja a tulajdonságokat és azok értékeit is\&. A legfrissebb változat mindig megtalálható a -\m[blue]\fB\%http://nmap.org/data/nmap.dtd\fR\m[] +\m[blue]\fB\%https://nmap.org/data/nmap.dtd\fR\m[] címen\&. .sp XML egy stabil formátumot kínál, mely programból könnyen feldolgozható\&. Ingyenes XML feldolgozók az összes nagyobb programozási nyelvhez elérhetők, beleértve a C/C++, Perl, Python és Java nyelveket\&. Az Nmap kimenetének feldolgozására és működésének vezérlésére a legtöbb nyelvhez már készültek kapcsolódó munkák\&. Perl CPAN példák találhatók a @@ -1767,7 +1767,7 @@ nmap\&.xsl fájlt és megjeleníti az eredményeket\&. Ha más stíluslapot akar használni, adja meg azt a \fB\-\-stylesheet\fR kapcsoló után\&. A teljes útvonalat vagy címet meg kell adnia\&. Egy megszokott hivatkozás a -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR\&. Ez arra utasítja a böngészőt, hogy az Insecure\&.org címről töltse be a legfrissebb stíluslapot\&. A +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR\&. Ez arra utasítja a böngészőt, hogy az Insecure\&.org címről töltse be a legfrissebb stíluslapot\&. A \fB\-\-webxml\fR paraméterrel ugyanezt a hatást érheti el, csak kevesebbet kell gépelni és megjegyezni\&. Az Insecure\&.org címről letöltött stíluslap segítségével olyan gépen is megtekintheti az eredményeket, melyen nincs telepítve az Nmap (és így az nmap\&.xsl @@ -1779,7 +1779,7 @@ használata\&. \fB\-\-webxml\fR (Stíluslap betöltése az Insecure\&.Org oldalról) .\" --webxml .RS 4 Ez egy kényelmesebb megvalósítása a -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR kapcsolónak\&. .RE .PP @@ -1986,7 +1986,7 @@ Visszhang próbák nélkül letapogat 4096 IP címet webkiszolgáló után kutat .SH "HIBáK" .PP Akárcsak a program készítője, az Nmap sem tökéletes\&. De segíthet jobbá tenni, ha elküldi a felfedezett hibák leírását, vagy javítást készít hozzájuk\&. Ha az Nmap nem az elvárásai szerint működik, először mindig szerezze be a legfrissebb változatot a -\m[blue]\fB\%http://nmap.org\fR\m[] +\m[blue]\fB\%https://nmap.org\fR\m[] címről\&. Ha a probléma továbbra is fennáll, nézzen utána, hogy felfedezték\-e már mások is\&. Keressen rá a Google\-ban a hibaüzenetre vagy böngéssze át az Nmap fejlesztői listát a \m[blue]\fB\%http://seclists.org/\fR\m[] címen\&. Olvassa végig ezt a leírást is\&. Ha nem talál semmit, küldjön egy hibajelentést az @@ -1994,7 +1994,7 @@ címen\&. Olvassa végig ezt a leírást is\&. Ha nem talál semmit, küldjön e címre\&. Írjon le mindent, amit a hibával kapcsolatban tapasztalt\&. Adja meg pontosan a használt Nmap változatot és a futtató operációs rendszer változatát is\&. Az dev@nmap\&.org címre küldött hibajelzések és az Nmap használatával kapcsolatos kérdések valószínűleg gyorsabban megválaszolásra kerülnek, mintha azokat közvetlenül a program készítőjének (Fyodor) küldené\&. .PP A hibajavítások sokkal hasznosabbak, mint a hibajelentések\&. A hibajavítások elkészítésével kapcsolatban tanácsokat kaphat a -\m[blue]\fB\%http://nmap.org/data/HACKING\fR\m[] +\m[blue]\fB\%https://nmap.org/data/HACKING\fR\m[] címen\&. A hibajavítások elküldhetők az nmap\-dev listára (ez a javasolt), vagy közvetlenül a készítőnek is\&. .SH "SZERZő" .PP @@ -2005,7 +2005,7 @@ Fyodor Az évek során emberek százai járultak hozzá értékes munkájukkal az Nmap programhoz\&. Ezek részletezése megtalálható a CHANGELOG fájlban, mely az Nmap program terjesztése mellett elérhető a -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[] +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[] címen is\&. .SH "JOGI NYILATKOZAT" .SS "Nmap szerzői jog és licenc.\" szerzői jog .\" licenc .\" GNU GPL" @@ -2080,7 +2080,7 @@ Kapcsolódik olyan programkönyvtárhoz, vagy futtat olyan programot mely az el Az \(lqNmap\(rq kifejezés felhasználható az Nmap programból származtatott munkák bármely részére\&. A fenti lista nem kizárólagos, csak néhány példán keresztül megpróbálja tisztázni az Nmap készítőinek értelmezését a származtatott munkákkal kapcsolatban\&. Ezek a korlátozások kizárólag akkor érvényesek, ha Ön valójában továbbértékesíti az Nmap programot\&. Például semmi nem tiltja, hogy Ön kezelő felületet készítsen az Nmap programhoz és azt üzleti céllal forgalmazza\&. Terjessze a programot önállóan és hívja fel a felhasználók figyelmét, hogy az Nmap programot külön kell letölteniük a -\m[blue]\fB\%http://nmap.org\fR\m[] +\m[blue]\fB\%https://nmap.org\fR\m[] címről\&. .PP A program készítői nem gondolják, hogy a fentiek további korlátozásokat adnának a GPL\-hez, kizárólag annak tisztázására szolgálnak, hogyan értelmezik a @@ -2161,7 +2161,7 @@ USA export korlátozás: az Insecure\&.Com LLC úgy véli, hogy az Nmap a US ECC .IP " 1." 4 eredeti angol változat .RS 4 -\%http://nmap.org/book/man.html +\%https://nmap.org/book/man.html .RE .IP " 2." 4 Creative Commons Attribution License @@ -2216,7 +2216,7 @@ Nmap::Parser .IP "12." 4 Nmap license details .RS 4 -\%http://nmap.org/book/man-legal.html +\%https://nmap.org/book/man-legal.html .RE .IP "13." 4 Apache Software Foundation diff --git a/docs/man-xlate/nmap-id.1 b/docs/man-xlate/nmap-id.1 index 6fa4556b3..aa8a25bd8 100644 --- a/docs/man-xlate/nmap-id.1 +++ b/docs/man-xlate/nmap-id.1 @@ -106,8 +106,8 @@ Nmap done: 1 IP address (1 host up) scanned in 17\&.00 seconds .\} .PP Versi terbaru Nmap dapat diperoleh dari -\m[blue]\fB\%http://nmap.org\fR\m[]\&. Versi terbaru man page tersedia di -\m[blue]\fB\%http://nmap.org/book/man.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org\fR\m[]\&. Versi terbaru man page tersedia di +\m[blue]\fB\%https://nmap.org/book/man.html\fR\m[]\&. .SH "CATATAN TERJEMAHAN" .PP Edisi bahasa Indonesia Nmap Reference Guide ini diterjemahkan dari versi [12855] @@ -117,7 +117,7 @@ oleh Tedi Heriyanto\&. Meskipun kami berharap bahwa hal ini akan membuat Nmap le .SH "RINGKASAN OPSI" .PP Ringkasan opsi ini ditampilkan ketika Nmap dijalankan tanpa argumen, dan versi terakhir selalu tersedia di -\m[blue]\fB\%http://nmap.org/data/nmap.usage.txt\fR\m[]\&. Ia membantu mengingat opsi\-opsi umum, namun ia bukanlah pengganti dokumentasi lengkap dalam halaman\-halaman berikut manual ini\&. Bahkan beberapa opsi tersembunyi tidak disertakan di sini\&. +\m[blue]\fB\%https://nmap.org/data/nmap.usage.txt\fR\m[]\&. Ia membantu mengingat opsi\-opsi umum, namun ia bukanlah pengganti dokumentasi lengkap dalam halaman\-halaman berikut manual ini\&. Bahkan beberapa opsi tersembunyi tidak disertakan di sini\&. .\" summary of options .\" command-line options: of Nmap .sp @@ -230,7 +230,7 @@ EXAMPLES: nmap \-v \-A scanme\&.nmap\&.org nmap \-v \-sP 192\&.168\&.0\&.0/16 10\&.0\&.0\&.0/8 nmap \-v \-iR 10000 \-PN \-p 80 -SEE THE MAN PAGE (http://nmap\&.org/book/man\&.html) FOR MORE OPTIONS AND EXAMPLES +SEE THE MAN PAGE (https://nmap\&.org/book/man\&.html) FOR MORE OPTIONS AND EXAMPLES .fi .if n \{\ .RE @@ -758,7 +758,7 @@ open|filtered\&. Nmap akan berperilaku sama dengan jenis scan dasar, kecuali ia \fB\-sI \fR\fB\fIzombie host\fR\fR\fB[:\fIprobeport\fR]\fR (idle scan) .\" -sI .\" idle scan .RS 4 Metode scan tingkat tinggi ini memungkinkan scan port TCP secara tersembunyi (artinya tidak ada paket dikirim ke target dari alamat IP anda yang sebenarnya)\&. Alih\-alih, serangan side\-channel mengeksploitasi pembuatan urutan ID fragmentasi IP yang mudah ditebak pada host zombi untuk memperoleh informasi tentang port terbuka pada target\&. Sistem IDS akan menampilkan scan berasal dari mesin zombi yang anda spesifikasikan (yang harus up dan memenuhi beberapa kriteria)\&. -Jenis scan menarik ini terlalu kompleks untuk dijelaskan dalam panduan referensi ini, sehingga saya menulis dan menaruh paper informal dengan detil penuh di \m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +Jenis scan menarik ini terlalu kompleks untuk dijelaskan dalam panduan referensi ini, sehingga saya menulis dan menaruh paper informal dengan detil penuh di \m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Selain sangat tersembunyi (karena sifat blind\-nya), jenis scan ini mengijinkan pemetaan relasi kepercayaan berbasis IP antar mesin\&. Daftar port menampilkan port terbuka \fIdari perspektif host zombi\&.\fR @@ -914,7 +914,7 @@ open|filtered diperlakukan dalam cara yang sama\&. Perhatikan bahwa opsi \fB\-A\fR di antaranya mengaktifkan deteksi versi\&. -Sebuah paper yang mendokumentasikan cara kerja, penggunaan, dan kustomisasi deteksi versi tersedia di \m[blue]\fB\%http://nmap.org/book/vscan.html\fR\m[]\&. +Sebuah paper yang mendokumentasikan cara kerja, penggunaan, dan kustomisasi deteksi versi tersedia di \m[blue]\fB\%https://nmap.org/book/vscan.html\fR\m[]\&. .PP Bila Nmap menerima respon dari sebuah layanan namun tidak dapat mencocokkannya ke database, ia akan mencetak fingerprint khusus dan sebuah URL untuk menyerahkannya bila anda tahu secara pasti apa yang berjalan pada port tersebut\&. Mohon meluangkan waktu beberapa menit untuk menyerahkannya sehingga dapat bermanfaat bagi semua orang\&. Berkat penyerahan ini, Nmap memiliki sekitar 3\&.000 pola yang sesuai untuk lebih dari 350 protokol seperti SMTP, FTP, HTTP, dsb\&..\" submission of service fingerprints .PP @@ -995,7 +995,7 @@ or .PP Informasi ekstra lain yang disertakan dalam deteksi SO adalah menduga waktu uptime target\&. Tekniknya menggunakan opsi timestamp TCP (\m[blue]\fBRFC 1323\fR\m[]\&\s-2\u[9]\d\s+2) untuk menduga waktu terakhir mesin direboot\&. Dugaan dapat tidak akurat akibat counter timestamp tidak diinisialisasi ke nol atau counter overflow dan kembali ke awal, sehingga ia hanya dicetak dalam mode verbose\&. .PP -Sebuah paper yang mendokumentasikan cara kerja, penggunaan, dan kustomisasi deteksi SO tersedia di \m[blue]\fB\%http://nmap.org/book/osdetect.html\fR\m[]\&. +Sebuah paper yang mendokumentasikan cara kerja, penggunaan, dan kustomisasi deteksi SO tersedia di \m[blue]\fB\%https://nmap.org/book/osdetect.html\fR\m[]\&. .PP Deteksi SO diaktifkan dan dikendalikan dengan opsi\-opsi berikut: .PP @@ -1046,10 +1046,10 @@ discovery, vuln, auth, and default\&. These are all described -at \m[blue]\fB\%http://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. +at \m[blue]\fB\%https://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. .PP Nmap Scripting Engine dijelaskan lebih rinci -di \m[blue]\fB\%http://nmap.org/book/nse.html\fR\m[] +di \m[blue]\fB\%https://nmap.org/book/nse.html\fR\m[] dan dikendalikan oleh opsi\-opsi berikut ini: .PP \fB\-sC\fR .\" -sC @@ -1077,7 +1077,7 @@ nse\&. Skrip Nmap secara baku disimpan dalam subdirektori scripts direktori data Nmap -(lihat \m[blue]\fB\%http://nmap.org/book/data-files.html\fR\m[])\&. +(lihat \m[blue]\fB\%https://nmap.org/book/data-files.html\fR\m[])\&. Demi efisiensi, skrip diindeks dalam database yang disimpan dalam scripts/script\&.db\&..\" script.db yang mendaftar kategori atau kategori\-kategori yang dimiliki skrip\&. Berikan argumen @@ -1536,7 +1536,7 @@ Cisco\&. Opsi ini hanya mempengaruhi scan paket raw seperti SYN scan atau deteks \fB\-\-badsum\fR (Send packets with bogus TCP/UDP checksums) .\" --badsum .\" TCP checksum .\" checksums .RS 4 Meminta Nmap untuk menggunakan checksum TCP atau UDP tidak valid untuk paket yang dikirimkan ke host target\&. Karena secara virtual seluruh stack IP host akan secara tepat men\-drop paket ini, sembarang respon yang diterima adalah kemungkinan berasal dari firewall atau IDS yang tidak peduli untuk memverifikasi checksum\&. Detil lebih lanjut mengenai teknik ini, dapat dilihat pada -\m[blue]\fB\%http://nmap.org/p60-12.html\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.html\fR\m[] .RE .\" .\" @@ -1633,7 +1633,7 @@ interactive output\&. .RS 4 XML output diarahkan ke namafile yang diberikan\&. Nmap menyertakan document type definition (DTD) yang memungkinkan parser XML memvalidasi output XML Nmap\&. Walau utamanya ditujukan untuk penggunaan programatik, ia dapat juga membantu manusia menginterpretasikan output XML Nmap\&. DTD mendefinisikan elemen legal format, dan seringkali merinci atribut dan nilai yang dapat mereka terima\&. Versi terakhir selalu tersedia di -\m[blue]\fB\%http://nmap.org/data/nmap.dtd\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/data/nmap.dtd\fR\m[]\&. .sp XML memberikan format stabil yang dapat secara mudah diparse oleh software\&. Parser XML yang bebas tersedia untuk bahasa pemrograman utama, termasuk C/C++, Perl, Python, dan Java\&. Orang bahkan telah menulis binding untuk kebanyakan bahasa ini untuk menangani output Nmap dan dijalankan secara khusus\&. Contohnya adalah \m[blue]\fBNmap::Scanner\fR\m[]\&\s-2\u[12]\d\s+2.\" Nmap::Scanner @@ -1684,7 +1684,7 @@ SunRPC info, dan Version info\&. .sp Sebagaimana dengan output XML, man page ini tidak memungkinkan untuk mendokumentasi seluruh format\&. Rincian lebih lanjut mengenai format output grepable Nmap tersedia -dari \m[blue]\fB\%http://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. +dari \m[blue]\fB\%https://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. .RE .PP \fB\-oA \fR\fB\fIbasename\fR\fR (Output to all formats) .\" -oA @@ -1828,7 +1828,7 @@ tempat awalnya ia diinstalasi oleh Nmap (atau pada direktori kerja saat ini pada nmap\&.xsl dari filesystem dan menggunakannya untuk merender hasil\&. Jika anda ingin menggunakan stylesheet yang berbeda, berikan ia sebagai argumen bagi \fB\-\-stylesheet\fR\&. Anda harus memberikan nama path atau URL lengkap\&. Cara pemanggilan umum adalah -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR\&. Cara ini memberitahu browser untuk memuat versi terakhir stylesheet dari Nmap\&.Org\&. Opsi +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR\&. Cara ini memberitahu browser untuk memuat versi terakhir stylesheet dari Nmap\&.Org\&. Opsi \fB\-\-webxml\fR melakukan hal yang sama dengan cara yang lebih singkat\&. Memuatkan XSL dari Nmap\&.Org memudahkan melihat hasil pada mesin yang tidak memiliki Nmap (dan karenanya tidak memiliki nmap\&.xsl)\&. Jadi URL seringkali lebih bermanfaat, namun lokasi filesistem lokal @@ -1839,7 +1839,7 @@ digunakan secara baku demi alasan privasi\&. \fB\-\-webxml\fR (Load stylesheet from Nmap\&.Org) .\" --webxml .RS 4 Opsi kenyamanan ini adalah sekedar alias bagi -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR\&. +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR\&. .RE .PP \fB\-\-no\-stylesheet\fR (Omit XSL stylesheet declaration from XML) .\" --no-stylesheet @@ -2054,7 +2054,7 @@ Memeriksa 4096 IP untuk sembarang web server (tanpa mem\-ping mereka) dan menyim .\" bugs, reporting .PP Seperti penulisnya, Nmap tidaklah sempurna\&. Namun anda dapat membantu membuatnya lebih baik dengan mengirimkan laporan bug atau bahkan menulis patch\&. Jika Nmap tidak berlaku sesuai yang anda harapkan, pertama upgrade ke versi terakhir yang tersedia dari -\m[blue]\fB\%http://nmap.org\fR\m[]\&. Jika masalah masih tetap, lakukan riset untuk menentukan apakah ia telah ditemukan dan diselesaikan\&. Cobalah mencari pesan kesalahan pada halaman pencarian kami +\m[blue]\fB\%https://nmap.org\fR\m[]\&. Jika masalah masih tetap, lakukan riset untuk menentukan apakah ia telah ditemukan dan diselesaikan\&. Cobalah mencari pesan kesalahan pada halaman pencarian kami \m[blue]\fB\%http://insecure.org/search.html\fR\m[] atau di Google\&. Juga cobalah membrowsing arsip nmap\-dev @@ -2064,10 +2064,10 @@ Bacalah juga halaman manual ini dengan baik\&. Jika masih belum selesai juga, ki \&. Mohon sertakan semua yang anda telah pelajari mengenai masalah, dan juga versi Nmap dan sistem operasi yang anda gunakan\&. Laporan kesalahan dan pertanyaan penggunaan Nmap yang dikirim ke akan lebih mungkin dijawab daripada yang dikirimkan secara langsung ke Fyodor\&. Jika anda berlangganan ke list nmap\-dev sebelum posting, pesan anda akan melewati moderasi dan akan lewat dengan lebih cepat\&. Berlangganan di -\m[blue]\fB\%http://nmap.org/mailman/listinfo/dev\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/mailman/listinfo/dev\fR\m[]\&. .PP Patch code untuk memperbaiki bug adalah lebih baik daripada laporan kesalahan\&. Instruksi dasar untuk membuat file patch dengan perubahan anda tersedia di -\m[blue]\fB\%http://nmap.org/data/HACKING\fR\m[]\&. Patch dapat dikirim ke +\m[blue]\fB\%https://nmap.org/data/HACKING\fR\m[]\&. Patch dapat dikirim ke nmap\-dev (direkomendasikan) atau langsun ke Fyodor\&. .SH "PENULIS" @@ -2079,7 +2079,7 @@ Fyodor Selama ini, ratusan orang telah memberikan kontribusi berharga ke Nmap\&. Hal ini dirinci dalam file CHANGELOG.\" changelog yang didistribusikan bersama Nmap dan juga tersedia dari -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[]\&. .SH "LEGAL NOTICES" .SS "Unofficial Translation Disclaimer / Disklaimer Terjemahan Tidak Resmi" .PP @@ -2230,7 +2230,7 @@ U\&.S\&. Export Control: Insecure\&.Com LLC believes that Nmap falls under U\&.S .IP " 1." 4 versi Inggris .RS 4 -\%http://nmap.org/book/man.html +\%https://nmap.org/book/man.html .RE .IP " 2." 4 Creative Commons Attribution License @@ -2300,7 +2300,7 @@ di daftar Wikipedia .IP "15." 4 Nmap license details .RS 4 -\%http://nmap.org/book/man-legal.html +\%https://nmap.org/book/man-legal.html .RE .IP "16." 4 Apache Software Foundation diff --git a/docs/man-xlate/nmap-it.1 b/docs/man-xlate/nmap-it.1 index de67fcac9..5cff99994 100644 --- a/docs/man-xlate/nmap-it.1 +++ b/docs/man-xlate/nmap-it.1 @@ -104,10 +104,10 @@ Nmap done: 1 IP address (1 host up) scanned in 14\&.40 seconds .\} .PP L\*(Aqultima versione di Nmap si può ottenere dal sito -\m[blue]\fB\%http://nmap.org\fR\m[]\&. L\*(Aqultima versione di questa pagina del manuale è disponibile al sito -\m[blue]\fB\%http://nmap.org/book/man.html\fR\m[]\&. È anche inclusa come capitolo di +\m[blue]\fB\%https://nmap.org\fR\m[]\&. L\*(Aqultima versione di questa pagina del manuale è disponibile al sito +\m[blue]\fB\%https://nmap.org/book/man.html\fR\m[]\&. È anche inclusa come capitolo di \(lqNmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning\(rq -(\m[blue]\fB\%http://nmap.org/book/\fR\m[])\&. +(\m[blue]\fB\%https://nmap.org/book/\fR\m[])\&. .SH "ELENCO DELLE OPZIONI" .PP Questo elenco delle possibili opzioni viene stampato quando Nmap viene eseguito senza argomenti; una versione aggiornata di questo elenco è sempre disponibile sul sito @@ -231,7 +231,7 @@ EXAMPLES: nmap \-v \-A scanme\&.nmap\&.org nmap \-v \-sn 192\&.168\&.0\&.0/16 10\&.0\&.0\&.0/8 nmap \-v \-iR 10000 \-Pn \-p 80 -SEE THE MAN PAGE (http://nmap\&.org/book/man\&.html) FOR MORE OPTIONS AND EXAMPLES +SEE THE MAN PAGE (https://nmap\&.org/book/man\&.html) FOR MORE OPTIONS AND EXAMPLES .fi .if n \{\ .RE @@ -647,7 +647,7 @@ e filtered\&. .sp Questa tecnica è spesso indicata come "scanning semi\-aperto" (tradotto letteralmente per esigenze di comprensione, da "half\-open scanning", NdT), perché non viene aperta una connessione TCP completa\&. Viene mandato un pacchetto SYN come se si fosse sul punto di aprire una connessione reale e si attende una risposta\&. Un SYN/ACK indica che la porta è in ascolto (aperta), mentre un RST (reset) indica che la porta non è in ascolto\&. Se non viene ricevuta nessuna risposta dopo diverse ritrasmissioni la porta viene marcata come filtrata\&. La porta viene marcata come tale anche se viene ricevuto un pacchetto di errore "ICMP unreachable" (tipo 3, codici 1, 2, 3, 9, 10, 13)\&. La porta viene considerata aperta anche nel caso in cui un pacchetto SYN (senza il flag ACK) viene ricevuto in risposta\&. Questo in base ad una feature TCP estremamente rara conosciuta come "apertura simultanea" ("simultaneous open") o connessione "split handshake" (vedere -\m[blue]\fB\%http://nmap.org/misc/split-handshake.pdf\fR\m[])\&. +\m[blue]\fB\%https://nmap.org/misc/split-handshake.pdf\fR\m[])\&. .RE .PP \fB\-sT\fR (TCP connect scan) @@ -1261,7 +1261,7 @@ name=value\&. I nomi e i valori possono essere stringhe senza spazi o i caratter xmpp\-info\&.server_name\&. Si può utilizzare questa identificazione per agire solo sullo script specificato, oppure utilizzare la versione non identificativa (server_name in questo caso) per agire su tutti gli script che utilizzano questo argomento\&. Uno script controllerà prima gli argomenti a lui identificati (il nome degli argomenti è specificato nella documentazione dello script) prima di accettare un argomento non qualificato\&. Un esempio complesso è \fB\-\-script\-args \*(Aquser=foo,pass=",{}=bar",whois={whodb=nofollow+ripe},xmpp\-info\&.server_name=localhost\*(Aq\fR\&. L\*(AqNSE Documentation Portal all\*(Aqindirizzo -\m[blue]\fB\%http://nmap.org/nsedoc/\fR\m[] +\m[blue]\fB\%https://nmap.org/nsedoc/\fR\m[] elenca gli argomenti che ogni script accetta\&. .RE .PP @@ -1691,7 +1691,7 @@ Attenzione: questa feature è ancora in fase di sviluppo ed ha alcune limitazion \fB\-\-badsum\fR (Send packets with bogus TCP/UDP checksums) .RS 4 Richiede ad Nmap di usare un checksum TCP o UDP non valido per i pacchetti inviati alla macchina di destinazione\&. Poiché teoricamente tutti gli stack IP degli host finiranno per ignorare questi pacchetti, qualunque risposta ricevuta dovrà per forza provenire da un firewall o da un Intrusion Detection System (IDS) che non si preoccupa di verificare il checksum\&. Per maggiori informazioni su questa tecnica, si consulti -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[]\&. .RE .PP \fB\-\-adler32\fR (Use deprecated Adler32 instead of CRC32C for SCTP checksums) @@ -1960,7 +1960,7 @@ dove è stato installato Nmap la prima volta\&. Processare il file XML con un XS \m[blue]\fBxsltproc\fR\m[]\&\s-2\u[25]\d\s+2 per produrre un file HTML\&. Aprire direttamente l\*(Aqoutput XML in un browser non funziona più tanto bene in quanto i browser recenti limitano le location da cui può essere caricato un foglio di stile\&. Se si volesse usare un foglio di stile diverso, va specificato mediante l\*(Aqopzione \fB\-\-stylesheet\fR\&. Il file va indicato con il percorso completo o l\*(AqURL\&. Un esempio di invocazione con quest\*(Aqopzione è -\fB\-\-stylesheet http://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. Questo indica ad un XSLT processor di caricare l\*(Aqultima versione del foglio di stile da Nmap\&.Org\&. L\*(Aqopzione +\fB\-\-stylesheet https://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. Questo indica ad un XSLT processor di caricare l\*(Aqultima versione del foglio di stile da Nmap\&.Org\&. L\*(Aqopzione \fB\-\-webxml\fR fa la stessa cosa ma richiede meno digitazioni e meno cose da ricordare\&. Caricando l\*(AqXSL da Nmap\&.Org rende più semplice visualizzare i risultati su una macchina che non ha Nmap (e quindi il file nmap\&.xsl) installato\&. Quindi l\*(AqURL è spesso una scelta migliore, ma di default viene usato il file dal filesystem locale per ragioni di privacy\&. @@ -1969,7 +1969,7 @@ nmap\&.xsl) installato\&. Quindi l\*(AqURL è spesso una scelta migliore, ma di \fB\-\-webxml\fR (Load stylesheet from Nmap\&.Org) .RS 4 Quest\*(Aqopzione è semplicemente una comodità per l\*(Aqopzione -\fB\-\-stylesheet http://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. +\fB\-\-stylesheet https://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. .RE .PP \fB\-\-no_stylesheet\fR (Omit XSL stylesheet declaration from XML) @@ -2184,18 +2184,18 @@ Questo scansiona 4096 indirizzi IP in cerca di webservers (ma senza effettuare p .PP Dato che questa guida di riferimento mostra nel dettaglio tutte le opzioni di Nmap, non può dimostrare in maniera completa come utilizzare queste feature per risolvere velocemente applicazioni reali\&. È per questo che è stato pubblicato \m[blue]\fB\fINmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning\fR\fR\m[]\&\s-2\u[27]\d\s+2\&. Gli argomenti trattati sono sovvertire i firewall e gli IDS, ottimizzare le performance di Nmap e l\*(Aqautomazione di comuni processi di rete con l\*(AqNmap Scripting Engine\&. Vengono forniti suggerimenti ed istruzioni per operazioni comuni con Nmap come fare un inventario della rete, penetration testing, trovare rogue access point wireless e l\*(Aqannullamento di possibili worm\&. Esempi e diagrammi mostrano l\*(Aqattuale sistema di comunicazione via cavo\&. Più della metà del libro è disponibile gratuitamente online\&. Per maggiori informazioni -\m[blue]\fB\%http://nmap.org/book\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book\fR\m[]\&. .SH "BUGS" .PP Al pari del suo autore (e di questa traduzione, NdT), Nmap non è perfetto\&. Ma puoi fare qualcosa per aiutare a renderlo migliore mandando delle segnalazioni di bug o addirittura scrivendo delle patch\&. Se Nmap non si dovesse comportare come ti aspetteresti, prova prima l\*(Aqultima versione disponibile su -\m[blue]\fB\%http://nmap.org/\fR\m[]\&. Se il problema persiste effettua qualche ricerca per determinare se il problema è stato già scoperto e segnalato\&. Prova a cercare sulla nostra pagina di ricerca +\m[blue]\fB\%https://nmap.org/\fR\m[]\&. Se il problema persiste effettua qualche ricerca per determinare se il problema è stato già scoperto e segnalato\&. Prova a cercare sulla nostra pagina di ricerca \m[blue]\fB\%http://insecure.org/search.html\fR\m[] o su Google il messaggio di errore o ancora a sfogliare l\*(Aqarchivio Nmap\-dev all\*(Aqindirizzo \m[blue]\fB\%http://seclists.org/\fR\m[]\&. Leggi inoltre tutta questa pagina di manuale\&. Se nulla di questo riguarda il tuo caso, manda un bug report a \&. Accertati di includere ogni cosa che sei riuscito a sapere sul problema, la versione di Nmap che hai installato e su quale sistema operativo la stai usando\&. Segnalazioni di problemi ed eventuali domande sull\*(Aquso di Nmap inviate a hanno più probabilità di avere risposta di quelle inviate a Fyodor direttamente\&. Se ti registri alla lista di nmap\-dev prima di inviare il messaggio, quest\*(Aqultimo non verrà moderato e quindi arriverà più velocemente\&. Iscriviti su -\m[blue]\fB\%http://nmap.org/mailman/listinfo/dev\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/mailman/listinfo/dev\fR\m[]\&. .PP Le patch che risolvono i bug sono molto meglio di una segnalazione\&. Le istruzioni di base per creare delle patch sono disponibili su \m[blue]\fB\%https://svn.nmap.org/nmap/HACKING\fR\m[]\&. Le patch potranno essere inviate a nmap\-dev (raccomandato) oppure direttamente a Fyodor\&. @@ -2217,7 +2217,7 @@ Aggiornamento e revisione 04/2015: Andrea Pizzarotti .PP Centinaia di persone hanno dato validi contributi a Nmap nel corso degli anni\&. Questi sono elencati dettagliatamente nel file di CHANGELOG che è distribuito assieme a Nmap ed è anche disponibile su -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[]\&. .SH "NOTE LEGALI" .SS "Copyright e Licenze di Nmap" .PP @@ -2381,7 +2381,7 @@ Quando compilato col supporto ad OpenSSL o distribuito come codice sorgente, Ins La presente traduzione ha il solo scopo di aiutare nella comprensione del testo originale \(lqNmap Reference Guide\(rq, non ne costituisce copia sostitutiva e nemmeno licenza alternativa di \(lqCovered Software\(rq\&. Per qualsiasi informazione o chiarimento e per la versione più aggiornata, fare riferimento al testo originale disponibile al link -\m[blue]\fB\%http://nmap.org/book/man.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/man.html\fR\m[]\&. .SH "NOTES" .IP " 1." 4 RFC 1122 @@ -2416,7 +2416,7 @@ RFC del protocollo TCP .IP " 7." 4 TCP Idle Scan (-sI) .RS 4 -\%http://nmap.org/book/idlescan.html +\%https://nmap.org/book/idlescan.html .RE .IP " 8." 4 RFC 959 @@ -2427,12 +2427,12 @@ RFC 959 Well Known Port List: \fBnmap-services\fR .RS 4 -\%http://nmap.org/book/nmap-services.html +\%https://nmap.org/book/nmap-services.html .RE .IP "10." 4 Chapter 7, Service and Application Version Detection .RS 4 -\%http://nmap.org/book/vscan.html +\%https://nmap.org/book/vscan.html .RE .IP "11." 4 RFC 1323 @@ -2442,7 +2442,7 @@ RFC 1323 .IP "12." 4 Chapter 8, Remote OS Detection .RS 4 -\%http://nmap.org/book/osdetect.html +\%https://nmap.org/book/osdetect.html .RE .IP "13." 4 linguaggio di programmazione Lua @@ -2452,33 +2452,33 @@ linguaggio di programmazione Lua .IP "14." 4 Script Categories .RS 4 -\%http://nmap.org/book/nse-usage.html#nse-categories +\%https://nmap.org/book/nse-usage.html#nse-categories .RE .IP "15." 4 Chapter 9, Nmap Scripting Engine .RS 4 -\%http://nmap.org/book/nse.html +\%https://nmap.org/book/nse.html .RE .IP "16." 4 Chapter 14, Understanding and Customizing Nmap Data Files .RS 4 -\%http://nmap.org/book/data-files.html +\%https://nmap.org/book/data-files.html .RE .IP "17." 4 \(lqIdle Scan Implementation Algorithms\(rq .RS 4 -\%http://nmap.org/book/scan-methods.html#port-scanning-algorithms +\%https://nmap.org/book/scan-methods.html#port-scanning-algorithms .RE .IP "18." 4 A practical example: bypassing default Snort 2.2.0 rules .RS 4 -\%http://nmap.org/book/firewalls.html#defeating-ids-snort-portscan +\%https://nmap.org/book/firewalls.html#defeating-ids-snort-portscan .RE .IP "19." 4 adaptive retransmission .RS 4 -\%http://nmap.org/book/scan-methods.html#scan-methods-adaptive-retransmission +\%https://nmap.org/book/scan-methods.html#scan-methods-adaptive-retransmission .RE .IP "20." 4 RFC 2960 @@ -2498,12 +2498,12 @@ Nmap::Parser .IP "23." 4 Grepable Output (-oG) .RS 4 -\%http://nmap.org/book/output-formats-grepable-output.html +\%https://nmap.org/book/output-formats-grepable-output.html .RE .IP "24." 4 Timing and Performance .RS 4 -\%http://nmap.org/book/man-performance.html +\%https://nmap.org/book/man-performance.html .RE .IP "25." 4 xsltproc @@ -2520,7 +2520,7 @@ su Wikipedia Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning\fR .RS 4 -\%http://nmap.org/book/ +\%https://nmap.org/book/ .RE .IP "28." 4 Apache Software Foundation @@ -2565,7 +2565,7 @@ Liblinear linear classification library .IP "36." 4 IPv6 matching .RS 4 -\%http://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6 +\%https://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6 .RE .IP "37." 4 Export Administration Regulations (EAR) diff --git a/docs/man-xlate/nmap-ja.1 b/docs/man-xlate/nmap-ja.1 index dfe37e983..c8f676396 100644 --- a/docs/man-xlate/nmap-ja.1 +++ b/docs/man-xlate/nmap-ja.1 @@ -446,7 +446,7 @@ Maimonスキャンは、発見者であるUriel Maimon氏の名前にちなん .PP \fB\-sI \fR (Idle スキャン) .RS 4 -この高度なスキャン手法を使用すると、対象ホストに対して完全に匿名でTCPポートスキャンを実行できる(スキャンする側の実IPアドレスからは、対象ホストにパケットが送信されない)。それだけではなく、ゾンビホスト上で連続的に生成されるIPフラグメントID(識別子)が予測可能であることを巧妙に利用した独自のサイドチャネル攻撃を実行して、対象ホスト上のopenポートに関する情報を収集することもできる。IDSシステムでは、このスキャンはこちらで指定したゾンビマシン(稼動中でかつ特定の条件を満たす必要がある)から行われているものとして表示される。この非常に興味深いスキャンタイプは複雑すぎて本稿ではとても全容を説明しきれないので、完全な詳細を掲載した非公式の論文を以下に投稿しておくことにする:\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[] +この高度なスキャン手法を使用すると、対象ホストに対して完全に匿名でTCPポートスキャンを実行できる(スキャンする側の実IPアドレスからは、対象ホストにパケットが送信されない)。それだけではなく、ゾンビホスト上で連続的に生成されるIPフラグメントID(識別子)が予測可能であることを巧妙に利用した独自のサイドチャネル攻撃を実行して、対象ホスト上のopenポートに関する情報を収集することもできる。IDSシステムでは、このスキャンはこちらで指定したゾンビマシン(稼動中でかつ特定の条件を満たす必要がある)から行われているものとして表示される。この非常に興味深いスキャンタイプは複雑すぎて本稿ではとても全容を説明しきれないので、完全な詳細を掲載した非公式の論文を以下に投稿しておくことにする:\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[] .sp このスキャンタイプは、(その匿名性のために)格別に秘匿性が高いことに加え、マシン間のIPベースの信頼関係を明らかにすることができる。ポートリストには、\fI指定したゾンビホストから見た\fRopenポートが表示される。よって、(ルータ/パケットフィルタのルールから)信頼関係にあると思われる様々なゾンビマシンを使ってターゲットをスキャンしてみることもできる。 .sp diff --git a/docs/man-xlate/nmap-man-de.xml b/docs/man-xlate/nmap-man-de.xml index fcedd76f9..6c2326d8b 100644 --- a/docs/man-xlate/nmap-man-de.xml +++ b/docs/man-xlate/nmap-man-de.xml @@ -37,7 +37,7 @@ NmapBeschreibung This document describes the very latest version of - Nmap available from or . Please + Nmap available from or . Please ensure you are using the latest version before reporting that a feature doesn't work as described. @@ -103,7 +103,7 @@ schnellere Ausführung. Danach kommen die Namen der Zielhosts. # nmap -A -T4 scanme.nmap.org -Starting Nmap ( http://nmap.org ) +Starting Nmap ( https://nmap.org ) Interesting ports on scanme.nmap.org (64.13.134.52): Not shown: 994 filtered ports PORT STATE SERVICE VERSION @@ -130,8 +130,8 @@ Nmap done: 1 IP address (1 host up) scanned in 17.00 seconds Die neueste Version von Nmap erhält man unter -, und die neueste Version der Manpage -ist unter verfügbar. +, und die neueste Version der Manpage +ist unter verfügbar. @@ -140,7 +140,7 @@ ist unter verfügbar. Diese Übersicht wird ausgegeben, wenn Nmap ohne Argumente aufgerufen wird; die neueste Version davon ist immer unter - verfügbar. + verfügbar. Sie hilft dabei, sich die am häufigsten benutzten Optionen zu merken, ist aber kein Ersatz für die detaillierte Dokumentation im Rest dieses Handbuchs. Einige obskure Optionen werden hier nicht einmal @@ -151,7 +151,7 @@ erwähnt. Optionsübersicht Kommandozeilenoptionenvon Nmap -Nmap 4.85BETA8 ( http://nmap.org ) +Nmap 4.85BETA8 ( https://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. @@ -256,7 +256,7 @@ EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sP 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -PN -p 80 -SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES +SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES @@ -1534,7 +1534,7 @@ zeigen als Urheber des Scans den Zombie-Rechner an, den Sie angeben Da dieser faszinierende Scan-Typ zu komplex ist, um ihn in diesem Handbuch vollständig zu beschreiben, habe ich einen Artikel mit vollständigen Details dazu geschrieben und unter - veröffentlicht. + veröffentlicht. Alle Details zu diesem faszinierenden Scan-Typ finden Sie in @@ -1861,7 +1861,7 @@ unter anderem auch die Versionserkennung einschaltet. A paper documenting the workings, usage, and customization of version detection is available at -. +. Die Versionserkennung wird detailliert in behandelt. @@ -2080,7 +2080,7 @@ weshalb sie nur im ausführlichen Modus ausgegeben wird. A paper documenting the workings, usage, and customization of OS detection is available at -. +. @@ -2196,13 +2196,13 @@ Im Moment sind folgende Kategorien definiert: discovery, vuln, auth und default. Sie alle werden -at . +at . in beschrieben. Die Nmap Scripting Engine wird detailliert -at +at in beschrieben und wird mit den folgenden Optionen gesteuert: @@ -2258,7 +2258,7 @@ dann muss deren Dateierweiterung nicht nse lauten. Nmap-Scripts werden standardmäßig in einem scripts-Unterverzeichnis des Nmap-Datenverzeichnisses gespeichert -(see ). +(see ). (siehe ). Aus Effizienzgründen werden Scripts in einer Datenbank indiziert, die in scripts/script.db.script.db gespeichert ist und für jedes Script auflistet, in welche Kategorie @@ -3285,7 +3285,7 @@ ungültige TCP- oder UDP-Prüfsummen zu benutzen. Da so gut wie alle Host-IP-Stacks solche Pakete verwerfen, kommen eventuelle Antworten sehr wahrscheinlich von einer Firewall oder einem IDS, das sich nicht die Mühe macht, die Prüfsumme zu überprüfen. Mehr Details zu dieser -Methode finden Sie unter . +Methode finden Sie unter . @@ -3424,7 +3424,7 @@ Programme gedacht, kann aber auch Menschen bei der Interpretation von Nmaps XML-Ausgabe helfen. Die DTD definiert die gültigen Elemente des Formats und zählt an vielen Stellen die dafür erlaubten Attribute und Werte auf. Die neueste Version ist immer unter - verfügbar. + verfügbar. XML bietet ein stabiles Format, das man mit Software leicht parsen kann. Solche XML-Parser sind für alle wichtigen Programmiersprachen @@ -3517,7 +3517,7 @@ besteht. Diese Unterfelder lauten: Port number, Wie bei der XML-Ausgabe kann diese Manpage auch hier nicht das vollständige Format dokumentieren. Eine detailliertere Betrachtung des grepbaren Ausgabeformats in Nmap finden Sie -from . +from . in . @@ -3827,7 +3827,7 @@ finden und benutzen, um die Ergebnisse darzustellen. Wenn Sie ein anderes Stylesheet benutzen möchten, geben Sie es als Argument für an. Dabei müssen Sie den vollständigen Pfadnamen oder die URL angeben. Sehr häufig wird - benutzt. + benutzt. Das sagt einem Browser, dass er die neueste Version des Stylesheets von Nmap.Org laden soll. Die Option macht dasselbe, verlangt aber weniger Tipparbeit und Merkfähigkeit. @@ -3847,7 +3847,7 @@ nützlicher, doch aus Datenschutzgründen wird standardmäßig das Diese bequeme Option ist nur ein Alias für -. +. @@ -4292,7 +4292,7 @@ wie man diese Features anwendet, um Aufgaben der realen Welt zu lösen. Zu diesem Zweck haben wir das Buch Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security -Scanning.Nmap Network Scanning: The Official +Scanning.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning veröffentlicht. Es zeigt, wie man Firewalls und Intrusion Detection-Systeme unterwandert, @@ -4304,7 +4304,7 @@ das Verhindern von Wurmausbrüchen im Netzwerk. Dabei zeigt es mit Beispielen und Diagrammen, wie die Kommunikation auf der Leitung aussieht. Mehr als die Hälfte des Buches ist online frei verfügbar. Weitere Informationen finden Sie unter -. +. Die deutsche Übersetzung dieses Buches von Dinu Gherman ist im Mai 2009 unter dem Titel Nmap: Netzwerke scannen, analysieren und absichern @@ -4321,7 +4321,7 @@ erschienen. können helfen, es zu verbessern, indem Sie Fehlerberichte schicken oder sogar Patches schreiben. Falls Nmap sich nicht wie erwartet verhält, sollten Sie zuerst auf die neueste Version aktualisieren, die unter - verfügbar ist. Wenn das Problem anhält, + verfügbar ist. Wenn das Problem anhält, versuchen Sie herauszufinden, ob es bereits erkannt und bearbeitet wurde. Suchen Sie nach der Fehlermeldung auf unserer Suchseite unter oder bei Google. Stöbern @@ -4337,12 +4337,12 @@ beantwortet, wenn sie an dev@nmap.org geschickt werden statt direkt an Fyodor. Wenn Sie sich erst auf der nmap-dev-Liste eintragen, bevor Sie Ihre E-Mail schicken, entgeht Ihre Nachricht auch der Moderation und kommt schneller an. Eintragen können Sie sich unter -. +. Code-Patches zur Behebung von Fehlern sind noch besser als Fehlerberichte. Eine einfache Anweisung für die Erstellung von Patch-Dateien mit Ihren Änderungen ist unter - verfügbar. Patches können + verfügbar. Patches können an nmap-dev (empfohlen) oder direkt an Fyodor geschickt werden. @@ -4358,12 +4358,12 @@ geschickt werden. zu Nmap geleistet. Sie sind detailliert in der Datei CHANGELOGchangelog aufgeführt, die mit dem Nmap-Quellcode verbreitet wird und auch unter - verfügbar ist. + verfügbar ist. - Sorry, this section has not yet been translated to German. Please see the English version. + Sorry, this section has not yet been translated to German. Please see the English version. diff --git a/docs/man-xlate/nmap-man-es.xml b/docs/man-xlate/nmap-man-es.xml index cb9bd1bf4..3069e7c96 100644 --- a/docs/man-xlate/nmap-man-es.xml +++ b/docs/man-xlate/nmap-man-es.xml @@ -1478,7 +1478,7 @@ sondeo SYN si no se especifica ning referencia por lo que escrib y publiqu un documento informal que contiene todos los detalles, el documento est disponible en . + url="https://nmap.org/book/idlescan.html"/>. Adems de ser extraordinariamente sigiloso (debido a su funcionamiento a ciegas), este tipo de sondeo permite @@ -2739,7 +2739,7 @@ hacen. o un IDS que no comprob la suma, dado que la mayora de las pilas IP descartan estos paquetes. Para obtener ms informacin de esta tcnica puede consultar + url="https://nmap.org/p60-12.txt"/> diff --git a/docs/man-xlate/nmap-man-fr.xml b/docs/man-xlate/nmap-man-fr.xml index f54876f59..f075ae0b1 100644 --- a/docs/man-xlate/nmap-man-fr.xml +++ b/docs/man-xlate/nmap-man-fr.xml @@ -588,7 +588,7 @@ nmap -v -iR 10000 -P0 -p 80 (Scan passif -- idlescan) - Cette mthode de scan avanc permet de faire un vritable scan de port TCP en aveugle, (dans le sens o aucun paquet n'est envoy directement la cible depuis votre vraie adresse IP). En effet, la technique employe consiste rcolter des informations sur les ports ouverts de la cible en utilisant un exploit bas sur la prdictibilit de la gnration des identifiants de fragmentation IP de l'hte relais (le zombie). Les systmes IDS considreront que le scan provient de la machine zombie que vous avez spcifi (qui doit remplir certains critres). Le mcanisme de cette incroyable technique est trop complexe pour tre expliqu en dtail dans ce guide; un papier informel a t post pour rendre compte de tous ces dtails:. + Cette mthode de scan avanc permet de faire un vritable scan de port TCP en aveugle, (dans le sens o aucun paquet n'est envoy directement la cible depuis votre vraie adresse IP). En effet, la technique employe consiste rcolter des informations sur les ports ouverts de la cible en utilisant un exploit bas sur la prdictibilit de la gnration des identifiants de fragmentation IP de l'hte relais (le zombie). Les systmes IDS considreront que le scan provient de la machine zombie que vous avez spcifi (qui doit remplir certains critres). Le mcanisme de cette incroyable technique est trop complexe pour tre expliqu en dtail dans ce guide; un papier informel a t post pour rendre compte de tous ces dtails:. En plus de son incroyable furtivit (en raison du caractre aveugle de la technique), ce type de scan permet de dterminer les relations de confiance entre les machines. La liste des ports ouverts est tablie du point de vue de l'hte zombie. Ainsi, vous pouvez essayer de scanner une cible en utilisant diffrents zombies pour lesquels vous pensez qu'il existe une relation de confiance entre eux et la cible (d'aprs les rgles des dispositifs de filtrage). Vous pouvez ajouter les deux points (:) suivis d'un numro de port de l'hte zombie si vous souhaitez tester les changements d'identifiants IP sur un port particulier du zombie. Par dfaut, Nmap utilisera le port utilis pour les pings tcp (le port 80). @@ -1521,7 +1521,7 @@ le temps suppl les paquets envoys aux htes cibles. Comme virtuellement toutes les piles IP des htes rejettent ces paquets, toute rponse recue doivent venir d'un pare-feu ou d'un IDS qui ne se proccuppe pas de - vrifier les sommes de contrle. Pour plus de dtails sur cette technique, voir + vrifier les sommes de contrle. Pour plus de dtails sur cette technique, voir diff --git a/docs/man-xlate/nmap-man-hr.xml b/docs/man-xlate/nmap-man-hr.xml index b0c8e3f67..e1b682a54 100644 --- a/docs/man-xlate/nmap-man-hr.xml +++ b/docs/man-xlate/nmap-man-hr.xml @@ -996,7 +996,7 @@ se SYN scan. ciljanom računalu. IDS sustavi će pokazati da scan dolazi sa zombie mašine kojju ste specificirali kod pokretanja ovog tipa skeniranja (zombie mora biti upaljen i mora zadovoljavati neke kriterije). Ovaj način skeniranja je prekompleksan da bi ga ovdje opisali u potpunosti, pa sam napisao i postao informativni - članak sa svim detaljima na . + članak sa svim detaljima na . Osim što je nevjerovatno nevidljiv (zbog načina na koji radi) ovaj tip skeniranja omogućava mapiranje IP baziranih pravila između računala. Ispis portova pokazuje otvorene portove kako ih vidi zombi @@ -1829,7 +1829,7 @@ i SYN sken podržava ove opcije u potpunosti isto kao i UDP sken. Ova opcija traži od Nmap-a da koristi neispravne TCP i UDP checksume za pakete koje šalje na ciljano računalo. Kako skoro svaki IP stack odbacuje takve pakete, svaki odgovor koji dobijete najvjerovatnie dolazi od vatrozida ili IDS sustava koji nisu provjeravali checksum. Za više detalja o ovoj tehnici, - pogledajte: . + pogledajte: . diff --git a/docs/man-xlate/nmap-man-hu.xml b/docs/man-xlate/nmap-man-hu.xml index ffed07731..ee667f371 100644 --- a/docs/man-xlate/nmap-man-hu.xml +++ b/docs/man-xlate/nmap-man-hu.xml @@ -32,8 +32,8 @@ Leírás Ez a dokumentum az Nmap legfrissebb változatának leírása, mely a - vagy a - címekről tölthető le. + vagy a + címekről tölthető le. Mielőtt egy paraméter hibás működését jeleznéd, kérlek győződj meg arról, hogy a legfrissebb változatot használod-e. @@ -89,7 +89,7 @@ # nmap -A -T4 scanme.nmap.org playground -Starting nmap ( http://nmap.org ) +Starting nmap ( https://nmap.org ) Interesting ports on scanme.nmap.org (205.217.153.62): (The 1663 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE VERSION @@ -125,8 +125,8 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88.392 seconds -Az Nmap legújabb változata a címről tölthető le. A legfrissebb kézikönyv -a címről tölthető le. +Az Nmap legújabb változata a címről tölthető le. A legfrissebb kézikönyv +a címről tölthető le. @@ -134,7 +134,7 @@ a címről tölthető le. Megjegyzés a fordításhoz Az Nmap Referencia Útmutató jelen magyar változatát Mlatilik Zsolt készítette - a 6184-es eredeti angol változat + a 6184-es eredeti angol változat alapján drmac68@freemail.hu. A fordítást annak reményében készítettem, hogy megkönnyítse a magyar nyelvű felhasználók számára a program használatát. Nem tudom garantálni, hogy ez a leírás olyan teljes vagy naprakész, mint az eredeti @@ -146,7 +146,7 @@ a címről tölthető le. Ez az összefoglaló akkor jelenik meg, amikor az Nmap programot paraméterek nélkül indítjuk el. A legfrissebb változata a - címen érhető el. + címen érhető el. Ez a lista segít emlékezni a legáltalánosabb paraméterekre, de nem helyettesíti az útmutatóban található részletes dokumentációt. Néhány rejtett paraméter szintén nem található meg ebben a listában. @@ -154,7 +154,7 @@ nem található meg ebben a listában. -Nmap 4.53 ( http://nmap.org ) +Nmap 4.53 ( https://nmap.org ) Használat: nmap [Letapogatási típus(ok)] [Paraméterek] {Célpont meghatározások} CÉLPONT MEGHATÁROZÁSOK: Átadhatók állomásnevek, IP címek, hálózatok, stb. @@ -1385,7 +1385,7 @@ helyett. Ha nem ad meg alaptípust, a SYN letapogatást fogja használni. lennie és meg kell felelnie bizonyos követelményeknek). Ez az elbűvölő letapogatás túl bonyolult ahhoz, hogy ebben a leírásban részletesen is foglalkozhassunk vele, ezért írtam egy részletes leírást róla, mely a - címen olvasható. + címen olvasható. Amellett, hogy különösen rejtett, ezzel a letapogatással kihasználható a gépek közötti, IP alapú bizalmi viszony. A nyitott kapuk ebben az @@ -1632,7 +1632,7 @@ kihasználni. a kapu állapotát. A nyitott|szűrt TCP kapukat hasonló módon kezeli. Jegyezze meg, hogy az Nmap paramétere más dolgok mellett a változat érzékelést is engedélyezi. A változat érzékelés - működéséről, használatáról és paraméterezéséről a + működéséről, használatáról és paraméterezéséről a címen talál részletes leírást. Ha az Nmap kap ugyan választ egy szolgáltatástól, de az adatbázis alapján @@ -1817,7 +1817,7 @@ kihasználni. támadással szemben. Az operációs rendszer érzékelésének működésével, használatával és - testreszabásával kapcsolatban a + testreszabásával kapcsolatban a címen talál egy leírást. Az operációs rendszer érzékelése és vezérlése a következő paraméterekkel @@ -1904,7 +1904,7 @@ kihasználni. Az Nmap parancsfájl motor (NSE) egyesíti az Nmap hatékony hálózatkezelését a Lua könnyűsúlyú parancsnyelv - sokoldalúságával, így kínálva számtalan lehetőséget. A + sokoldalúságával, így kínálva számtalan lehetőséget. A címen bőséges dokumentációt talál az NSE-ről (beleértve a programozói felületet is). Az NSE célja, hogy hatékony környezetet biztosítson az Nmap képességeinek kiterjesztéséhez és a felhasználók számára egyszerűbbé @@ -1975,7 +1975,7 @@ kihasználni. egy nse kiterjesztéssel. Bár jelenleg nem szükséges követnie ezt a szokást, ez a jövőben változhat. Az Nmap figyelmeztetni fogja, ha egy fájlnak más a kiterjesztése. Az NSE-ről további bőséges dokumentációt - találhat (beleértve a programozói felület leírását) a + találhat (beleértve a programozói felület leírását) a címen. @@ -2801,7 +2801,7 @@ mértékben támogatja ezt a paramétert. elküldeni a célpont felé. Mivel elméletileg minden állomás IP verme az ilyen csomagokat helyesen eldobja, ezért bármilyen válasz tűzfalra vagy IDS rendszerre utal, melyek nem foglalkoznak az ellenőrző összeg - vizsgálatával. További részletek erről a technikáról a + vizsgálatával. További részletek erről a technikáról a címen. @@ -2920,7 +2920,7 @@ felülírná. A paraméterek leírása az alábbiakban található. készült, de segítséget nyújt az embereknek is az Nmap XML kimenetének értelmezésében. A DTD leírja a formátum érvényes elemeit és gyakran felsorolja a tulajdonságokat és azok értékeit is. A legfrissebb változat - mindig megtalálható a + mindig megtalálható a címen. XML egy stabil formátumot kínál, mely programból könnyen @@ -3226,7 +3226,7 @@ kapuk csak egy számként jelennek meg, ha túl sok van belőlük. megjeleníti az eredményeket. Ha más stíluslapot akar használni, adja meg azt a kapcsoló után. A teljes útvonalat vagy címet meg kell adnia. Egy megszokott hivatkozás a . Ez arra utasítja a böngészőt, + https://nmap.org/data/nmap.xsl. Ez arra utasítja a böngészőt, hogy az Insecure.org címről töltse be a legfrissebb stíluslapot. A paraméterrel ugyanezt a hatást érheti el, csak kevesebbet kell gépelni és megjegyezni. Az Insecure.org címről letöltött @@ -3245,7 +3245,7 @@ kapuk csak egy számként jelennek meg, ha túl sok van belőlük. - Ez egy kényelmesebb megvalósítása a + Ez egy kényelmesebb megvalósítása a kapcsolónak. @@ -3656,7 +3656,7 @@ kapuk csak egy számként jelennek meg, ha túl sok van belőlük. Akárcsak a program készítője, az Nmap sem tökéletes. De segíthet jobbá tenni, ha elküldi a felfedezett hibák leírását, vagy javítást készít hozzájuk. Ha az Nmap nem az elvárásai szerint működik, először mindig szerezze be a legfrissebb - változatot a címről. Ha a probléma továbbra + változatot a címről. Ha a probléma továbbra is fennáll, nézzen utána, hogy felfedezték-e már mások is. Keressen rá a Google-ban a hibaüzenetre vagy böngéssze át az Nmap fejlesztői listát a címen. Olvassa végig ezt a leírást @@ -3668,7 +3668,7 @@ kapuk csak egy számként jelennek meg, ha túl sok van belőlük. azokat közvetlenül a program készítőjének (Fyodor) küldené. A hibajavítások sokkal hasznosabbak, mint a hibajelentések. A hibajavítások - elkészítésével kapcsolatban tanácsokat kaphat a + elkészítésével kapcsolatban tanácsokat kaphat a címen. A hibajavítások elküldhetők az nmap-dev listára (ez a javasolt), vagy közvetlenül a készítőnek is. @@ -3683,7 +3683,7 @@ kapuk csak egy számként jelennek meg, ha túl sok van belőlük. Az évek során emberek százai járultak hozzá értékes munkájukkal az Nmap programhoz. Ezek részletezése megtalálható a CHANGELOG fájlban, mely az Nmap program terjesztése mellett elérhető a - címen is. + címen is. @@ -3734,7 +3734,7 @@ kapcsolatban. Ezek a korlátozások kizárólag akkor érvényesek, ha Ön való továbbértékesíti az Nmap programot. Például semmi nem tiltja, hogy Ön kezelő felületet készítsen az Nmap programhoz és azt üzleti céllal forgalmazza. Terjessze a programot önállóan és hívja fel a felhasználók figyelmét, hogy az Nmap programot külön -kell letölteniük a címről. +kell letölteniük a címről. A program készítői nem gondolják, hogy a fentiek további korlátozásokat adnának a GPL-hez, kizárólag annak tisztázására szolgálnak, hogyan értelmezik a @@ -3783,14 +3783,14 @@ elsőbbséget élveznek a fentiekkel szemben. Unofficial Translation Disclaimer / Nem hivatalos fordítói nyilatkozat This is an unnofficial translation of the Nmap + url="https://nmap.org/book/man-legal.html">Nmap license details into hungarian. It was not written by Insecure.Com LLC, and does not legally state the distribution terms for Nmap -- only the original English text does that. However, we hope that this translation helps hungarian speakers understand the Nmap license better. - Ez az Nmap licenc + Ez az Nmap licenc részletek nem hivatalos magyar fordítása. Ezt nem az Insecure.Com LLC készítette és nem tartalmazza az Nmap hivatalos terjesztési irányelveit. Ezeket kizárólag az eredeti angol nyelvű szöveg tartalmazza. Azonban reméljük, diff --git a/docs/man-xlate/nmap-man-id.xml b/docs/man-xlate/nmap-man-id.xml index ebdf09378..a8eee875b 100644 --- a/docs/man-xlate/nmap-man-id.xml +++ b/docs/man-xlate/nmap-man-id.xml @@ -37,7 +37,7 @@ Nmapdescription of Dokumen ini menjelaskan versi Nmap terakhir - yang tersedia di atau . Mohon + yang tersedia di atau . Mohon pastikan bahwa anda menggunakan versi terakhir sebelum melaporkan sebuah fitur tidak berfungsi sebagaimana yang dijelaskan.. @@ -96,7 +96,7 @@ # nmap -A -T4 scanme.nmap.org -Starting Nmap ( http://nmap.org ) +Starting Nmap ( https://nmap.org ) Interesting ports on scanme.nmap.org (64.13.134.52): Not shown: 994 filtered ports PORT STATE SERVICE VERSION @@ -122,8 +122,8 @@ Nmap done: 1 IP address (1 host up) scanned in 17.00 seconds -Versi terbaru Nmap dapat diperoleh dari . Versi terbaru man page -tersedia di . +Versi terbaru Nmap dapat diperoleh dari . Versi terbaru man page +tersedia di . @@ -132,7 +132,7 @@ tersedia di . Edisi bahasa Indonesia Nmap Reference Guide ini diterjemahkan dari versi [12855] versi Inggris + url="https://nmap.org/book/man.html">versi Inggris oleh Tedi Heriyanto. Meskipun kami berharap bahwa hal ini akan membuat Nmap lebih dapat diakses oleh para pengguna bahasa Indonesia di seluruh dunia, namun kami tidak dapat menjamin bahwa terjemahanan ini lengkap atau @@ -147,7 +147,7 @@ tersedia di . Ringkasan opsi ini ditampilkan ketika Nmap dijalankan tanpa argumen, dan versi terakhir selalu tersedia di -. +. Ia membantu mengingat opsi-opsi umum, namun ia bukanlah pengganti dokumentasi lengkap dalam halaman-halaman berikut manual ini. Bahkan beberapa opsi tersembunyi tidak disertakan di sini. @@ -157,7 +157,7 @@ Bahkan beberapa opsi tersembunyi tidak disertakan di sini. summary of options command-line optionsof Nmap -Nmap 4.85BETA7 ( http://nmap.org ) +Nmap 4.85BETA7 ( https://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. @@ -262,7 +262,7 @@ EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sP 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -PN -p 80 -SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES +SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES @@ -1419,7 +1419,7 @@ Jika anda tidak menspesifikasikan tipe dasar, akan digunakan SYN scan. Jenis scan menarik ini terlalu kompleks untuk dijelaskan dalam panduan referensi ini, sehingga saya menulis dan menaruh paper informal dengan - detil penuh di . + detil penuh di . Full details of this fascinating scan type are in @@ -1726,7 +1726,7 @@ sysadmin mungkin tidak akan menghargai anda menggunakan server mereka dengan car Sebuah paper yang mendokumentasikan cara kerja, penggunaan, dan kustomisasi deteksi versi tersedia di - . + . Deteksi versi dijelaskan secara rinci dalam . @@ -1923,7 +1923,7 @@ sysadmin mungkin tidak akan menghargai anda menggunakan server mereka dengan car Sebuah paper yang mendokumentasikan cara kerja, penggunaan, dan kustomisasi deteksi SO tersedia di - . + . Deteksi SO dibahas dalam . @@ -2025,12 +2025,12 @@ sysadmin mungkin tidak akan menghargai anda menggunakan server mereka dengan car Untuk mencerminkan penggunaan yang berbeda dan untuk memudahkan pilihan skrip yang diinginkan, setiap skrip berisi field yang mengasosiasikannya dengan satu atau lebih kategori. Kategori yang ada saat ini adalah safe, intrusive, malware, version, discovery, vuln, auth, and default. These are all described - at . + at . in . Nmap Scripting Engine dijelaskan lebih rinci -di +di in dan dikendalikan oleh opsi-opsi berikut ini: @@ -2076,7 +2076,7 @@ Jika diberikan nama file individual, ekstensi file tidak perlu harus Skrip Nmap secara baku disimpan dalam subdirektori scripts direktori data Nmap -(lihat ). +(lihat ). (see ). Demi efisiensi, skrip diindeks dalam database yang disimpan dalam scripts/script.db.script.db @@ -3004,7 +3004,7 @@ mendukung opsi secara penuh, demikian pula scan UDP. paket yang dikirimkan ke host target. Karena secara virtual seluruh stack IP host akan secara tepat men-drop paket ini, sembarang respon yang diterima adalah kemungkinan berasal dari firewall atau IDS yang tidak peduli untuk memverifikasi - checksum. Detil lebih lanjut mengenai teknik ini, dapat dilihat pada + checksum. Detil lebih lanjut mengenai teknik ini, dapat dilihat pada @@ -3135,7 +3135,7 @@ file output daripada menghapusnya. Seluruh opsi ini dijelaskan di bawah. ia dapat juga membantu manusia menginterpretasikan output XML Nmap. DTD mendefinisikan elemen legal format, dan seringkali merinci atribut dan nilai yang dapat mereka terima. - Versi terakhir selalu tersedia di . + Versi terakhir selalu tersedia di . XML memberikan format stabil yang dapat secara mudah diparse oleh software. Parser XML yang bebas tersedia untuk bahasa @@ -3221,7 +3221,7 @@ info, dan Version info. Sebagaimana dengan output XML, man page ini tidak memungkinkan untuk mendokumentasi seluruh format. Rincian lebih lanjut mengenai format output grepable Nmap tersedia -dari . +dari . dalam . @@ -3511,7 +3511,7 @@ banyaknya permintaan. Berikan untuk hanya melihat port . Anda harus memberikan nama path atau URL lengkap. Cara pemanggilan umum adalah . Cara ini memberitahu + https://nmap.org/data/nmap.xsl. Cara ini memberitahu browser untuk memuat versi terakhir stylesheet dari Nmap.Org. Opsi melakukan hal yang sama dengan cara yang lebih singkat. Memuatkan XSL dari Nmap.Org memudahkan melihat hasil pada mesin yang tidak memiliki @@ -3530,7 +3530,7 @@ banyaknya permintaan. Berikan untuk hanya melihat port Opsi kenyamanan ini adalah sekedar alias bagi - . + . @@ -3961,7 +3961,7 @@ banyaknya permintaan. Berikan untuk hanya melihat port Seperti penulisnya, Nmap tidaklah sempurna. Namun anda dapat membantu membuatnya lebih baik dengan mengirimkan laporan bug atau bahkan menulis patch. Jika Nmap tidak berlaku sesuai yang anda harapkan, pertama upgrade ke versi terakhir - yang tersedia dari . Jika masalah masih tetap, + yang tersedia dari . Jika masalah masih tetap, lakukan riset untuk menentukan apakah ia telah ditemukan dan diselesaikan. Cobalah mencari pesan kesalahan pada halaman pencarian kami atau di Google. Juga cobalah membrowsing arsip nmap-dev di .nmap-dev mailing list @@ -3973,11 +3973,11 @@ banyaknya permintaan. Berikan untuk hanya melihat port dev@nmap.org akan lebih mungkin dijawab daripada yang dikirimkan secara langsung ke Fyodor. Jika anda berlangganan ke list nmap-dev sebelum posting, pesan anda akan melewati moderasi dan akan lewat dengan lebih cepat. - Berlangganan di . + Berlangganan di . Patch code untuk memperbaiki bug adalah lebih baik daripada laporan kesalahan. Instruksi dasar untuk membuat file patch dengan perubahan anda tersedia di - . Patch dapat dikirim ke + . Patch dapat dikirim ke nmap-dev (direkomendasikan) atau langsun ke Fyodor. @@ -3992,7 +3992,7 @@ banyaknya permintaan. Berikan untuk hanya melihat port Hal ini dirinci dalam file CHANGELOGchangelog yang didistribusikan bersama Nmap - dan juga tersedia dari . + dan juga tersedia dari . @@ -4003,7 +4003,7 @@ banyaknya permintaan. Berikan untuk hanya melihat port Unofficial Translation Disclaimer / Disklaimer Terjemahan Tidak Resmi This is an unnofficial translation of the Nmap + url="https://nmap.org/book/man-legal.html">Nmap license details into Indonesian. It was not written by Insecure.Com LLC, and does not legally state the distribution terms for Nmap -- only the original English text does that. However, we @@ -4011,7 +4011,7 @@ banyaknya permintaan. Berikan untuk hanya melihat port Nmap license better. Ini merupakan terjemahan tidak resmi dari Nmap + url="https://nmap.org/book/man-legal.html">Nmap license details ke dalam bahasa Indonesia. Ia tidak ditulis oleh Insecure.Com LLC, dan tidak secara legal menyatakan syarat distribusi untuk Nmap -- hanya teks berbahasa Inggris aslinya yang melakukan hal itu. diff --git a/docs/man-xlate/nmap-man-it.xml b/docs/man-xlate/nmap-man-it.xml index 15a084c5b..5096afd92 100644 --- a/docs/man-xlate/nmap-man-it.xml +++ b/docs/man-xlate/nmap-man-it.xml @@ -133,11 +133,11 @@ Nmap done: 1 IP address (1 host up) scanned in 14.40 seconds L'ultima versione di Nmap si può ottenere dal sito . L'ultima versione di questa pagina del manuale - è disponibile al sito . È + url="https://nmap.org" />. L'ultima versione di questa pagina del manuale + è disponibile al sito . È anche inclusa come capitolo di Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning - (). + (). @@ -153,7 +153,7 @@ Nmap done: 1 IP address (1 host up) scanned in 14.40 seconds qui. - Nmap 6.47SVN ( http://nmap.org ) + Nmap 6.47SVN ( https://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. @@ -267,7 +267,7 @@ EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 -SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES +SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES @@ -1288,7 +1288,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES Questo in base ad una feature TCP estremamente rara conosciuta come "apertura simultanea" ("simultaneous open") o connessione "split handshake" (vedere ). + url="https://nmap.org/misc/split-handshake.pdf" />). @@ -1686,7 +1686,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES scansione come se provenisse dalla macchina zombie specificata (che deve essere attiva e rispondere a certi criteri). Tutti i dettagli su questa affascinante tecnica di scansione si trovano al seguente - link TCP + link TCP Idle Scan (-sI). Oltre che essere straordinariamente nascosto (grazie alla @@ -1912,7 +1912,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES moreinfo="none">nmap-services che contiene le informazioni di frequenza, in modo da sapere quali sono le porte più comuni (vedi Well Known Port List: + url="https://nmap.org/book/nmap-services.html">Well Known Port List: per maggiori informazioni sulle "port frequencies"). Se la "port frequency information" non è disponibile, forse perché si sta utilizzando un @@ -2020,7 +2020,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES stesso modo. Bisogna tener presente che l'opzione abilita, fra le varie cose, il version detection. Il version detection viene descritto nel dettaglio in Chapter 7, Service and Application + url="https://nmap.org/book/vscan.html">Chapter 7, Service and Application Version Detection. Quando i servizi RPC vengono identificati, Nmap è in grado di @@ -2204,7 +2204,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES L'OS detection viene trattato nel dettaglio in Chapter 8, Remote OS + url="https://nmap.org/book/osdetect.html">Chapter 8, Remote OS Detection. OS detection viene attivato e controllato dalle le seguenti @@ -2309,7 +2309,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES moreinfo="none">version e vuln. Queste sono tutte descritte nella sezione Script + url="https://nmap.org/book/nse-usage.html#nse-categories">Script Categories. Gli script non vengono eseguiti in una sandbox e quindi @@ -2319,7 +2319,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES ha preventivamente controllato personalmente gli script. L'Nmap Scripting Engine è descritto nel dettaglio in Chapter 9, Nmap Scripting + url="https://nmap.org/book/nse.html">Chapter 9, Nmap Scripting Engine e viene controllato dalle seguenti opzioni: @@ -2410,7 +2410,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES Gli script Nmap sono archiviati di default in una subdirectory scripts della directory principale di Nmap (vedi Chapter 14, + url="https://nmap.org/book/data-files.html">Chapter 14, Understanding and Customizing Nmap Data Files). Per migliorare l'efficienza, gli script vengono indicizzati nel database --script-args 'user=foo,pass=",{}=bar",whois={whodb=nofollow+ripe},xmpp-info.server_name=localhost'. L'NSE Documentation Portal all'indirizzo elenca gli argomenti che ogni + url="https://nmap.org/nsedoc/" /> elenca gli argomenti che ogni script accetta. @@ -2760,7 +2760,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES ritrasmettere il probe. Questo viene calcolato basandosi sui tempi di response degli ultimi probe inviati. La formula si trova al link Idle + url="https://nmap.org/book/scan-methods.html#port-scanning-algorithms">Idle Scan Implementation Algorithms. Se la latenza della rete dovesse oscillare troppo questo timeout può crescere fino ad un valore di diversi secondi. Inoltre esso è @@ -2903,7 +2903,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES (IDS/IPS, "intrusion-detection" e "intrusion-prevention system"). Questa tecnica viene utilizzata nella sezione + url="https://nmap.org/book/firewalls.html#defeating-ids-snort-portscan"> A practical example: bypassing default Snort 2.2.0 rules per vincere il port scanner detector di default in Snort IDS. Molti altri IDS possono essere sconfitti @@ -2974,7 +2974,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES portare ad un scansione più lenta rispetto ad una scansione con un rate più basso. Questo perché l'algoritmo adaptive + url="https://nmap.org/book/scan-methods.html#scan-methods-adaptive-retransmission">adaptive retransmission di Nmap potrebbe rilevare una congestione della rete causata da un eccessivo scanning rate e aumentare il numero di ritrasmissioni per mantenere una certa @@ -3598,7 +3598,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES provenire da un firewall o da un Intrusion Detection System (IDS) che non si preoccupa di verificare il checksum. Per maggiori informazioni su questa tecnica, si consulti . + url="https://nmap.org/p60-12.txt"/>. @@ -3841,7 +3841,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES permette di documentare l'intero formato. È disponibile una descrizione più dettagliata del formato grepable output nella sezione Grepable + url="https://nmap.org/book/output-formats-grepable-output.html">Grepable Output (-oG). @@ -3957,7 +3957,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES Periodicamente stampa un messaggio di timing status ogni intervallo di time. Il tempo è una specifica del tipo descritto nella sezione Timing and + url="https://nmap.org/book/man-performance.html">Timing and Performance di questo manuale; quindi per esempio, si utilizzerà per avere un aggiornamento dello stato ogni 10 secondi. Gli aggiornamenti @@ -4097,7 +4097,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES l'opzione . Il file va indicato con il percorso completo o l'URL. Un esempio di invocazione con quest'opzione è . Questo indica ad un + https://nmap.org/svn/docs/nmap.xsl. Questo indica ad un XSLT processor di caricare l'ultima versione del foglio di stile da Nmap.Org. L'opzione fa la stessa cosa ma richiede meno digitazioni e meno cose da ricordare. Caricando l'XSL @@ -4117,7 +4117,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES Quest'opzione è semplicemente una comodità per l'opzione . + https://nmap.org/svn/docs/nmap.xsl. @@ -4514,7 +4514,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES Dato che questa guida di riferimento mostra nel dettaglio tutte le opzioni di Nmap, non può dimostrare in maniera completa come utilizzare queste feature per risolvere velocemente applicazioni reali. È per questo - che è stato pubblicato Nmap + che è stato pubblicato Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Gli argomenti trattati sono sovvertire i firewall e gli IDS, ottimizzare le performance di Nmap e @@ -4524,7 +4524,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES access point wireless e l'annullamento di possibili worm. Esempi e diagrammi mostrano l'attuale sistema di comunicazione via cavo. Più della metà del libro è disponibile gratuitamente online. Per maggiori - informazioni . + informazioni . @@ -4534,7 +4534,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES perfetto. Ma puoi fare qualcosa per aiutare a renderlo migliore mandando delle segnalazioni di bug o addirittura scrivendo delle patch. Se Nmap non si dovesse comportare come ti aspetteresti, prova prima l'ultima - versione disponibile su . Se il problema + versione disponibile su . Se il problema persiste effettua qualche ricerca per determinare se il problema è stato già scoperto e segnalato. Prova a cercare sulla nostra pagina di ricerca o su Google il messaggio @@ -4549,7 +4549,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES direttamente. Se ti registri alla lista di nmap-dev prima di inviare il messaggio, quest'ultimo non verrà moderato e quindi arriverà più velocemente. Iscriviti su . + url="https://nmap.org/mailman/listinfo/dev" />. Le patch che risolvono i bug sono molto meglio di una segnalazione. Le istruzioni di base per creare delle patch sono disponibili su Centinaia di persone hanno dato validi contributi a Nmap nel corso degli anni. Questi sono elencati dettagliatamente nel file di CHANGELOG che è distribuito assieme a Nmap ed è anche disponibile su . + url="https://nmap.org/changelog.html" />. @@ -4808,7 +4808,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES classification library viene utilizzata per le nostre tecniche di apprendimento automatico dell'OS version su IPv6 (vedi la sezione IPv6 + url="https://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6">IPv6 matching). Tutto il software di terze parti descritto in questo paragrafo è liberamente ridistribuibile sotto licenza stile BSD. @@ -4844,7 +4844,7 @@ SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES di Covered Software. Per qualsiasi informazione o chiarimento e per la versione più aggiornata, fare riferimento al testo originale disponibile al link . + url="https://nmap.org/book/man.html" />. \ No newline at end of file diff --git a/docs/man-xlate/nmap-man-ja.xml b/docs/man-xlate/nmap-man-ja.xml index a43dc0623..aeeea0843 100644 --- a/docs/man-xlate/nmap-man-ja.xml +++ b/docs/man-xlate/nmap-man-ja.xml @@ -546,7 +546,7 @@ URGACKPSHRSTSYNFINで全部指定できるわけだが、もっとも - この高度なスキャン手法を使用すると、対象ホストに対して完全に匿名でTCPポートスキャンを実行できる(スキャンする側の実IPアドレスからは、対象ホストにパケットが送信されない)。それだけではなく、ゾンビホスト上で連続的に生成されるIPフラグメントID(識別子)が予測可能であることを巧妙に利用した独自のサイドチャネル攻撃を実行して、対象ホスト上のopenポートに関する情報を収集することもできる。IDSシステムでは、このスキャンはこちらで指定したゾンビマシン(稼動中でかつ特定の条件を満たす必要がある)から行われているものとして表示される。この非常に興味深いスキャンタイプは複雑すぎて本稿ではとても全容を説明しきれないので、完全な詳細を掲載した非公式の論文を以下に投稿しておくことにする: + この高度なスキャン手法を使用すると、対象ホストに対して完全に匿名でTCPポートスキャンを実行できる(スキャンする側の実IPアドレスからは、対象ホストにパケットが送信されない)。それだけではなく、ゾンビホスト上で連続的に生成されるIPフラグメントID(識別子)が予測可能であることを巧妙に利用した独自のサイドチャネル攻撃を実行して、対象ホスト上のopenポートに関する情報を収集することもできる。IDSシステムでは、このスキャンはこちらで指定したゾンビマシン(稼動中でかつ特定の条件を満たす必要がある)から行われているものとして表示される。この非常に興味深いスキャンタイプは複雑すぎて本稿ではとても全容を説明しきれないので、完全な詳細を掲載した非公式の論文を以下に投稿しておくことにする: このスキャンタイプは、(その匿名性のために)格別に秘匿性が高いことに加え、マシン間のIPベースの信頼関係を明らかにすることができる。ポートリストには、指定したゾンビホストから見たopenポートが表示される。よって、(ルータ/パケットフィルタのルールから)信頼関係にあると思われる様々なゾンビマシンを使ってターゲットをスキャンしてみることもできる。 diff --git a/docs/man-xlate/nmap-man-pl.xml b/docs/man-xlate/nmap-man-pl.xml index 7da587eda..fedea6b3e 100644 --- a/docs/man-xlate/nmap-man-pl.xml +++ b/docs/man-xlate/nmap-man-pl.xml @@ -1258,7 +1258,7 @@ skanowania nie zostanie określony, zostanie wykorzystany domyślny typ żeby go dokładnie opisać w tej dokumentacji, dlatego napisałem oddzielny nieformalny dokument na ten temat ze szczegółowymi informacjami i jest on dostępny pod adresem - . + . Poza tym, że metoda ta jest niespotykanie poufna (z powodu jej ślepej natury), ten typ skanowania pozwala na mapowanie reguł @@ -2353,7 +2353,7 @@ podobnie jak i UDP. odrzuci tego typu pakiety, otrzymana odpowiedź najprawdopodobniej pochodzi od systemu zaporowego lub IDS, które nie przejmują się sumami kontrolnymi. Dokładniejszy opis tej techniki znajduje się - pod adresem + pod adresem diff --git a/docs/man-xlate/nmap-man-pt_BR.xml b/docs/man-xlate/nmap-man-pt_BR.xml index 5bf89b2eb..a92676812 100644 --- a/docs/man-xlate/nmap-man-pt_BR.xml +++ b/docs/man-xlate/nmap-man-pt_BR.xml @@ -1539,7 +1539,7 @@ EXAMPLES: critérios). Este tipo fascinante de scan é complexo demais para se descrever completamente aqui, neste guia de referência, então eu escrevi e postei um trabalho informal com detalhes completos em - . + . Além de ser extraordinariamente camuflado (devido à sua natureza cega), este tipo de scan permite mapear relações de @@ -2881,7 +2881,7 @@ EXAMPLES: provavelmente vindas de um firewall ou IDS que nem se incomodou em verificar a soma de verificação. Para mais detalhes desta técnica, veja + url="https://nmap.org/p60-12.txt" /> diff --git a/docs/man-xlate/nmap-man-pt_PT.xml b/docs/man-xlate/nmap-man-pt_PT.xml index 8ad3cda11..be99b29c0 100644 --- a/docs/man-xlate/nmap-man-pt_PT.xml +++ b/docs/man-xlate/nmap-man-pt_PT.xml @@ -1278,7 +1278,7 @@ EXEMPLOS: critrios). Este tipo fascinante de rastreio(scan) complexo demais para se descrever completamente aqui neste guia de referncia, ento eu escrevi e postei um trabalho informal com detalhes completos em - . + . Alm de ser extraordinariamente camuflado (devido sua natureza cega), este tipo de rastreio(scan) permite mapear relaes de diff --git a/docs/man-xlate/nmap-man-ro.xml b/docs/man-xlate/nmap-man-ro.xml index 0a9ca639b..6a47e05b9 100644 --- a/docs/man-xlate/nmap-man-ro.xml +++ b/docs/man-xlate/nmap-man-ro.xml @@ -1241,7 +1241,7 @@ este prea complex pentru a fi descris in acest ghid de referinta, astfel ca am scris un document informativ cu detalii complete disponibil la - . + . In afara faptului ca este extrem de discreta (datorita naturii oarbe), acest tip de scanare permite maparea relatiilor de incredere bazate pe IP intre masini. Lista de porturi arata diff --git a/docs/man-xlate/nmap-man-ru.xml b/docs/man-xlate/nmap-man-ru.xml index d1d6b21ea..475566030 100644 --- a/docs/man-xlate/nmap-man-ru.xml +++ b/docs/man-xlate/nmap-man-ru.xml @@ -34,7 +34,7 @@ Описание Nmapdescription of - Этот документ описывает самую последнюю версию Nmap, доступную на или . Пожалуйста, удостоверьтесь в том, что вы используете последнюю версию, перед тем как сообщать, что какая-то функция работает не так как было описано. + Этот документ описывает самую последнюю версию Nmap, доступную на или . Пожалуйста, удостоверьтесь в том, что вы используете последнюю версию, перед тем как сообщать, что какая-то функция работает не так как было описано. Nmap (Network Mapper) это утилита с открытым исходным кодом для исследования сети и проверки безопасности. Она была разработана для быстрого сканирования больших сетей, хотя прекрасно справляется @@ -77,7 +77,7 @@ # nmap -A -T4 scanme.nmap.org playground -Starting Nmap ( http://nmap.org ) +Starting Nmap ( https://nmap.org ) Interesting ports on scanme.nmap.org (64.13.134.52): (The 1663 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE VERSION @@ -112,8 +112,8 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88.392 seconds -Самую новую версию Nmap можно скачать с . Самая новая версия страницы справки Nmap - (man page) расположена на . +Самую новую версию Nmap можно скачать с . Самая новая версия страницы справки Nmap + (man page) расположена на . @@ -123,7 +123,7 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88.392 seconds Гуз Александр (Guz Alexander) kalimatas@gmail.com Этот русский вариант Справочного Руководства Nmap является переводом версии 6184 оригинальной английской версии. Хотя я надеюсь, что данный перевод + url="https://nmap.org/book/man.html">оригинальной английской версии. Хотя я надеюсь, что данный перевод сделает Nmap более доступной для русскоязычных пользователей, я не могу гарантировать, что он является полным или является перевод последней официальной английской версии. Эта работа может модифицироваться или распространяться на основе лицензии Creative @@ -136,7 +136,7 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88.392 seconds Сводка опций Эта сводка опций выводится на экран, когда Nmap запускается без каких-либо опций; последняя версия всегда доступна -здесь . +здесь . Это помогает людям запомнить наиболее употребляемые опции, но это сводка не может быть заменой документации, предоставленной в данном руководстве. Некоторые опции даже не включены в этот список. @@ -147,7 +147,7 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88.392 seconds command-line optionsof Nmap -Nmap 4.76 ( http://nmap.org ) +Nmap 4.76 ( https://nmap.org ) Использование: nmap [Тип(ы) Сканирования] [Опции] {цель сканирования} ОПРЕДЕЛЕНИЕ ЦЕЛИ СКАНИРОВАНИЯ: Можно использовать сетевые имена, IP адреса, сети и т.д. @@ -1249,7 +1249,7 @@ URGACKPSHRSTSYNFIN будут установлены все флаги, сбора информации об открытых портах цели. Системы IDS будут считать, что сканирование производится с заданной вами зомби машины (которая должна работать и удовлетворять определенным критериям). Этот тип сканирования слишком сложен для описания в этом справочном руководстве, поэтому я написал и выложил - подробное описание на . + подробное описание на . Подробное описание этого типа сканирования смотрите на . @@ -1519,7 +1519,7 @@ Nmap скажет вам, уязвим хост или нет. Если вы п опция Nmap помимо других команд активирует также и обнаружение версии. Бумажная документация по работе, использованию и настройке опции обнаружения версии доступна на - . + . Опция обнаружения версии подробнее рассматривается в . @@ -1707,7 +1707,7 @@ Nmap скажет вам, уязвим хост или нет. Если вы п Бумажная документация по работе, использованию и настройки опции определения ОС находится на - . + . Опция определения ОС рассмотрена в . @@ -1809,12 +1809,12 @@ Nmap скажет вам, уязвим хост или нет. Если вы п version, discovery, vuln, auth и default. Все они описаны - в . + в . в . Скриптовый движок Nmap детально описан -на +на в и настраивается с помощью следующих опций: @@ -2659,7 +2659,7 @@ Nmap по умолчанию, она включает распараллелив Указывает Nmap использовать неправильные TCP или UDP контрольные суммы для пакетов, отправляемых на целевой хост. Т.к. практически все реализации стека IP просто не обрабатывают такие пакеты, то любые ответы скорее всего приходят от брандмауэров или IDS, которые не обременяеют себя проверкой контрольной суммы. Более - детальное описание этой техники смотрите на + детальное описание этой техники смотрите на @@ -2767,7 +2767,7 @@ Nmap по умолчанию, она включает распараллелив типа документа (DTD), что позволяет XML парсерам использовать XML вывод Nmap. Изначально это предназначалось для программного использования, хотя это также позволяет людям интерпретировать XML вывод Nmap. DTD определяет возможные элементы, а также перечисляет атрибуты и значения, которые они могут принимать. Последняя - версия всегда доступна на . + версия всегда доступна на . XML предоставляет формат, который легко обрабатывается программным обеспечением. Бесплатные XML парсеры, доступны для всех основных языков программирования, включая C/C++, Perl, Python и Java. Люди даже написали @@ -2836,7 +2836,7 @@ Nmap по умолчанию, она включает распараллелив Номер порта, Состояние, Протокол, Владелец, Служба, SunRPC информация и Информация о версии. Как и в случае с XML выводом, это руководство не позволяет полностью описать формат. Более подробное описание -этого формата доступно с . +этого формата доступно с . на . @@ -3059,7 +3059,7 @@ rttvar: 14987 to: 100000. Если вы не понимаете nmap.xsl для отображения результатов. Если вы хотите использовать другой файл таблицы стилей, то передайте имя этого файла в качестве аргумента опции . Вы должны использовать полный путь к файлу или URL. Один из примеров: - . Эта опция указывает браузеру загружать + . Эта опция указывает браузеру загружать последнюю версию таблицы стилей с Nmap.Org. Опция делает то же самое, но без лишнего набора на клавиатуре и запоминания. Загрузка XSL с Nmap.Org облегчает просмотр результатов на машине, на которой не установленна Nmap (и поэтому нет файла nmap.xsl). Поэтому @@ -3076,7 +3076,7 @@ rttvar: 14987 to: 100000. Если вы не понимаете Эта опция является просто псевдонимом - . + . @@ -3473,7 +3473,7 @@ rttvar: 14987 to: 100000. Если вы не понимаете Как и ее автор, Nmap не идеальна. Но вы можете сделать ее лучше посылая нам отчеты об ошибках или даже написав патч. Если Nmap ведет себя не так, как вы ожидаете, то для начала обновитесь до последней версии с - . Если проблема останется, то выясните, не была ли эта проблема уже обнаружена кем-то. + . Если проблема останется, то выясните, не была ли эта проблема уже обнаружена кем-то. Попробуйте поискать сообщения об ошибках на нашей странице поиска или в Google. Также попробуйте просмотреть nmap-dev архивы на .nmap-dev mailing list Также прочитайте полностью страницу руководства. Если ничего не помогло, отправьте сообщение об ошибке на @@ -3481,10 +3481,10 @@ rttvar: 14987 to: 100000. Если вы не понимаете Nmap вы используете, и на какой операционной системы вы запускаете Nmap. Сообщения о проблемах и вопросы по использованию Nmap отправленные на dev@nmap.org имеют больше шансов на ответ, чем если бы вы послали их непосредственно Fyodor'у. Если вы подпишитесь на рассылку nmap-dev перед отправкой сообщения, - то ваше сообщение будет обработано быстрее. Подпишитесь на рассылку на . + то ваше сообщение будет обработано быстрее. Подпишитесь на рассылку на . Патчи для исправления ошибок даже лучше просто сообщений об ошибках. Базовые инструкции по созданию патчей - доступны по адресу . Созданные вами патчи можно отправить на + доступны по адресу . Созданные вами патчи можно отправить на nmap-dev (рекомендуется) или непосредственно Fyodor'у. @@ -3498,7 +3498,7 @@ rttvar: 14987 to: 100000. Если вы не понимаете На протяжении многих лет сотни людей внесли ценный вклад в разработку Nmap. Все изменения и улучшения подробно описаны в файле CHANGELOGchangelog, который распространяется вместе с Nmap, а также доступен на - . + . @@ -3508,12 +3508,12 @@ rttvar: 14987 to: 100000. Если вы не понимаете Unofficial Translation Disclaimer / Отречение неофициального перевода - This is an unnofficial translation of the Nmap + This is an unnofficial translation of the Nmap license details into Russian. It was not written by Insecure.Com LLC, and does not legally state the distribution terms for Nmap -- only the original English text does that. However, we hope that this translation helps Russian speakers understand the Nmap license better. - Это неофициальный перевод лицензии Nmap на + Это неофициальный перевод лицензии Nmap на русский язык. Он не был осуществлен Insecure.Com LLC, и не определяет с юридической точки зрения условия распространения Nmap -- это делает только оригинальный английский вариант. Тем не менее, мы надеемся, что этот перевод поможет русскоязычным пользователям лучше понять лицензию Nmap. @@ -3556,7 +3556,7 @@ Insecure.Com LLC. Эта программа является свободным список не является полным, мы просто хотим сделать ясным наше понимание производных приложений с помощью некоторых общих примеров. Эти ограничения имеют силу, только когда вы действительно распростаняете Nmap. Например, ничего не мешает вам написать и продавать свой собственный пользовательский интерфейс для Nmap. Распространяйте его -самостоятельно, а для скачивания Nmap направляйте людей на . +самостоятельно, а для скачивания Nmap направляйте людей на . Мы не считаем, что данные ограничения должны быть добавлены к лицензии GPL, мы просто приводим наше понимание производных приложений по отношению к нашему продукту с GPL лицензией. Это похоже на то, как Линус diff --git a/docs/man-xlate/nmap-man-sk.xml b/docs/man-xlate/nmap-man-sk.xml index f1516802e..b89e8a033 100644 --- a/docs/man-xlate/nmap-man-sk.xml +++ b/docs/man-xlate/nmap-man-sk.xml @@ -1148,7 +1148,7 @@ zadane. Ak nie je zadany zakladny typ scanu, pouzije sa SYN scan. byt samozrejme aktivny a splnat urcite kriteria. Tento fascinujuci typ scanu je prilis zlozity na plny popis v tejto prirucke, takze som uplne detaily popisal neformalnym sposobom a ulozil na adresu - . + . Okrem toho, ze tento scan je vynimocne nenapadny (kvoli svojej slepej povahe), umoznuje zmapovat doveryhodne vztahy medzi pocitacmi zalozene na IP adrese. @@ -2146,7 +2146,7 @@ Vacsina TCP scanov vratane SYN scanu ako aj UDP scan podporuju tento parameter u Nmap pouzije neplatny kontrolny sucet TCP alebo UDP na odoslanie paketov cielovej stanici. Kedze prakticky vsetky hostitelske IP stacky dokladne zahadzuju taketo pakety, ak pride odpoved, pochadza pravdepodobne od firewallu alebo systemu IDS, ktory neoveroval kontrolny sucet. - Viac podrobnosti o tejto metode najdete na adrese + Viac podrobnosti o tejto metode najdete na adrese diff --git a/docs/man-xlate/nmap-man-zh.xml b/docs/man-xlate/nmap-man-zh.xml index 991ab933d..ef9db1924 100644 --- a/docs/man-xlate/nmap-man-zh.xml +++ b/docs/man-xlate/nmap-man-zh.xml @@ -985,7 +985,7 @@ SYN扫描认为没有响应意味着 利用zombie主机上已知的IP分段ID序列生成算法来窥探目标上开放端口的信息。 IDS系统将显示扫描来自您指定的zombie机(必须运行并且符合一定的标准)。 这种奇妙的扫描类型太复杂了,不能在此完全描述,所以我写一篇非正式的论文, - 发布在。 + 发布在除了极端隐蔽(由于它不从真实IP地址发送任何报文), 该扫描类型可以建立机器间的基于IP的信任关系。 @@ -1325,7 +1325,7 @@ Nmap用选项支持ftp弹跳扫描。参数格式是 很多主机的序列号是增加类别,即在每个发送包的IP头中 增加ID域值, 这对一些先进的信息收集和哄骗攻击来说是个漏洞。 - + 文档使用多种语言描述了版本检测的方式、使用和定制。 采用下列选项启用和控制操作系统检测: diff --git a/docs/man-xlate/nmap-pl.1 b/docs/man-xlate/nmap-pl.1 index af14f0424..c9c61a0aa 100644 --- a/docs/man-xlate/nmap-pl.1 +++ b/docs/man-xlate/nmap-pl.1 @@ -649,7 +649,7 @@ otwarty|filtrowany\&. Nmap będzie się zachowywał w taki sam sposób jak przy \fB\-sI \fR (Skanowanie Idle) .RS 4 Ta zaawansowana technika skanowania pozwala na prawdziwie ślepe skanowanie TCP (co oznacza, że żaden pakiet nie zostanie wysłany do badanego systemu z prawdziwego adresu IP Nmapa)\&. Zamiast tego wykorzystany zostanie host zombie, o przwidywalnym działaniu stosu TCP polegającym na sekwencyjnym powiększaniu numerów ID pakietów, do uzyskania informacji o otwartych portach w badanym systemie\&. Systemy detekcji intruzów pokażą jako adres atakującego zdefiniowany host zombie (musi spełniać określone warunki)\&. Ten fascynujący typ skanowania jest zbyt skomplikowany żeby go dokładnie opisać w tej dokumentacji, dlatego napisałem oddzielny nieformalny dokument na ten temat ze szczegółowymi informacjami i jest on dostępny pod adresem -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Poza tym, że metoda ta jest niespotykanie poufna (z powodu jej ślepej natury), ten typ skanowania pozwala na mapowanie reguł zaufania pomiędzy maszynami bazujących na adresach IP\&. Wyniki zawierają otwarte porty, \fIz punktu widzenia hosta zombie \fR\&. Tak więc można próbować skanowania z wykorzystaniem różnych hostów zombie, które można traktować jako zaufane (poprzez router/reguły filtrowania pakietów)\&. @@ -1117,7 +1117,7 @@ itp\&. \fB\-\-badsum\fR (Wysyłanie pakietów z nieprawidłową sumą kontrolną TCP/UDP) .RS 4 Powoduje wstawianie do nagłówków wysyłanych pakietów nieprawidłowych sum kontrolnych\&. Jako że prawie każdy stos IP odrzuci tego typu pakiety, otrzymana odpowiedź najprawdopodobniej pochodzi od systemu zaporowego lub IDS, które nie przejmują się sumami kontrolnymi\&. Dokładniejszy opis tej techniki znajduje się pod adresem -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[] .RE .SH "WYJśCIE" .PP diff --git a/docs/man-xlate/nmap-pt_BR.1 b/docs/man-xlate/nmap-pt_BR.1 index 0f0d6769e..2c56176ff 100644 --- a/docs/man-xlate/nmap-pt_BR.1 +++ b/docs/man-xlate/nmap-pt_BR.1 @@ -706,7 +706,7 @@ aberta|filtrada\&. O Nmap irá se comportar da mesma forma que o tipo de scan\-b .\" -sI .\" scan Idle Este método avançado de scan permite um scan TCP realmente cego das portas do alvo (significando que nenhum pacote é enviado para o alvo do seu endereço IP real)\&. Ao invés disso, um ataque canal\-lateral (side\-channel) explora a previsível geração de seqüencia de ID, conseqüencia da fragmentação do IP, no host zumbi, para juntar informações sobre as portas abertas no alvo\&. Sistemas IDS irão mostrar o scan como se viessem da máquina zumbi que você especificou (que deve estar ativa e obedecer a alguns critérios)\&. Este tipo fascinante de scan é complexo demais para se descrever completamente aqui, neste guia de referência, então eu escrevi e postei um trabalho informal com detalhes completos em -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Além de ser extraordinariamente camuflado (devido à sua natureza cega), este tipo de scan permite mapear relações de confiança baseadas em IP entre máquinas\&. A listagem de portas mostra as portas abertas \fIda perspectiva do host zumbi\&.\fR @@ -1253,7 +1253,7 @@ Cisco\&. .RS 4 .\" --badsum Solicita ao Nmap que utilize uma soma de verificação (checksum) TCP ou UDP inválida para os pacotes enviados aos hosts\&. Uma vez que virtualmente todos as pilhas (stack) IP do host irão rejeitar esses pacotes, quaisquer respostas recebidas são provavelmente vindas de um firewall ou IDS que nem se incomodou em verificar a soma de verificação\&. Para mais detalhes desta técnica, veja -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[] .RE .SH "SAíDA (OUTPUT)" .PP diff --git a/docs/man-xlate/nmap-pt_PT.1 b/docs/man-xlate/nmap-pt_PT.1 index d900f7317..5e9fb060c 100644 --- a/docs/man-xlate/nmap-pt_PT.1 +++ b/docs/man-xlate/nmap-pt_PT.1 @@ -631,7 +631,7 @@ aberta|filtrada\&. O Nmap irá se comportar da mesma forma que o tipo de rastrei \fB\-sI \fR (rastreio(scan) Idle) .RS 4 Este método avançado de rastreio(scan) permite um rastreio(scan) TCP realmente cego das portas do alvo (significando que nenhum pacote é enviado para o alvo do seu endereço IP real)\&. Ao invés disso um ataque canal\-lateral (side\-channel) explora a previsível geração de sequência de ID, consequência da fragmentação do IP no anfitrião(host) zumbi, para juntar informações sobre as portas abertas no alvo\&. Sistemas IDS irão mostrar o rastreio(scan) como se viessem da máquina zumbi que especificou (que deve estar activa e obedecer a alguns critérios)\&. Este tipo fascinante de rastreio(scan) é complexo demais para se descrever completamente aqui neste guia de referência, então eu escrevi e postei um trabalho informal com detalhes completos em -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Além de ser extraordinariamente camuflado (devido à sua natureza cega), este tipo de rastreio(scan) permite mapear relações de confiança baseadas em IP entre máquinas\&. A listagem de portas mostra as portas abertas \fIda perspectiva do anfitrião(host) zumbi\&.\fR diff --git a/docs/man-xlate/nmap-ro.1 b/docs/man-xlate/nmap-ro.1 index dbede795b..233f43890 100644 --- a/docs/man-xlate/nmap-ro.1 +++ b/docs/man-xlate/nmap-ro.1 @@ -563,7 +563,7 @@ deschis|filtrat (open|filtered)\&. Nmap se va comporta in acelasi fel in care o \fB\-sI \fR(Scanare Idle) .RS 4 Aceasta metoda avansata de scanare permite o scanare TCP complet oarba a tintei (insemnand ca nici un pachet nu este trimis tintei de la adresa IP reala)\&. In loc, un canal derivat de atac exploateaza o secventa de fragmentare IPID predictibila a hostului zombie pentru a culege informatii despre porturile deschise pe masina tinta\&. Sistemele IDS vor indica scanarea ca venind de la hostul zombie specificat (care trebuie sa fie functional si sa indeplineasca anumite criterii)\&. Acest tip fascinant de scanare este prea complex pentru a fi descris in acest ghid de referinta, astfel ca am scris un document informativ cu detalii complete disponibil la -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp In afara faptului ca este extrem de discreta (datorita naturii oarbe), acest tip de scanare permite maparea relatiilor de incredere bazate pe IP intre masini\&. Lista de porturi arata porturile deschise \fIdin perspectiva hostului zombie\&.\fRAsa ca puteti incerca scanarea tintei folosind diferiti zombie despre care credeti ca ar putea avea relatii de incredere cu tinta (prin router/filtru de pachete)\&. diff --git a/docs/man-xlate/nmap-ru.1 b/docs/man-xlate/nmap-ru.1 index 83757bf9a..22967a697 100644 --- a/docs/man-xlate/nmap-ru.1 +++ b/docs/man-xlate/nmap-ru.1 @@ -117,8 +117,8 @@ Nmap finished: 2 IP addresses (2 hosts up) scanned in 88\&.392 seconds .\} .PP Самую новую версию Nmap можно скачать с -\m[blue]\fB\%http://nmap.org\fR\m[]\&. Самая новая версия страницы справки Nmap (man page) расположена на -\m[blue]\fB\%http://nmap.org/book/man.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org\fR\m[]\&. Самая новая версия страницы справки Nmap (man page) расположена на +\m[blue]\fB\%https://nmap.org/book/man.html\fR\m[]\&. .SH "Замечания о переводе" .PP Гуз Александр (Guz Alexander) @@ -130,7 +130,7 @@ kalimatas@gmail\&.com .SH "Сводка опций" .PP Эта сводка опций выводится на экран, когда Nmap запускается без каких\-либо опций; последняя версия всегда доступна здесь -\m[blue]\fB\%http://nmap.org/data/nmap.usage.txt\fR\m[]\&. Это помогает людям запомнить наиболее употребляемые опции, но это сводка не может быть заменой документации, предоставленной в данном руководстве\&. Некоторые опции даже не включены в этот список\&. +\m[blue]\fB\%https://nmap.org/data/nmap.usage.txt\fR\m[]\&. Это помогает людям запомнить наиболее употребляемые опции, но это сводка не может быть заменой документации, предоставленной в данном руководстве\&. Некоторые опции даже не включены в этот список\&. .PP .\" summary of options @@ -786,7 +786,7 @@ FIN\&. Например, опцией \fB\-sI \fR\fB\fIзомби_хост\fR\fR\fB[:\fIпорт\fR]\fR ("ленивое" idle сканирование) .\" -sI .\" idle scan .RS 4 Этот продвинутый метод сканирования позволяет осуществить действительно незаметное TCP сканирование портов цели (имеется ввиду, что никакие пакеты не отсылаются на целевую машину с вашего реального IP адерса)\&. Вместо этого, на зомби машине используется предсказуемая последовательность генерации ID IP фрагментов для сбора информации об открытых портах цели\&. Системы IDS будут считать, что сканирование производится с заданной вами зомби машины (которая должна работать и удовлетворять определенным критериям)\&. -Этот тип сканирования слишком сложен для описания в этом справочном руководстве, поэтому я написал и выложил подробное описание на \m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +Этот тип сканирования слишком сложен для описания в этом справочном руководстве, поэтому я написал и выложил подробное описание на \m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Помимо его незаметности (в силу своей природы), этот тип сканирования также позволяет определять основанные на IP доверительные отношения между машинами\&. Список открытых портов показывает открытые порты \fIс точки зрения зомби машины\&.\fR @@ -955,7 +955,7 @@ nmap\-service\-probes.\" nmap-service-probes TCP порты обрабатываются так же\&. Имейте в виду, что опция Nmap \fB\-A\fR помимо других команд активирует также и обнаружение версии\&. -Бумажная документация по работе, использованию и настройке опции обнаружения версии доступна на \m[blue]\fB\%http://nmap.org/book/vscan.html\fR\m[]\&. +Бумажная документация по работе, использованию и настройке опции обнаружения версии доступна на \m[blue]\fB\%https://nmap.org/book/vscan.html\fR\m[]\&. .PP Когда Nmap получает ответы от службы, но не может сопоставить их с какой\-либо записью в своей базе данных, она выводит на экран специальную информацию и URL, по которому вы можете опубликовать эту информацию, если вы точно уверены, что за служба запущена на исследуемом вами порте\&. Пожалуйста, потратьте пару минут на публикацию этой информации, т\&.к\&. ваша находка поможет остальным\&. Благодаря таким публикациям, Nmap содержит в своей базе данных около 3000 записей для более чем 350 протоколов, таких как SMTP, FTP, HTTP и т\&.д\&. .\" submission of service fingerprints @@ -1039,7 +1039,7 @@ nmap\-os\-db.\" nmap-os-db Также во время определения ОС делается попытка узнать время работы целевой машины\&. С помощью временных меток (timestamp) TCP (\m[blue]\fBRFC 1323\fR\m[]\&\s-2\u[9]\d\s+2) Nmap пробует угадать, когда машина была перезагружена в последний раз\&. Информация может быть не точна, т\&.к\&. счетчик временной метки не был обнулен или был переполнен, или каким\-то образом скрыт\&. Информация выводится только в вербальном режиме\&. .PP -Бумажная документация по работе, использованию и настройки опции определения ОС находится на \m[blue]\fB\%http://nmap.org/book/osdetect.html\fR\m[]\&. +Бумажная документация по работе, использованию и настройки опции определения ОС находится на \m[blue]\fB\%https://nmap.org/book/osdetect.html\fR\m[]\&. .PP Функция определения ОС включается и управляется с помощью следующих опций: .PP @@ -1090,10 +1090,10 @@ vuln, auth и default\&. Все они описаны -в \m[blue]\fB\%http://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. +в \m[blue]\fB\%https://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. .PP Скриптовый движок Nmap детально описан -на \m[blue]\fB\%http://nmap.org/book/nse.html\fR\m[] +на \m[blue]\fB\%https://nmap.org/book/nse.html\fR\m[] и настраивается с помощью следующих опций: .PP @@ -1575,7 +1575,7 @@ Cisco\&. Эта опция оказывает влияние только на \fB\-\-badsum\fR (Посылать пакеты с фиктивными TCP/UDP контрольными суммами) .\" --badsum .\" TCP checksum .\" checksums .RS 4 Указывает Nmap использовать неправильные TCP или UDP контрольные суммы для пакетов, отправляемых на целевой хост\&. Т\&.к\&. практически все реализации стека IP просто не обрабатывают такие пакеты, то любые ответы скорее всего приходят от брандмауэров или IDS, которые не обременяеют себя проверкой контрольной суммы\&. Более детальное описание этой техники смотрите на -\m[blue]\fB\%http://nmap.org/p60-12.html\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.html\fR\m[] .RE .\" .\" @@ -1671,7 +1671,7 @@ Nmap также предоставляет опции для управлени Перенаправляет XML вывод в заданный файл\&. Nmap включает определение типа документа (DTD), что позволяет XML парсерам использовать XML вывод Nmap\&. Изначально это предназначалось для программного использования, хотя это также позволяет людям интерпретировать XML вывод Nmap\&. DTD определяет возможные элементы, а также перечисляет атрибуты и значения, которые они могут принимать\&. Последняя версия всегда доступна на -\m[blue]\fB\%http://nmap.org/data/nmap.dtd\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/data/nmap.dtd\fR\m[]\&. .sp XML предоставляет формат, который легко обрабатывается программным обеспечением\&. Бесплатные XML парсеры, доступны для всех основных языков программирования, включая C/C++, Perl, Python и Java\&. Люди даже написали привязки для большинства из этих языков для обработки выходных данных Nmap\&. Примерами являются \m[blue]\fBNmap::Scanner\fR\m[]\&\s-2\u[12]\d\s+2 @@ -1725,7 +1725,7 @@ SunRPC информация Информация о версии\&. .sp Как и в случае с XML выводом, это руководство не позволяет полностью описать формат\&. Более подробное описание этого формата доступно -с \m[blue]\fB\%http://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. +с \m[blue]\fB\%https://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. .RE .PP \fB\-oA \fR\fB\fIбазовое_имя_файла\fR\fR (Использовать все форматы вывода) .\" -oA @@ -1849,7 +1849,7 @@ nmap\&.xml, туда, где он был размещен Nmap при устан nmap\&.xsl для отображения результатов\&. Если вы хотите использовать другой файл таблицы стилей, то передайте имя этого файла в качестве аргумента опции \fB\-\-stylesheet\fR\&. Вы должны использовать полный путь к файлу или URL\&. Один из примеров: -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR\&. Эта опция указывает браузеру загружать последнюю версию таблицы стилей с Nmap\&.Org\&. Опция +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR\&. Эта опция указывает браузеру загружать последнюю версию таблицы стилей с Nmap\&.Org\&. Опция \fB\-\-webxml\fR делает то же самое, но без лишнего набора на клавиатуре и запоминания\&. Загрузка XSL с Nmap\&.Org облегчает просмотр результатов на машине, на которой не установленна Nmap (и поэтому нет файла nmap\&.xsl)\&. Поэтому URL часто бывает более полезен, но локальный файл @@ -1860,7 +1860,7 @@ nmap\&.xsl \fB\-\-webxml\fR (Загружает таблицу стилей с Nmap\&.Org) .\" --webxml .RS 4 Эта опция является просто псевдонимом -\fB\-\-stylesheet http://nmap\&.org/data/nmap\&.xsl\fR\&. +\fB\-\-stylesheet https://nmap\&.org/data/nmap\&.xsl\fR\&. .RE .PP \fB\-\-no\-stylesheet\fR (Убрать объявление XSL таблицы стилей из XML) .\" --no-stylesheet @@ -2081,7 +2081,7 @@ scanme\&.nmap\&.org .\" bugs, reporting .PP Как и ее автор, Nmap не идеальна\&. Но вы можете сделать ее лучше посылая нам отчеты об ошибках или даже написав патч\&. Если Nmap ведет себя не так, как вы ожидаете, то для начала обновитесь до последней версии с -\m[blue]\fB\%http://nmap.org\fR\m[]\&. Если проблема останется, то выясните, не была ли эта проблема уже обнаружена кем\-то\&. Попробуйте поискать сообщения об ошибках на нашей странице поиска +\m[blue]\fB\%https://nmap.org\fR\m[]\&. Если проблема останется, то выясните, не была ли эта проблема уже обнаружена кем\-то\&. Попробуйте поискать сообщения об ошибках на нашей странице поиска \m[blue]\fB\%http://insecure.org/search.html\fR\m[] или в Google\&. Также попробуйте просмотреть nmap\-dev @@ -2091,10 +2091,10 @@ nmap\-dev dev@nmap\&.org\&. Пожалуйста, включите всю известную вам информацию об ошибке, какую версию Nmap вы используете, и на какой операционной системы вы запускаете Nmap\&. Сообщения о проблемах и вопросы по использованию Nmap отправленные на dev@nmap\&.org имеют больше шансов на ответ, чем если бы вы послали их непосредственно Fyodor\*(Aqу\&. Если вы подпишитесь на рассылку nmap\-dev перед отправкой сообщения, то ваше сообщение будет обработано быстрее\&. Подпишитесь на рассылку на -\m[blue]\fB\%http://nmap.org/mailman/listinfo/dev\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/mailman/listinfo/dev\fR\m[]\&. .PP Патчи для исправления ошибок даже лучше просто сообщений об ошибках\&. Базовые инструкции по созданию патчей доступны по адресу -\m[blue]\fB\%http://nmap.org/data/HACKING\fR\m[]\&. Созданные вами патчи можно отправить на +\m[blue]\fB\%https://nmap.org/data/HACKING\fR\m[]\&. Созданные вами патчи можно отправить на nmap\-dev (рекомендуется) или непосредственно Fyodor\*(Aqу\&. .SH "Автор" @@ -2105,7 +2105,7 @@ fyodor@nmap\&.org .PP На протяжении многих лет сотни людей внесли ценный вклад в разработку Nmap\&. Все изменения и улучшения подробно описаны в файле CHANGELOG.\" changelog, который распространяется вместе с Nmap, а также доступен на -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[]\&. .SH "Юридические уведомления" .SS "Unofficial Translation Disclaimer / Отречение неофициального перевода" .PP @@ -2188,7 +2188,7 @@ Nmap интегрируется/включается/агрегируется в В термин \(lqNmap\(rq следует также включать любые части Nmap или производные от нее приложения\&. Это список не является полным, мы просто хотим сделать ясным наше понимание производных приложений с помощью некоторых общих примеров\&. Эти ограничения имеют силу, только когда вы действительно распростаняете Nmap\&. Например, ничего не мешает вам написать и продавать свой собственный пользовательский интерфейс для Nmap\&. Распространяйте его самостоятельно, а для скачивания Nmap направляйте людей на -\m[blue]\fB\%http://nmap.org\fR\m[]\&. +\m[blue]\fB\%https://nmap.org\fR\m[]\&. .PP Мы не считаем, что данные ограничения должны быть добавлены к лицензии GPL, мы просто приводим наше понимание \(lqпроизводных приложений\(rq @@ -2255,7 +2255,7 @@ U\&.S\&. Export Control: Insecure\&.Com LLC указывает, что Nmap по .IP " 1." 4 оригинальной английской версии .RS 4 -\%http://nmap.org/book/man.html +\%https://nmap.org/book/man.html .RE .IP " 2." 4 Creative Commons Attribution License @@ -2325,7 +2325,7 @@ Nmap::Parser .IP "15." 4 Nmap license details .RS 4 -\%http://nmap.org/book/man-legal.html +\%https://nmap.org/book/man-legal.html .RE .IP "16." 4 Apache Software Foundation diff --git a/docs/man-xlate/nmap-sk.1 b/docs/man-xlate/nmap-sk.1 index 5190beefc..f07694caa 100644 --- a/docs/man-xlate/nmap-sk.1 +++ b/docs/man-xlate/nmap-sk.1 @@ -638,7 +638,7 @@ otvoreny|filtrovany\&. Nmap bude postupovat presne tak ako pri zakladnych typoch \fB\-sI \fR (Scan naprazdno \- Idlescan) .RS 4 Tato pokrocila metoda umoznuje naozaj slepy scan portov cielovej stanice s tym, ze z lokalnej skutocnej IP adresy nie su odosielane ziadne pakety\&. Namiesto toho sa pouzije utok po bocnom kanale, ktory vyuziva delenie na IP fragmenty a predpovedatelne tvorenie sekvencie ID cisel na zombie hostitelovi\&. Tym sa zhromazduju informacie o otvorenych portoch na cielovom pocitaci\&. IDS systemy zobrazia, ze scan pochadza z pocitaca zombie, ktory bol specifikovany, musi byt samozrejme aktivny a splnat urcite kriteria\&. Tento fascinujuci typ scanu je prilis zlozity na plny popis v tejto prirucke, takze som uplne detaily popisal neformalnym sposobom a ulozil na adresu -\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Okrem toho, ze tento scan je vynimocne nenapadny (kvoli svojej slepej povahe), umoznuje zmapovat doveryhodne vztahy medzi pocitacmi zalozene na IP adrese\&. Zoznam portov zobrazuje otvorene porty \fIz pohladu zombie hostitela\&.\fR @@ -1096,7 +1096,7 @@ Cisco\&. \fB\-\-badsum\fR (Odoslat pakety s falosnym kontrolnym suctom TCP/UDP) .RS 4 Nmap pouzije neplatny kontrolny sucet TCP alebo UDP na odoslanie paketov cielovej stanici\&. Kedze prakticky vsetky hostitelske IP stacky dokladne zahadzuju taketo pakety, ak pride odpoved, pochadza pravdepodobne od firewallu alebo systemu IDS, ktory neoveroval kontrolny sucet\&. Viac podrobnosti o tejto metode najdete na adrese -\m[blue]\fB\%http://nmap.org/p60-12.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.txt\fR\m[] .RE .SH "VYSTUP" .PP diff --git a/docs/man-xlate/nmap-zh.1 b/docs/man-xlate/nmap-zh.1 index b6008c662..2245e46f1 100644 --- a/docs/man-xlate/nmap-zh.1 +++ b/docs/man-xlate/nmap-zh.1 @@ -523,7 +523,7 @@ open|filtered。 除了使用您指定的TCP标记位,Nmap会和基本扫描 .PP \fB\-sI \fR (Idlescan) .RS 4 -这种高级的扫描方法允许对目标进行真正的TCP端口盲扫描 (意味着没有报文从您的真实IP地址发送到目标)。相反,side\-channel攻击 利用zombie主机上已知的IP分段ID序列生成算法来窥探目标上开放端口的信息。 IDS系统将显示扫描来自您指定的zombie机(必须运行并且符合一定的标准)。 这种奇妙的扫描类型太复杂了,不能在此完全描述,所以我写一篇非正式的论文, 发布在\m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]。 +这种高级的扫描方法允许对目标进行真正的TCP端口盲扫描 (意味着没有报文从您的真实IP地址发送到目标)。相反,side\-channel攻击 利用zombie主机上已知的IP分段ID序列生成算法来窥探目标上开放端口的信息。 IDS系统将显示扫描来自您指定的zombie机(必须运行并且符合一定的标准)。 这种奇妙的扫描类型太复杂了,不能在此完全描述,所以我写一篇非正式的论文, 发布在\m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]。 .sp 除了极端隐蔽(由于它不从真实IP地址发送任何报文), 该扫描类型可以建立机器间的基于IP的信任关系。 端口列表\fI从zombie 主机的角度。\fR显示开放的端口。 因此您可以尝试用您认为(通过路由器/包过滤规则)可能被信任的 zombies扫描目标。 .sp @@ -651,7 +651,7 @@ Nmap最著名的功能之一是用TCP/IP协议栈fingerprinting进行远程操 操作系统检测可以进行其它一些测试,这些测试可以利用处理 过程中收集到的信息。例如运行时间检测,使用TCP时间戳选项(RFC 1323) 来估计主机上次重启的时间,这仅适用于提供这类信息的主机。另一种 是TCP序列号预测分类,用于测试针对远程主机建立一个伪造的TCP连接 的可能难度。这对于利用基于源IP地址的可信关系(rlogin,防火墙过滤等) 或者隐含源地址的攻击非常重要。这一类哄骗攻击现在很少见,但一些 主机仍然存在这方面的漏洞。实际的难度值基于统计采样,因此可能会有 一些波动。通常采用英国的分类较好,如\(lqworthy challenge\(rq或者 \(lqtrivial joke\(rq。在详细模式(\fB\-v\fR)下只以 普通的方式输出,如果同时使用\fB\-O\fR,还报告IPID序列产生号。 很多主机的序列号是\(lq增加\(rq类别,即在每个发送包的IP头中 增加ID域值, 这对一些先进的信息收集和哄骗攻击来说是个漏洞。 .PP -\m[blue]\fB\%http://nmap.org/book/osdetect.html\fR\m[] +\m[blue]\fB\%https://nmap.org/book/osdetect.html\fR\m[] 文档使用多种语言描述了版本检测的方式、使用和定制。 .PP 采用下列选项启用和控制操作系统检测: diff --git a/docs/nmap-fo.xsl b/docs/nmap-fo.xsl index 365e80ae5..381311247 100644 --- a/docs/nmap-fo.xsl +++ b/docs/nmap-fo.xsl @@ -654,7 +654,7 @@ Remote Operating System Detection Cannot determine exact operating system. Fingerprint provided below. - If you know what OS is running on it, see http://nmap.org/submit/ + If you know what OS is running on it, see https://nmap.org/submit/ diff --git a/docs/nmap-install.xml b/docs/nmap-install.xml index ea35f8dd7..6a1b8e565 100644 --- a/docs/nmap-install.xml +++ b/docs/nmap-install.xml @@ -34,7 +34,7 @@ you should see output similar to that in felix~> nmap --version -Nmap version 4.76 ( http://nmap.org ) +Nmap version 4.76 ( https://nmap.org ) felix~> @@ -47,11 +47,11 @@ version number (here 4.76). Even if your system already has a copy of Nmap, you should consider upgrading to the latest version available from .downloading +url="https://nmap.org/download.html" />.downloading Newer versions often run faster, fix important bugs, and feature updated operating system and service version detection databases. A list of changes since the version already on your system can be found -at .changelog +at .changelog Nmap output examples in this book may not match the output produced by older versions. @@ -93,7 +93,7 @@ command-line. code and binaries for Nmap and Zenmap. Source code is distributed in bzip2 and gzip compressed tar files, and binaries are available for Linux (RPM format), Windows (NSIS executable installer) and Mac OS X (.dmg disk image). Find all of this at . +url="https://nmap.org/download.html" />. @@ -114,7 +114,7 @@ should always be careful. To verify the authenticity of an Nmap release, consult the PGP detached signatures or cryptographic hashes (including SHA1 and MD5) posted for the release in the Nmap signatures directory at . +url="https://nmap.org/dist/sigs/?C=M&O=D"/>. The most secure verification mechanism is detached PGPPGP signatures signatures. As the signing key is never stored on production servers, @@ -271,7 +271,7 @@ location to the nmap-dev mailing list. If you would like real-time (or digested) notification and diffs by email when any changes are made to Nmap, sign up for the nmap-svn mailing list at . +url="https://nmap.org/mailman/listinfo/svn"/>. @@ -302,7 +302,7 @@ quicker and easier to install, and allow for consistent management -Download the latest version of Nmap in .tar.bz2 (bzip2 compression) or .tgz (gzip compression) format from . +Download the latest version of Nmap in .tar.bz2 (bzip2 compression) or .tgz (gzip compression) format from . Decompress the downloaded tarball with a command such as: @@ -467,7 +467,7 @@ I would run ./configure --prefix=/home/fyodor Upgrade to the latest Nmap -Check to make sure you are using the latest version of Nmap. The problem may have already been fixed. +Check to make sure you are using the latest version of Nmap. The problem may have already been fixed. Read the error message carefully Scroll up in the output screen and examine the error @@ -536,7 +536,7 @@ for the most common distributions. Fedora (Linux distribution)installing on, with RPM I build RPM packages for every release of Nmap and post them to -the Nmap download page at . +the Nmap download page at . I build two packages: The nmap package contains just the command-line executable and data files, while the zenmap package contains the optional Zenmap @@ -552,12 +552,12 @@ upgraded. Installing Nmap from binary RPMs -# rpm -vhU http://nmap.org/dist/nmap-4.68-1.i386.rpm -Retrieving http://nmap.org/dist/nmap-4.68-1.i386.rpm +# rpm -vhU https://nmap.org/dist/nmap-4.68-1.i386.rpm +Retrieving https://nmap.org/dist/nmap-4.68-1.i386.rpm Preparing... ########################################### [100%] 1:nmap ########################################### [100%] -# rpm -vhU http://nmap.org/dist/zenmap-4.68-1.noarch.rpm -Retrieving http://nmap.org/dist/zenmap-4.68-1.noarch.rpm +# rpm -vhU https://nmap.org/dist/zenmap-4.68-1.noarch.rpm +Retrieving https://nmap.org/dist/zenmap-4.68-1.noarch.rpm Preparing... ########################################### [100%] 1:zenmap ########################################### [100%] @@ -567,7 +567,7 @@ Preparing... ########################################### [100%] Building and installing Nmap from source RPMs -> rpmbuild --rebuild http://nmap.org/dist/nmap-4.68-1.src.rpm +> rpmbuild --rebuild https://nmap.org/dist/nmap-4.68-1.src.rpm [ hundreds of lines cut ] Wrote: /home/fyodor/rpmdir/RPMS/i386/nmap-4.68-1.i386.rpm [ cut ] @@ -679,7 +679,7 @@ url="http://packages.debian.org/unstable/nmap" /> and Steps for converting Nmap RPM files to Debian/Ubuntu <filename>deb</filename> format for installation on Debian/Ubuntu If you don't have the alien command, install it with a command such as sudo apt-get install alien -Download the Nmap RPMs for your platform (x86 or x86-64) from . This description will use nmap-5.21-1.x86_64.rpm +Download the Nmap RPMs for your platform (x86 or x86-64) from . This description will use nmap-5.21-1.x86_64.rpm Verify the download integrity as described in . Generate a Debian package with a command such as sudo alien nmap-5.21-1.x86_64.rpm Install the Debian package with a command such as sudo dpkg --install nmap_5.21-2_amd64.deb @@ -774,7 +774,7 @@ be reused. Most people simply check the box to apply these changes in the execu Windows users have three choices for installing Nmap, all of which are available from the -download page at . +download page at . Windows Self-installer Windowsself-installer @@ -810,7 +810,7 @@ system available from . Here are the step- Installing the Nmap zip binaries -Download the .zip binaries from . +Download the .zip binaries from . Uncompress the zip file into the directory you want Nmap to reside in. An example would be C:\Program @@ -885,7 +885,7 @@ point to the alternate directory. Decide whether to obtain the Nmap source code by downloading the latest release from nmap.org, or using a Subversion client to retrieve even newer (but less tested) code from our repository. These instructions are for the web download approach, but using Subversion instead is straightforward (see ). -Download the latest Nmap source distribution from . It has the name +Download the latest Nmap source distribution from . It has the name nmap-version.tar.bz2 or nmap-version.tgz. Those are the same tar file compressed using bzip2 or gzip, respectively. The bzip2-compressed version is smaller. @@ -1020,7 +1020,7 @@ package Unix software for Mac OS X. The easiest way to install Nmap and Zenmap on Mac OS X is to use our installer. The -Mac OS X section of +Mac OS X section of the Nmap download page provides a file named nmap-version.dmg, where version is the version number of the most @@ -1469,7 +1469,7 @@ running make uninstall. If you no longer have that build directory, type nmap -V to obtain the Nmap version number. Then download that source tarball for that version of -Nmap from or . +Nmap from or . Uncompress the tarball and change into the newly created directory (nmap-version). Run ./configure, including any install-path options that you specified diff --git a/docs/nmap-update.1 b/docs/nmap-update.1 index e0d16baa8..5939beff0 100644 --- a/docs/nmap-update.1 +++ b/docs/nmap-update.1 @@ -2,12 +2,12 @@ .\" Title: nmap-update .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 07/08/2015 +.\" Date: 11/05/2015 .\" Manual: nmap-update Reference Guide .\" Source: nmap-update .\" Language: English .\" -.TH "NMAP\-UPDATE" "1" "07/08/2015" "nmap\-update" "nmap\-update Reference Guide" +.TH "NMAP\-UPDATE" "1" "11/05/2015" "nmap\-update" "nmap\-update Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- diff --git a/docs/nmap.1 b/docs/nmap.1 index d6dc89135..28c338439 100644 --- a/docs/nmap.1 +++ b/docs/nmap.1 @@ -2,12 +2,12 @@ .\" Title: nmap .\" Author: [see the "Author" section] .\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 07/08/2015 +.\" Date: 11/05/2015 .\" Manual: Nmap Reference Guide .\" Source: Nmap .\" Language: English .\" -.TH "NMAP" "1" "07/08/2015" "Nmap" "Nmap Reference Guide" +.TH "NMAP" "1" "11/05/2015" "Nmap" "Nmap Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -109,9 +109,9 @@ Nmap done: 1 IP address (1 host up) scanned in 14\&.40 seconds .\} .PP The newest version of Nmap can be obtained from -\m[blue]\fB\%http://nmap.org\fR\m[]\&. The newest version of this man page is available at -\m[blue]\fB\%http://nmap.org/book/man.html\fR\m[]\&. -It is also included as a chapter of Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (see \m[blue]\fB\%http://nmap.org/book/\fR\m[])\&. +\m[blue]\fB\%https://nmap.org\fR\m[]\&. The newest version of this man page is available at +\m[blue]\fB\%https://nmap.org/book/man.html\fR\m[]\&. +It is also included as a chapter of Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (see \m[blue]\fB\%https://nmap.org/book/\fR\m[])\&. .SH "OPTIONS SUMMARY" .PP This options summary is printed when Nmap is run with no arguments, and the latest version is always available at @@ -494,7 +494,7 @@ and .RS 4 .\" payloads, protocol-specific Another host discovery option is the UDP ping, which sends a UDP packet to the given ports\&. For most ports, the packet will be empty, though some use a protocol\-specific payload that is more likely to elicit a response\&. -The payload database is described at \m[blue]\fB\%http://nmap.org/book/nmap-payloads.html\fR\m[]\&..\" protocol-specific payloads: UDP\&. Packet content can also be affected with the +The payload database is described at \m[blue]\fB\%https://nmap.org/book/nmap-payloads.html\fR\m[]\&..\" protocol-specific payloads: UDP\&. Packet content can also be affected with the \fB\-\-data\fR, \fB\-\-data\-string\fR, and \fB\-\-data\-length\fR @@ -726,7 +726,7 @@ filtered states\&. .sp This technique is often referred to as half\-open scanning, because you don\*(Aqt open a full TCP connection\&. You send a SYN packet, as if you are going to open a real connection and then wait for a response\&. A SYN/ACK indicates the port is listening (open), while a RST (reset) is indicative of a non\-listener\&. If no response is received after several retransmissions, the port is marked as filtered\&. The port is also marked filtered if an ICMP unreachable error (type 3, code 0, 1, 2, 3, 9, 10, or 13) is received\&. The port is also considered open if a SYN packet (without the ACK flag) is received in response\&. This can be due to an extremely rare TCP feature known as a simultaneous open or split handshake connection (see -\m[blue]\fB\%http://nmap.org/misc/split-handshake.pdf\fR\m[])\&. +\m[blue]\fB\%https://nmap.org/misc/split-handshake.pdf\fR\m[])\&. .RE .PP \fB\-sT\fR (TCP connect scan) .\" -sT .\" connect scan @@ -922,7 +922,7 @@ in both cases\&. \fB\-sI \fR\fB\fIzombie host\fR\fR\fB[:\fIprobeport\fR]\fR (idle scan) .\" -sI .\" idle scan .RS 4 This advanced scan method allows for a truly blind TCP port scan of the target (meaning no packets are sent to the target from your real IP address)\&. Instead, a unique side\-channel attack exploits predictable IP fragmentation ID sequence generation on the zombie host to glean information about the open ports on the target\&. IDS systems will display the scan as coming from the zombie machine you specify (which must be up and meet certain criteria)\&. -This fascinating scan type is too complex to fully describe in this reference guide, so I wrote and posted an informal paper with full details at \m[blue]\fB\%http://nmap.org/book/idlescan.html\fR\m[]\&. +This fascinating scan type is too complex to fully describe in this reference guide, so I wrote and posted an informal paper with full details at \m[blue]\fB\%https://nmap.org/book/idlescan.html\fR\m[]\&. .sp Besides being extraordinarily stealthy (due to its blind nature), this scan type permits mapping out IP\-based trust relationships between machines\&. The port listing shows open ports \fIfrom the perspective of the zombie host\&.\fR @@ -1108,7 +1108,7 @@ open|filtered TCP ports are treated the same way\&. Note that the Nmap \fB\-A\fR option enables version detection among other things\&. -A paper documenting the workings, usage, and customization of version detection is available at \m[blue]\fB\%http://nmap.org/book/vscan.html\fR\m[]\&. +A paper documenting the workings, usage, and customization of version detection is available at \m[blue]\fB\%https://nmap.org/book/vscan.html\fR\m[]\&. .PP When RPC services are discovered, the Nmap RPC grinder.\" RPC grinder is automatically used to determine the RPC program and version numbers\&. It takes all the TCP/UDP ports detected as RPC and floods them with SunRPC program NULL commands in an attempt to determine whether they are RPC ports, and if so, what program and version number they serve up\&. Thus you can effectively obtain the same info as @@ -1192,7 +1192,7 @@ class, which means that they increment the ID field in the IP header for each pa .PP Another bit of extra information enabled by OS detection is a guess at a target\*(Aqs uptime\&. This uses the TCP timestamp option (\m[blue]\fBRFC 1323\fR\m[]\&\s-2\u[10]\d\s+2) to guess when a machine was last rebooted\&. The guess can be inaccurate due to the timestamp counter not being initialized to zero or the counter overflowing and wrapping around, so it is printed only in verbose mode\&. .PP -A paper documenting the workings, usage, and customization of OS detection is available at \m[blue]\fB\%http://nmap.org/book/osdetect.html\fR\m[]\&. +A paper documenting the workings, usage, and customization of OS detection is available at \m[blue]\fB\%https://nmap.org/book/osdetect.html\fR\m[]\&. .PP OS detection is enabled and controlled with the following options: .PP @@ -1248,12 +1248,12 @@ malware, safe, version, and vuln\&. These are all described -at \m[blue]\fB\%http://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. +at \m[blue]\fB\%https://nmap.org/book/nse-usage.html#nse-categories\fR\m[]\&. .PP Scripts are not run in a sandbox and thus could accidentally or maliciously damage your system or invade your privacy\&. Never run scripts from third parties unless you trust the authors or have carefully audited the scripts yourself\&. .PP The Nmap Scripting Engine is described in detail -at \m[blue]\fB\%http://nmap.org/book/nse.html\fR\m[] +at \m[blue]\fB\%https://nmap.org/book/nse.html\fR\m[] and is controlled by the following options: .PP \fB\-sC\fR .\" -sC @@ -1311,7 +1311,7 @@ extension; it will be added automatically if necessary\&. Nmap scripts are stored in a scripts subdirectory of the Nmap data directory by default -(see \m[blue]\fB\%http://nmap.org/book/data-files.html\fR\m[])\&. +(see \m[blue]\fB\%https://nmap.org/book/data-files.html\fR\m[])\&. For efficiency, scripts are indexed in a database stored in scripts/script\&.db,.\" script.db which lists the category or categories in which each script belongs\&. @@ -1393,7 +1393,7 @@ pairs\&. Names and values may be strings not containing whitespace or the charac xmpp\-info\&.server_name\&. You may use that full qualified version to affect just the specified script, or you may pass the unqualified version (server_name in this case) to affect all scripts using that argument name\&. A script will first check for its fully qualified argument name (the name specified in its documentation) before it accepts an unqualified argument name\&. A complex example of script arguments is \fB\-\-script\-args \*(Aquser=foo,pass=",{}=bar",whois={whodb=nofollow+ripe},xmpp\-info\&.server_name=localhost\*(Aq\fR\&. The online NSE Documentation Portal at -\m[blue]\fB\%http://nmap.org/nsedoc/\fR\m[] +\m[blue]\fB\%https://nmap.org/nsedoc/\fR\m[] lists the arguments that each script accepts\&. .RE .PP @@ -1919,7 +1919,7 @@ Warning: this feature is still under development and has limitations\&. It is im \fB\-\-badsum\fR (Send packets with bogus TCP/UDP checksums) .\" --badsum .\" TCP checksum .\" checksums .RS 4 Asks Nmap to use an invalid TCP, UDP or SCTP checksum for packets sent to target hosts\&. Since virtually all host IP stacks properly drop these packets, any responses received are likely coming from a firewall or IDS that didn\*(Aqt bother to verify the checksum\&. For more details on this technique, see -\m[blue]\fB\%http://nmap.org/p60-12.html\fR\m[] +\m[blue]\fB\%https://nmap.org/p60-12.html\fR\m[] .RE .PP \fB\-\-adler32\fR (Use deprecated Adler32 instead of CRC32C for SCTP checksums) .\" --adler32 .\" CRC32C checksum .\" Adler32 checksum .\" SCTP checksum @@ -2077,7 +2077,7 @@ SunRPC info, and Version info\&. .sp As with XML output, this man page does not allow for documenting the entire format\&. A more detailed look at the Nmap grepable output format is available -from \m[blue]\fB\%http://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. +from \m[blue]\fB\%https://nmap.org/book/output-formats-grepable-output.html\fR\m[]\&. .RE .PP \fB\-oA \fR\fB\fIbasename\fR\fR (Output to all formats) .\" -oA @@ -2213,7 +2213,7 @@ where it was initially installed by Nmap\&. Run the XML file through an XSLT pro \m[blue]\fBxsltproc\fR\m[]\&\s-2\u[17]\d\s+2.\" xsltproc to produce an HTML file\&. Directly opening the XML file in a browser no longer works well because modern browsers limit the locations a stylesheet may be loaded from\&. If you wish to use a different stylesheet, specify it as the argument to \fB\-\-stylesheet\fR\&. You must pass the full pathname or URL\&. One common invocation is -\fB\-\-stylesheet http://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. This tells an XSLT processor to load the latest version of the stylesheet from Nmap\&.Org\&. The +\fB\-\-stylesheet https://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. This tells an XSLT processor to load the latest version of the stylesheet from Nmap\&.Org\&. The \fB\-\-webxml\fR option does the same thing with less typing and memorization\&. Loading the XSL from Nmap\&.Org makes it easier to view results on a machine that doesn\*(Aqt have Nmap (and thus nmap\&.xsl) installed\&. So the URL is often more useful, but the local filesystem location of @@ -2224,7 +2224,7 @@ is used by default for privacy reasons\&. \fB\-\-webxml\fR (Load stylesheet from Nmap\&.Org) .\" --webxml .RS 4 This is a convenience option, nothing more than an alias for -\fB\-\-stylesheet http://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. +\fB\-\-stylesheet https://nmap\&.org/svn/docs/nmap\&.xsl\fR\&. .RE .PP \fB\-\-no\-stylesheet\fR (Omit XSL stylesheet declaration from XML) .\" --no-stylesheet @@ -2449,13 +2449,13 @@ This scans 4096 IPs for any web servers (without pinging them) and saves the out While this reference guide details all material Nmap options, it can\*(Aqt fully demonstrate how to apply those features to quickly solve real\-world tasks\&. For that, we released Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning\&. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine\&. Hints and instructions are provided for common Nmap tasks such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks\&. Examples and diagrams show actual communication on the wire\&. More than half of the book is available free online\&. See -\m[blue]\fB\%http://nmap.org/book\fR\m[] +\m[blue]\fB\%https://nmap.org/book\fR\m[] for more information\&. .SH "BUGS" .\" bugs, reporting .PP Like its author, Nmap isn\*(Aqt perfect\&. But you can help make it better by sending bug reports or even writing patches\&. If Nmap doesn\*(Aqt behave the way you expect, first upgrade to the latest version available from -\m[blue]\fB\%http://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try searching for the error message on our search page at +\m[blue]\fB\%https://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try searching for the error message on our search page at \m[blue]\fB\%http://insecure.org/search.html\fR\m[] or at Google\&. Also try browsing the nmap\-dev @@ -2465,7 +2465,7 @@ Read this full manual page as well\&. If nothing comes of this, mail a bug repor \&. Please include everything you have learned about the problem, as well as what version of Nmap you are running and what operating system version it is running on\&. Problem reports and Nmap usage questions sent to are far more likely to be answered than those sent to Fyodor directly\&. If you subscribe to the nmap\-dev list before posting, your message will bypass moderation and get through more quickly\&. Subscribe at -\m[blue]\fB\%http://nmap.org/mailman/listinfo/dev\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/mailman/listinfo/dev\fR\m[]\&. .PP Code patches to fix bugs are even better than bug reports\&. Basic instructions for creating patch files with your changes are available at \m[blue]\fB\%https://svn.nmap.org/nmap/HACKING\fR\m[]\&. Patches may be sent to @@ -2482,7 +2482,7 @@ Lyon Hundreds of people have made valuable contributions to Nmap over the years\&. These are detailed in the CHANGELOG.\" changelog file which is distributed with Nmap and also available from -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[]\&. .SH "LEGAL NOTICES" .SS "Nmap Copyright and Licensing" .\" copyright @@ -2655,7 +2655,7 @@ When compiled with OpenSSL support or distributed as source code, Insecure\&.Com .IP " 1." 4 Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning .RS 4 -\%http://nmap.org/book/ +\%https://nmap.org/book/ .RE .IP " 2." 4 RFC 1122 @@ -2790,12 +2790,12 @@ Liblinear linear classification library .IP "28." 4 IPv6 OS detection machine learning techniques .RS 4 -\%http://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6 +\%https://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6 .RE .IP "29." 4 Google Summer of Code .RS 4 -\%http://nmap.org/soc/ +\%https://nmap.org/soc/ .RE .IP "30." 4 DARPA CINDER program diff --git a/docs/nmap.xsl b/docs/nmap.xsl index 6f80f51a8..1be7ead5f 100644 --- a/docs/nmap.xsl +++ b/docs/nmap.xsl @@ -845,7 +845,7 @@
  • Cannot determine exact operating system. Fingerprint provided below.
  • -
  • If you know what OS is running on it, see http://nmap.org/submit/
  • +
  • If you know what OS is running on it, see https://nmap.org/submit/
diff --git a/docs/nmap_gpgkeys.txt b/docs/nmap_gpgkeys.txt index 69c6f7fbf..6aa509445 100644 --- a/docs/nmap_gpgkeys.txt +++ b/docs/nmap_gpgkeys.txt @@ -1,11 +1,11 @@ GPG detached signatures and MD5/SHA-1 hashes for each Nmap release are -available from http://nmap.org/dist/sigs/?C=M;O=D . The +available from https://nmap.org/dist/sigs/?C=M;O=D . The releases are signed by the Nmap project GPG key (KeyId 6B9355D0). Some messages to Nmap mailing lists may be signed by Nmap author and maintainer Fyodor. Fyodor's KeyID is 33599B5F. Those two keys and their fingerprints are reproduced below. The latest version of this file is always available at -http://nmap.org/data/nmap_gpgkeys.txt . +https://nmap.org/data/nmap_gpgkeys.txt . To verify a file with GPG, obtain and import the keys with a command such as "gpg --import nmap_gpgkeys.txt" and then verify the obtained diff --git a/docs/refguide.xml b/docs/refguide.xml index 41f0fadf6..28bd8e01c 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -32,8 +32,8 @@ This document describes the very latest version of Nmap available from or . Please + url="https://nmap.org/download.html" /> or . Please ensure you are using the latest version before reporting that a feature doesn't work as described. @@ -129,9 +129,9 @@ Nmap done: 1 IP address (1 host up) scanned in 14.40 seconds The newest version of Nmap can be obtained from -. The newest version of this man page -is available at . -It is also included as a chapter of Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (see ). +. The newest version of this man page +is available at . +It is also included as a chapter of Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (see ). @@ -650,7 +650,7 @@ you would expect. packet will be empty, though some use a protocol-specific payload that is more likely to elicit a response. -The payload database is described at . +The payload database is described at .See for a description of the database of payloads.protocol-specific payloadsUDP. Packet @@ -1197,7 +1197,7 @@ response. A SYN/ACK indicates the port is listening (open), while a RST (reset) is indicative of a non-listener. If no response is received after several retransmissions, the port is marked as filtered. The port is also marked filtered if an ICMP unreachable -error (type 3, code 0, 1, 2, 3, 9, 10, or 13) is received. The port is also considered open if a SYN packet (without the ACK flag) is received in response. This can be due to an extremely rare TCP feature known as a simultaneous open or split handshake connection (see ). +error (type 3, code 0, 1, 2, 3, 9, 10, or 13) is received. The port is also considered open if a SYN packet (without the ACK flag) is received in response. This can be due to an extremely rare TCP feature known as a simultaneous open or split handshake connection (see ). @@ -1580,7 +1580,7 @@ in both cases. This fascinating scan type is too complex to fully describe in this reference guide, so I wrote and posted an informal paper with full - details at . + details at . Full details of this fascinating scan type are in @@ -1929,7 +1929,7 @@ way. A paper documenting the workings, usage, and customization of version detection is available at - . + . Version detection is described in detail in . @@ -2141,7 +2141,7 @@ way. A paper documenting the workings, usage, and customization of OS detection is available at - . + . OS detection is covered in . @@ -2264,7 +2264,7 @@ way. version, and vuln. These are all described - at . + at . in . @@ -2275,7 +2275,7 @@ way. The Nmap Scripting Engine is described in detail -at +at in and is controlled by the following options: @@ -2353,7 +2353,7 @@ it will be added automatically if necessary. Nmap scripts are stored in a scripts subdirectory of the Nmap data directory by default -(see ). +(see ). (see ). For efficiency, scripts are indexed in a database stored @@ -2455,7 +2455,7 @@ special case; in all other cases a backslash is interpreted literally. Values may also be tables enclosed in {}, just as in Lua. A table may contain simple string values or more name-value pairs, including nested tables. Many scripts qualify their arguments with the script name, as in xmpp-info.server_name. You may use that full qualified version to affect just the specified script, or you may pass the unqualified version (server_name in this case) to affect all scripts using that argument name. A script will first check for its fully qualified argument name (the name specified in its documentation) before it accepts an unqualified argument name. A complex example of script arguments is -. The online NSE Documentation Portal at +. The online NSE Documentation Portal at lists the arguments that each script accepts. @@ -3562,7 +3562,7 @@ work properly. host IP stacks properly drop these packets, any responses received are likely coming from a firewall or IDS that didn't bother to verify the checksum. For more details on this technique, see + url="https://nmap.org/p60-12.html"/> @@ -3812,7 +3812,7 @@ info, and Version info. As with XML output, this man page does not allow for documenting the entire format. A more detailed look at the Nmap grepable output format is available -from . +from . in . @@ -4095,7 +4095,7 @@ hosts with at least one . You must pass the full pathname or URL. One common invocation is . This + https://nmap.org/svn/docs/nmap.xsl. This tells an XSLT processor to load the latest version of the stylesheet from Nmap.Org. The option does the same thing with less typing and memorization. @@ -4115,7 +4115,7 @@ hosts with at least one This is a convenience option, nothing more than an alias for - . + . @@ -4562,7 +4562,7 @@ Service scan Timing: About 33.33% done; ETC: 20:57 (0:00:12 remaining) quickly solve real-world tasks. For that, we released Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security - Scanning.Nmap + Scanning.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Topics include subverting firewalls and intrusion detection systems, @@ -4572,7 +4572,7 @@ Service scan Timing: About 33.33% done; ETC: 20:57 (0:00:12 remaining) penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Examples and diagrams show actual communication on the wire. More than half of the book is - available free online. See + available free online. See for more information. @@ -4586,7 +4586,7 @@ Service scan Timing: About 33.33% done; ETC: 20:57 (0:00:12 remaining) it better by sending bug reports or even writing patches. If Nmap doesn't behave the way you expect, first upgrade to the latest version available from . If the problem persists, + url="https://nmap.org"/>. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try searching for the error message on our search page at or at Google. Also try browsing the nmap-dev archives at dev@nmap.org are far more likely to be answered than those sent to Fyodor directly. If you subscribe to the nmap-dev list before posting, your message will bypass moderation and get - through more quickly. Subscribe at . + through more quickly. Subscribe at . Code patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are @@ -4621,7 +4621,7 @@ Service scan Timing: About 33.33% done; ETC: 20:57 (0:00:12 remaining) CHANGELOGchangelog file which is distributed with Nmap and also available from . + url="https://nmap.org/changelog.html" />. diff --git a/docs/scripting.xml b/docs/scripting.xml index 7eb59aa9a..abbb6b445 100644 --- a/docs/scripting.xml +++ b/docs/scripting.xml @@ -149,7 +149,7 @@ The reference manual, updated for Lua 5.2, is also # nmap -sC -p22,111,139 -T4 localhost -Starting Nmap ( http://nmap.org ) +Starting Nmap ( https://nmap.org ) Nmap scan report for flog (127.0.0.1) PORT STATE SERVICE 22/tcp open ssh @@ -172,7 +172,7 @@ Nmap done: 1 IP address (1 host up) scanned in 0.33 seconds A 38-minute video introduction to NSE is available at -. This +. This presentation was given by Fyodor and David Fifield at Defcon and the Black Hat Briefings in 2010. @@ -528,9 +528,9 @@ Black Hat Briefings in 2010. requests to query DHCP and DNS SD servers. Some of these scripts can generate new targets for Nmap to scan (only if you specify - the newtargets + the newtargets NSE argument). For example, dns-zone-transfer + url="https://nmap.org/nsedoc/scripts/dns-zone-transfer.html">dns-zone-transfer can obtain a list of IPs in a domain using a zone transfer request and then automatically add them to Nmap's scan target list. Prerule scripts can be identified by containing a prerule function (see ). @@ -549,10 +549,10 @@ Black Hat Briefings in 2010. against each target host which matches its hostrule function. Examples are whois, + url="https://nmap.org/nsedoc/scripts/whois.html">whois, which looks up ownership information for a target IP, and path-mtu + url="https://nmap.org/nsedoc/scripts/path-mtu.html">path-mtu which tries to determine the maximum IP packet size which can reach the target without requiring fragmentation. @@ -582,7 +582,7 @@ Black Hat Briefings in 2010. These scripts run after Nmap has scanned all of its targets. They can be useful for formatting and presenting Nmap output. For example, ssh-hostkey + url="https://nmap.org/nsedoc/scripts/ssh-hostkey.html">ssh-hostkey is best known for its service (portrule) script which connects to SSH servers, discovers their public keys, and prints them. But it also includes a postrule which checks @@ -745,18 +745,18 @@ Nmap script database, but should be used cautiously since Nmap may contain explo $ nmap --script-help "afp-* and discovery" -Starting Nmap 5.36TEST4 ( http://nmap.org ) at 2011-01-27 13:04 PST +Starting Nmap 5.36TEST4 ( https://nmap.org ) at 2011-01-27 13:04 PST afp-serverinfo Categories: discovery safe -http://nmap.org/nsedoc/scripts/afp-serverinfo.html +https://nmap.org/nsedoc/scripts/afp-serverinfo.html Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type (for example Macmini or MacBookPro). afp-showmount Categories: discovery safe -http://nmap.org/nsedoc/scripts/afp-showmount.html +https://nmap.org/nsedoc/scripts/afp-showmount.html Shows AFP shares and ACLs. @@ -1066,7 +1066,7 @@ local server_name = stdnse.get_script_args("xmpp-info.server_name") The online NSE Documentation Portal at lists the arguments that each script + url="https://nmap.org/nsedoc/"/> lists the arguments that each script accepts. @@ -1176,7 +1176,7 @@ categories = {"default", "discovery", "safe"} the following line: -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" The Nmap license is similar to the GNU GPL. Script authors may @@ -1184,7 +1184,7 @@ use a BSD-style license (no advertising clause) instead if they prefer that. For a BSD-style license, please include this line: -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" @@ -1458,7 +1458,7 @@ details of how different return values are handled. software developed as actively as NSE is. For complete and up-to-date documentation, including script arguments and output samples, see the online NSE Documentation Portal at - . + . &nse-scripts; @@ -1468,7 +1468,7 @@ details of how different return values are handled. This section (a long list of NSE scripts with brief summaries) is only provided in the printed edition of this book because we already provide a better online interface to the - information at the NSE + information at the NSE Documentation Portal. @@ -1489,7 +1489,7 @@ details of how different return values are handled. This list is just an overview to give an idea of what libraries are available. Developers will want to consult the complete - documentation at . + documentation at . &nse-modules; @@ -2622,7 +2622,7 @@ NSEDoc @output tag: author = "Diman Todorov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} @@ -2759,7 +2759,7 @@ local localip, localport = try(client_service:get_info()) this section, aims to meet both these needs. While reading this section, you may want to browse NSE's online documentation, which is generated using this system. It is at - . + . @@ -2848,7 +2848,7 @@ local localip, localport = try(client_service:get_info()) -- for details). -- -- @author Kris Katterjohn 04/2008 --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html @@ -2908,7 +2908,7 @@ server (your default DNS server, or whichever one you specified with the -- |_ Peer AS: 174 2914 6461 author = "jah, Michael" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "external", "safe"} @@ -3662,7 +3662,7 @@ Detects the Skype version 2 service. -- 80/tcp open skype2 Skype author = "Brandon Enright"Enright, Brandonauthor” script variable -license = "Same as Nmap--See http://nmap.org/book/man-legal.html"license” script variable +license = "Same as Nmap--See https://nmap.org/book/man-legal.html"license” script variable categories = {"version"} require "comm" @@ -3713,7 +3713,7 @@ end nmap.set_port_version. Several other version fields are available to be set if they are known, but in this case we only have the name and product. For the full list of version - fields, refer to the nmap.set_port_version documentation. + fields, refer to the nmap.set_port_version documentation. @@ -3742,7 +3742,7 @@ Attempts to get a list of usernames via the finger service. author = "Eddie Bell"Bell, Eddieauthor” script variable -license = "Same as Nmap--See http://nmap.org/book/man-legal.html"license” script variable +license = "Same as Nmap--See https://nmap.org/book/man-legal.html"license” script variable The categories field is a table diff --git a/docs/win32-installer-zenmap-buildguide.txt b/docs/win32-installer-zenmap-buildguide.txt index a6ccce162..cebd5b823 100644 --- a/docs/win32-installer-zenmap-buildguide.txt +++ b/docs/win32-installer-zenmap-buildguide.txt @@ -14,7 +14,7 @@ II. OTHER REQUIREMENTS You'll need Microsoft Visual C++ 2010 for compilation. Directions for obtaining that are at: -http://nmap.org/install/inst-windows.html#inst-win-source. +https://nmap.org/install/inst-windows.html#inst-win-source. You'll also need Cygwin installed in order to build the Nmap installer (not required for normal compiling). You'll find it at diff --git a/docs/zenmap.1 b/docs/zenmap.1 index 902b08e20..393fa58bd 100644 --- a/docs/zenmap.1 +++ b/docs/zenmap.1 @@ -2,12 +2,12 @@ .\" Title: zenmap .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 07/08/2015 +.\" Date: 11/05/2015 .\" Manual: Zenmap Reference Guide .\" Source: Zenmap .\" Language: English .\" -.TH "ZENMAP" "1" "07/08/2015" "Zenmap" "Zenmap Reference Guide" +.TH "ZENMAP" "1" "11/05/2015" "Zenmap" "Zenmap Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -37,8 +37,8 @@ zenmap \- Graphical Nmap frontend and results viewer Zenmap is a multi\-platform graphical Nmap frontend and results viewer\&. Zenmap aims to make Nmap easy for beginners to use while giving experienced Nmap users advanced features\&. Frequently used scans can be saved as profiles to make them easy to run repeatedly\&. A command creator allows interactive creation of Nmap command lines\&. Scan results can be saved and viewed later\&. Saved scan results can be compared with one another to see how they differ\&. The results of recent scans are stored in a searchable database\&. .PP This man page only describes the few Zenmap command\-line options and some critical notes\&. A much more detailed Zenmap User\*(Aqs Guide is available at -\m[blue]\fB\%http://nmap.org/book/zenmap.html\fR\m[]\&. Other documentation and information is available from the Zenmap web page at -\m[blue]\fB\%http://nmap.org/zenmap/\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/book/zenmap.html\fR\m[]\&. Other documentation and information is available from the Zenmap web page at +\m[blue]\fB\%https://nmap.org/zenmap/\fR\m[]\&. .SH "OPTIONS SUMMARY" .PP \fB\-f\fR, \fB\-\-file \fR\fB\fIresults file\fR\fR @@ -97,7 +97,7 @@ to disable automatic crash reporting\&. .SH "BUGS" .PP Like their authors, Nmap and Zenmap aren\(cqt perfect\&. But you can help make them better by sending bug reports or even writing patches\&. If Nmap or Zenmap doesn\(cqt behave the way you expect, first upgrade to the latest version available from -\m[blue]\fB\%http://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the +\m[blue]\fB\%https://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the nmap\-dev archives at \m[blue]\fB\%http://seclists.org/\fR\m[]\&. Read this full manual page as well\&. If nothing comes of this, mail a bug report to @@ -120,7 +120,7 @@ Fyodor Hundreds of people have made valuable contributions to Nmap over the years\&. These are detailed in the CHANGELOG file which is distributed with Nmap and also available from -\m[blue]\fB\%http://nmap.org/changelog.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/changelog.html\fR\m[]\&. .SS "Umit" .PP Zenmap is derived from the Umit Nmap frontend, which was started by Adriano Monteiro Marques as an Nmap/Google Summer of Code project (, diff --git a/docs/zenmap.xml b/docs/zenmap.xml index 22e8c81ff..6fc832590 100644 --- a/docs/zenmap.xml +++ b/docs/zenmap.xml @@ -26,7 +26,7 @@ This document describes the very latest version of Zenmap available from . Please + url="https://nmap.org/download.html" />. Please ensure you are using the latest version before reporting that a feature doesn't work as described. @@ -39,7 +39,7 @@ Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database. - This man page only describes the few Zenmap command-line options and some critical notes. A much more detailed Zenmap User's Guide is available at . Other documentation and information is available from the Zenmap web page at . + This man page only describes the few Zenmap command-line options and some critical notes. A much more detailed Zenmap User's Guide is available at . Other documentation and information is available from the Zenmap web page at . @@ -129,7 +129,7 @@ Like their authors, Nmap and Zenmap aren’t perfect. But you can help make them better by sending bug reports or even writing patches. If Nmap or Zenmap doesn’t behave the way you expect, first upgrade to the - latest version available from . If + latest version available from . If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at . @@ -173,7 +173,7 @@ over the years. These are detailed in the CHANGELOG file which is distributed with Nmap and also available from . + url="https://nmap.org/changelog.html" />. diff --git a/libnetutil/netutil.h b/libnetutil/netutil.h index 520a1904a..b13b4b11f 100644 --- a/libnetutil/netutil.h +++ b/libnetutil/netutil.h @@ -4,7 +4,7 @@ * libnetutil, a library that provides network-related functions or * * classes that make it easier to handle things like network interfaces, * * routing tables, raw packet manipulation, etc. The lib was originally * - * written for use in the Nmap Security Scanner ( http://nmap.org ). * + * written for use in the Nmap Security Scanner ( https://nmap.org ). * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/libnetutil/npacket.h b/libnetutil/npacket.h index a32085442..86c29c562 100644 --- a/libnetutil/npacket.h +++ b/libnetutil/npacket.h @@ -4,7 +4,7 @@ * libnetutil, a library that provides network-related functions or * * classes that make it easier to handle things like network interfaces, * * routing tables, raw packet manipulation, etc. The lib was originally * - * written for use in the Nmap Security Scanner ( http://nmap.org ). * + * written for use in the Nmap Security Scanner ( https://nmap.org ). * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/nbase/nbase.h b/nbase/nbase.h index a63475c33..6e274f30d 100644 --- a/nbase/nbase.h +++ b/nbase/nbase.h @@ -5,7 +5,7 @@ * using libnbase can guarantee the availability of functions like * * (v)snprintf and inet_pton. This library also provides consistency and * * extended features for some functions. It was originally written for * - * use in the Nmap Security Scanner ( http://nmap.org ). * + * use in the Nmap Security Scanner ( https://nmap.org ). * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/ncat/COPYING b/ncat/COPYING index 434cc441e..58fc9fed8 100644 --- a/ncat/COPYING +++ b/ncat/COPYING @@ -1,3 +1,3 @@ Ncat is distributed under the same license terms as Nmap. See the COPYING file in the Nmap tarball, the man page legal section, or -http://nmap.org/man/man-legal.html . +https://nmap.org/man/man-legal.html . diff --git a/ncat/INSTALL b/ncat/INSTALL index 5f357a480..b26ba7702 100644 --- a/ncat/INSTALL +++ b/ncat/INSTALL @@ -11,7 +11,7 @@ make install For instructions on how to build Ncat for Microsoft Windows or for far more in-depth compilation, installation, and removal notes, read the Nmap Install -Guide at http://nmap.org/install/. +Guide at https://nmap.org/install/. For instructions on how to build Ncat Portable for Microsoft Windows, read the how-to available at https://secwiki.org/w/Nmap/Ncat_Portable. diff --git a/ncat/docs/ncat.1 b/ncat/docs/ncat.1 index f38743a1d..a0807dfb9 100644 --- a/ncat/docs/ncat.1 +++ b/ncat/docs/ncat.1 @@ -2,12 +2,12 @@ .\" Title: Ncat .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 07/08/2015 +.\" Date: 11/05/2015 .\" Manual: Ncat Reference Guide .\" Source: Ncat .\" Language: English .\" -.TH "NCAT" "1" "07/08/2015" "Ncat" "Ncat Reference Guide" +.TH "NCAT" "1" "11/05/2015" "Ncat" "Ncat Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -43,7 +43,7 @@ Among Ncat\*(Aqs vast number of features there is the ability to chain Ncats tog .RS 4 .\} .nf -Ncat 6\&.49SVN ( http://nmap\&.org/ncat ) +Ncat 6\&.49SVN ( https://nmap\&.org/ncat ) Usage: ncat [options] [hostname] [port] Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds, @@ -85,12 +85,6 @@ Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds, \-\-proxy Specify address of host to proxy through \-\-proxy\-type Specify proxy type ("http" or "socks4" or "socks5") \-\-proxy\-auth Authenticate with HTTP or SOCKS proxy server - \-\-ssl Connect or listen with SSL - \-\-ssl\-cert Specify SSL certificate file (PEM) for listening - \-\-ssl\-key Specify SSL private key (PEM) for listening - \-\-ssl\-verify Verify trust and domain name of certificates - \-\-ssl\-trustfile PEM file containing trusted SSL certificates - \-\-ssl\-ciphers Cipherlist containing SSL ciphers to use \-\-version Display Ncat\*(Aqs version information and exit See the ncat(1) manpage for full options, descriptions and usage examples @@ -562,7 +556,7 @@ or .SH "BUGS" .PP Like its authors, Ncat isn\*(Aqt perfect\&. But you can help make it better by sending bug reports or even writing patches\&. If Ncat doesn\*(Aqt behave the way you expect, first upgrade to the latest version available from -\m[blue]\fB\%http://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the +\m[blue]\fB\%https://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the nmap\-dev archives at \m[blue]\fB\%http://seclists.org/\fR\m[]\&. @@ -635,7 +629,7 @@ Netcat (or any other implementation), Ncat is most definitely based on Netcat in .\" GNU General Public License .PP Ncat is (C) 2005\(en2012 Insecure\&.Com LLC\&. It is distributed as free and open source software under the same license terms as our Nmap software\&. Precise terms and further details are available -from \m[blue]\fB\%http://nmap.org/man/man-legal.html\fR\m[]\&. +from \m[blue]\fB\%https://nmap.org/man/man-legal.html\fR\m[]\&. .SS "Creative Commons License for this Ncat Guide" .PP This diff --git a/ncat/docs/ncat.usage.txt b/ncat/docs/ncat.usage.txt index 155c0f6d7..6c328e9c8 100644 --- a/ncat/docs/ncat.usage.txt +++ b/ncat/docs/ncat.usage.txt @@ -1,4 +1,4 @@ -Ncat 6.49SVN ( http://nmap.org/ncat ) +Ncat 6.49SVN ( https://nmap.org/ncat ) Usage: ncat [options] [hostname] [port] Options taking a time assume seconds. Append 'ms' for milliseconds, @@ -40,12 +40,6 @@ Options taking a time assume seconds. Append 'ms' for milliseconds, --proxy Specify address of host to proxy through --proxy-type Specify proxy type ("http" or "socks4" or "socks5") --proxy-auth Authenticate with HTTP or SOCKS proxy server - --ssl Connect or listen with SSL - --ssl-cert Specify SSL certificate file (PEM) for listening - --ssl-key Specify SSL private key (PEM) for listening - --ssl-verify Verify trust and domain name of certificates - --ssl-trustfile PEM file containing trusted SSL certificates - --ssl-ciphers Cipherlist containing SSL ciphers to use --version Display Ncat's version information and exit See the ncat(1) manpage for full options, descriptions and usage examples diff --git a/ncat/docs/ncat.xml b/ncat/docs/ncat.xml index 34f41f9ba..e96e6e767 100644 --- a/ncat/docs/ncat.xml +++ b/ncat/docs/ncat.xml @@ -936,7 +936,7 @@ it better by sending bug reports or even writing patches. If Ncat doesn't behave the way you expect, first upgrade to the latest version available from . If the problem persists, + url="https://nmap.org"/>. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at Ncat is (C) 2005–2012 Insecure.Com LLC. It is distributed as free and open source software under the same license terms as our Nmap software. Precise terms and further details are available - from . + from . in . diff --git a/ncat/docs/ncatguide.xml b/ncat/docs/ncatguide.xml index 8816c4187..3ab7d03a3 100644 --- a/ncat/docs/ncatguide.xml +++ b/ncat/docs/ncatguide.xml @@ -467,7 +467,7 @@ Content-Type: text/html; charset=UTF-8 (Ncat option)example of $ ncat -v --listen --ssl -Ncat ( http://nmap.org/ncat ) +Ncat ( https://nmap.org/ncat ) Generating a temporary 1024-bit RSA key. Use --ssl-key and --ssl-cert to use a permanent one. SHA-1 fingerprint: F0:13:BF:FB:2D:AA:76:88:22:60:3E:17:93:29:3E:0E:6B:92:C0:2F @@ -835,7 +835,7 @@ Protocol mismatch. options. Each of these takes a comma-separated list of host specifications. The syntax is almost identical to that recognized by Nmap for targets - (see the section called Target Specification). + (see the section called Target Specification). This includes IPv4 and IPv6 addresses, hostnames, IPv4 octet ranges, and CIDR netmasks. In Ncat (unlike Nmap), CIDR netmasks are supported for IPv6 @@ -1877,7 +1877,7 @@ host1$ ncat --send-only host2 < log.txt example of # nmap -sSU -p 13 --script=daytime localhost -Starting Nmap ( http://nmap.org ) +Starting Nmap ( https://nmap.org ) Nmap scan report for localhost (127.0.0.1) PORT STATE SERVICE diff --git a/ncat/ncat.h b/ncat/ncat.h index cc34eec1c..7db64d89d 100644 --- a/ncat/ncat.h +++ b/ncat/ncat.h @@ -144,7 +144,7 @@ /* Ncat information for output, etc. */ #define NCAT_NAME "Ncat" -#define NCAT_URL "http://nmap.org/ncat" +#define NCAT_URL "https://nmap.org/ncat" #define NCAT_VERSION "6.49SVN" #ifndef __GNUC__ diff --git a/ncat/ncat_ssl.c b/ncat/ncat_ssl.c index 3a80ab4e7..5a66fe1c9 100644 --- a/ncat/ncat_ssl.c +++ b/ncat/ncat_ssl.c @@ -147,7 +147,7 @@ enum { DEFAULT_KEY_BITS = 1024, DEFAULT_CERT_DURATION = 60 * 60 * 24 * 365, }; -#define CERTIFICATE_COMMENT "Automatically generated by Ncat. See http://nmap.org/ncat/." +#define CERTIFICATE_COMMENT "Automatically generated by Ncat. See https://nmap.org/ncat/." SSL_CTX *setup_ssl_listen(void) { diff --git a/ndiff/COPYING b/ndiff/COPYING index 102d5cf49..d187a998c 100644 --- a/ndiff/COPYING +++ b/ndiff/COPYING @@ -1,4 +1,4 @@ Copyright 2008 Insecure.Com LLC Ndiff is distributed under the same license as Nmap. See the file COPYING in -the Nmap source distribution or http://nmap.org/data/COPYING. See -http://nmap.org/book/man-legal.html for more details. +the Nmap source distribution or https://nmap.org/data/COPYING. See +https://nmap.org/book/man-legal.html for more details. diff --git a/ndiff/README b/ndiff/README index 0ec00a29b..a2277f349 100644 --- a/ndiff/README +++ b/ndiff/README @@ -60,4 +60,4 @@ decided to rewrite the program in Python for the sake of Windows compatibility. This Python version is written by David Fifield . -Ndiff web site: http://nmap.org/ndiff/ +Ndiff web site: https://nmap.org/ndiff/ diff --git a/ndiff/docs/ndiff.1 b/ndiff/docs/ndiff.1 index d6323e887..abc23d90f 100644 --- a/ndiff/docs/ndiff.1 +++ b/ndiff/docs/ndiff.1 @@ -2,12 +2,12 @@ .\" Title: ndiff .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 07/08/2015 +.\" Date: 11/05/2015 .\" Manual: User Commands .\" Source: Ndiff .\" Language: English .\" -.TH "NDIFF" "1" "07/08/2015" "Ndiff" "User Commands" +.TH "NDIFF" "1" "11/05/2015" "Ndiff" "User Commands" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -428,7 +428,7 @@ Michael Pattrick .SH "WEB SITE" .PP -\m[blue]\fB\%http://nmap.org/ndiff/\fR\m[] +\m[blue]\fB\%https://nmap.org/ndiff/\fR\m[] .SH "NOTES" .IP " 1." 4 released diff --git a/ndiff/docs/ndiff.xml b/ndiff/docs/ndiff.xml index 9e8844666..52e63b20a 100644 --- a/ndiff/docs/ndiff.xml +++ b/ndiff/docs/ndiff.xml @@ -407,7 +407,7 @@ ln -sf scan-$date.xml scan-prev.xml Web site - + diff --git a/ndiff/ndiff.py b/ndiff/ndiff.py index 502bfd7b1..b5fe3dd7a 100755 --- a/ndiff/ndiff.py +++ b/ndiff/ndiff.py @@ -7,7 +7,7 @@ # # Copyright 2008 Insecure.Com LLC # Ndiff is distributed under the same license as Nmap. See the file COPYING or -# http://nmap.org/data/COPYING. See http://nmap.org/book/man-legal.html for +# https://nmap.org/data/COPYING. See https://nmap.org/book/man-legal.html for # more details. # # David Fifield diff --git a/ndiff/scripts/ndiff b/ndiff/scripts/ndiff index 05945fba1..8517c0757 100755 --- a/ndiff/scripts/ndiff +++ b/ndiff/scripts/ndiff @@ -7,7 +7,7 @@ # # Copyright 2008 Insecure.Com LLC # Ndiff is distributed under the same license as Nmap. See the file COPYING or -# http://nmap.org/data/COPYING. See http://nmap.org/book/man-legal.html for more +# https://nmap.org/data/COPYING. See https://nmap.org/book/man-legal.html for more # details. # # David Fifield diff --git a/nmap-os-db b/nmap-os-db index badf6e080..2bdc69623 100644 --- a/nmap-os-db +++ b/nmap-os-db @@ -4,7 +4,7 @@ # Contributions to this database are welcome. If Nmap obtains a new # fingerprint (and test conditions are favorable), it will print out a # URL you can use to submit the fingerprint. If Nmap guesses wrong, -# please see http://nmap.org/submit/ . +# please see https://nmap.org/submit/ . # # By submitting fingerprints you are transfering any and all copyright # interest in the data to Insecure.Com LLC so it can modified, @@ -13,16 +13,16 @@ # This collection of fingerprint data is (C) 1996-2010 by Insecure.Com # LLC. It is distributed under the Nmap Open Source license as # provided in the COPYING file of the source distribution or at -# http://nmap.org/data/COPYING . Note that this license +# https://nmap.org/data/COPYING . Note that this license # requires you to license your own work under a compatible open source # license. If you wish to embed Nmap technology into proprietary # software, we sell alternative licenses (contact sales@insecure.com). # Dozens of software vendors already license Nmap technology such as # host discovery, port scanning, OS detection, and version detection. -# For more details, see http://nmap.org/book/man-legal.html +# For more details, see https://nmap.org/book/man-legal.html # # For a complete description of Nmap OS detection and the format of -# fingerprints in this file, see http://nmap.org/book/osdetect.html. +# fingerprints in this file, see https://nmap.org/book/osdetect.html. # This first element provides the number of points every fingerprint # test is worth. Tests like TTL or Don't fragment are worth less diff --git a/nmap-payloads b/nmap-payloads index 5e1fb91bb..e24a636e3 100644 --- a/nmap-payloads +++ b/nmap-payloads @@ -10,13 +10,13 @@ # This collection of data is (C) 1996-2010 by Insecure.Com # LLC. It is distributed under the Nmap Open Source license as # provided in the COPYING file of the source distribution or at -# http://nmap.org/data/COPYING . Note that this license +# https://nmap.org/data/COPYING . Note that this license # requires you to license your own work under a compatible open source # license. If you wish to embed Nmap technology into proprietary # software, we sell alternative licenses (contact sales@insecure.com). # Dozens of software vendors already license Nmap technology such as # host discovery, port scanning, OS detection, and version detection. -# For more details, see http://nmap.org/book/man-legal.html +# For more details, see https://nmap.org/book/man-legal.html # # Each entry begins with a protocol (only "udp" is supported) followed # by a comma-separated list of ports, followed by one or more quoted diff --git a/nmap-protocols b/nmap-protocols index 334e2bfee..8099a68a3 100644 --- a/nmap-protocols +++ b/nmap-protocols @@ -1,5 +1,5 @@ # This list of protocols is distributed with the -*- mode: fundamental; -*- -# Nmap Security Scanner ( http://nmap.org ) +# Nmap Security Scanner ( https://nmap.org ) # # This list is based on IEEE data at # http://www.iana.org/assignments/protocol-numbers diff --git a/nmap-service-probes b/nmap-service-probes index e0469c677..41798e88c 100644 --- a/nmap-service-probes +++ b/nmap-service-probes @@ -2,27 +2,27 @@ # $Id$ # # This is a database of custom probes and expected responses that the -# Nmap Security Scanner ( http://nmap.org ) uses to +# Nmap Security Scanner ( https://nmap.org ) uses to # identify what services (eg http, smtp, dns, etc.) are listening on # open ports. Contributions to this database are welcome. # Instructions for obtaining and submitting service detection fingerprints can # be found in the Nmap Network Scanning book and online at -# http://nmap.org/book/vscan-community.html +# https://nmap.org/book/vscan-community.html # # This collection of probe data is (C) 1998-2010 by Insecure.Com # LLC. It is distributed under the Nmap Open Source license as # provided in the COPYING file of the source distribution or at -# http://nmap.org/data/COPYING . Note that this license +# https://nmap.org/data/COPYING . Note that this license # requires you to license your own work under a compatible open source # license. If you wish to embed Nmap technology into proprietary # software, we sell alternative licenses (contact sales@insecure.com). # Dozens of software vendors already license Nmap technology such as # host discovery, port scanning, OS detection, and version detection. -# For more details, see http://nmap.org/book/man-legal.html +# For more details, see https://nmap.org/book/man-legal.html # # For details on how Nmap version detection works, why it was added, # the grammar of this file, and how to detect and contribute new -# services, see http://nmap.org/book/vscan.html. +# services, see https://nmap.org/book/vscan.html. # The Exclude directive takes a comma separated list of ports. # The format is exactly the same as the -p switch. diff --git a/nmap-services b/nmap-services index b7b143fae..d3ba3d8c5 100644 --- a/nmap-services +++ b/nmap-services @@ -3,7 +3,7 @@ # Well known service port numbers -*- mode: fundamental; -*- # From the Nmap Security Scanner ( http://nmap.org ) # -# $Id$ +# $Id: nmap-services 9746 2008-08-26 18:45:24Z fyodor $ # # Derived from IANA data and our own research # diff --git a/nmap-update/nmap-update.c b/nmap-update/nmap-update.c index 08b59ae1d..3c87fa9cb 100644 --- a/nmap-update/nmap-update.c +++ b/nmap-update/nmap-update.c @@ -808,7 +808,7 @@ int main(int argc, char *argv[]) UPDATE CHANNEL %s HAS EXPIRED:\n\ \n\ The channel %s has expired and won't receive any more\n\ -updates. Visit http://nmap.org for a newer Nmap release with \n\ +updates. Visit https://nmap.org for a newer Nmap release with \n\ supported updates.\n\ ", successful_channel, successful_channel); } diff --git a/nmap.cc b/nmap.cc index b4851732f..5358fdfff 100644 --- a/nmap.cc +++ b/nmap.cc @@ -1539,7 +1539,7 @@ void apply_delayed_options() { if (local_time->tm_mon == 8 && local_time->tm_mday == 1) { log_write(LOG_STDOUT | LOG_SKID, "Happy %dth Birthday to Nmap, may it live to be %d!\n", local_time->tm_year - 97, local_time->tm_year + 3); } else if (local_time->tm_mon == 11 && local_time->tm_mday == 25) { - log_write(LOG_STDOUT | LOG_SKID, "Nmap wishes you a merry Christmas! Specify -sX for Xmas Scan (http://nmap.org/book/man-port-scanning-techniques.html).\n"); + log_write(LOG_STDOUT | LOG_SKID, "Nmap wishes you a merry Christmas! Specify -sX for Xmas Scan (https://nmap.org/book/man-port-scanning-techniques.html).\n"); } } diff --git a/nmap.spec.in b/nmap.spec.in index c66b35cf1..e77dd21a5 100644 --- a/nmap.spec.in +++ b/nmap.spec.in @@ -22,10 +22,10 @@ Name: %{name} Version: %{version} Release: %{release} Epoch: 2 -License: http://nmap.org/man/man-legal.html +License: https://nmap.org/man/man-legal.html Group: Applications/System -Source0: http://nmap.org/dist/%{name}-%{version}.tgz -URL: http://nmap.org +Source0: https://nmap.org/dist/%{name}-%{version}.tgz +URL: https://nmap.org # Disable automatic dependency calculation because we want to provide # packages for more than one version of Python. Without this, RPM will diff --git a/nmap_tty.cc b/nmap_tty.cc index c3a4a4822..42d6972c4 100644 --- a/nmap_tty.cc +++ b/nmap_tty.cc @@ -339,7 +339,7 @@ bool keyWasPressed() "d/D Increase/decrease debugging\n" "p/P Enable/disable packet tracing\n" "anything else Print status\n" - "More help: http://nmap.org/book/man-runtime-interaction.html\n"); + "More help: https://nmap.org/book/man-runtime-interaction.html\n"); } else { printStatusMessage(); return true; diff --git a/nping/Makefile.in b/nping/Makefile.in index 2ada12dac..5c9a98148 100644 --- a/nping/Makefile.in +++ b/nping/Makefile.in @@ -1,7 +1,7 @@ # Extract the version string from nping.h. export NPING_VERSION := $(shell grep '^\#[ \t]*define[ \t]\+NPING_VERSION' nping.h | sed -e 's/.*"\(.*\)".*/\1/' -e 'q') NPING_NAME= Nping -NPING_URL= http://nmap.org/nping +NPING_URL= https://nmap.org/nping NPING_PLATFORM=@host@ prefix = @prefix@ datarootdir = @datarootdir@ diff --git a/nping/docs/nping-man.xml b/nping/docs/nping-man.xml index 2c6c2440c..5690d2b92 100644 --- a/nping/docs/nping-man.xml +++ b/nping/docs/nping-man.xml @@ -26,7 +26,7 @@ Npingdescription of This document describes the very latest version of - Nping available from Please + Nping available from Please ensure you are using the latest version before reporting that a feature doesn't work as described. @@ -65,7 +65,7 @@ # nping -c 1 --tcp -p 80,433 scanme.nmap.org google.com -Starting Nping ( http://nmap.org/nping ) +Starting Nping ( https://nmap.org/nping ) SENT (0.0120s) TCP 96.16.226.135:50091 > 64.13.134.52:80 S ttl=64 id=52072 iplen=40 seq=1077657388 win=1480 RCVD (0.1810s) TCP 64.13.134.52:80 > 96.16.226.135:50091 SA ttl=53 id=0 iplen=44 seq=4158134847 win=5840 <mss 1460> SENT (1.0140s) TCP 96.16.226.135:50091 > 74.125.45.100:80 S ttl=64 id=13932 iplen=40 seq=1077657388 win=1480 @@ -89,9 +89,9 @@ Nping done: 2 IP addresses pinged in 4.01 seconds @@ -263,7 +263,7 @@ Some obscure options aren't even included here. # nping --tcp -c 2 1.1.1.1 -p 100-102 -Starting Nping ( http://nmap.org/nping ) +Starting Nping ( https://nmap.org/nping ) SENT (0.0210s) TCP 192.168.1.77 > 1.1.1.1:100 SENT (1.0230s) TCP 192.168.1.77 > 1.1.1.1:101 SENT (2.0250s) TCP 192.168.1.77 > 1.1.1.1:102 @@ -281,7 +281,7 @@ SENT (5.0320s) TCP 192.168.1.77 > 1.1.1.1:102 # nping --tcp -c 2 1.1.1.1 2.2.2.2 3.3.3.3 -p 8080 -Starting Nping ( http://nmap.org/nping ) +Starting Nping ( https://nmap.org/nping ) SENT (0.0230s) TCP 192.168.0.21 > 1.1.1.1:8080 SENT (1.0240s) TCP 192.168.0.21 > 2.2.2.2:8080 SENT (2.0260s) TCP 192.168.0.21 > 3.3.3.3:8080 @@ -299,7 +299,7 @@ SENT (5.0310s) TCP 192.168.0.21 > 3.3.3.3:8080 # nping --tcp -c 1 --delay 500ms 1.1.1.1 2.2.2.2 3.3.3.3 -p 137-139 -Starting Nping ( http://nmap.org/nping ) +Starting Nping ( https://nmap.org/nping ) SENT (0.0230s) TCP 192.168.0.21 > 1.1.1.1:137 SENT (0.5250s) TCP 192.168.0.21 > 2.2.2.2:137 SENT (1.0250s) TCP 192.168.0.21 > 3.3.3.3:137 @@ -773,7 +773,7 @@ SENT (4.0330s) TCP 192.168.0.21 > 3.3.3.3:139 packets, any responses received are likely coming from a firewall or an IDS that didn't bother to verify the checksum. For more details on this technique, see - . + . @@ -840,7 +840,7 @@ SENT (4.0330s) TCP 192.168.0.21 > 3.3.3.3:139 packets, any responses received are likely coming from a firewall or an IDS that didn't bother to verify the checksum. For more details on this technique, see - . + . @@ -2744,7 +2744,7 @@ SENT (4.0330s) TCP 192.168.0.21 > 3.3.3.3:139 Internally, client and server communicate over an encrypted and authenticated channel, using the Nping Echo Protocol (NEP), whose technical specification can be found in - + @@ -2932,7 +2932,7 @@ SENT (4.0330s) TCP 192.168.0.21 > 3.3.3.3:139 # nping --echo-client "public" echo.nmap.org --udp - Starting Nping ( http://nmap.org/nping ) + Starting Nping ( https://nmap.org/nping ) SENT (1.0970s) UDP 10.1.20.128:53 > 178.79.165.17:40125 ttl=64 id=32523 iplen=28 CAPT (1.1270s) UDP 80.38.10.21:45657 > 178.79.165.17:40125 ttl=54 id=32523 iplen=28 RCVD (1.1570s) ICMP 178.79.165.17 > 10.1.20.128 Port unreachable (type=3/code=3) ttl=49 id=16619 iplen=56 @@ -2963,7 +2963,7 @@ SENT (4.0330s) TCP 192.168.0.21 > 3.3.3.3:139 # nping --echo-client "public" echo.nmap.org --tcp -p80 - Starting Nping ( http://nmap.org/nping ) + Starting Nping ( https://nmap.org/nping ) SENT (1.2160s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480 RCVD (1.2180s) TCP 178.79.165.17:80 > 10.0.1.77:41659 SA ttl=128 id=13177 iplen=44 seq=3647106954 win=16384 <mss 1460> SENT (2.2150s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480 @@ -3523,7 +3523,7 @@ NSOCK (1.0000s) Callback: TIMER SUCCESS for EID 12; tcpconnect_event_handlerLike its author, Nping isn't perfect. But you can help make it better by sending bug reports or even writing patches. If Nping doesn't behave the way you expect, first upgrade to the latest Nmap - version available from . If + version available from . If the problem persists, do some research to determine whether it has already been discovered and addressed. Try searching for the error message on our search page at or at Google. @@ -3540,7 +3540,7 @@ NSOCK (1.0000s) Callback: TIMER SUCCESS for EID 12; tcpconnect_event_handler. + . Code patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are diff --git a/nping/docs/nping-usage.txt b/nping/docs/nping-usage.txt index c07516429..86163bea9 100644 --- a/nping/docs/nping-usage.txt +++ b/nping/docs/nping-usage.txt @@ -1,4 +1,4 @@ -Nping 0.5.59BETA1 ( http://nmap.org/nping ) +Nping 0.5.59BETA1 ( https://nmap.org/nping ) Usage: nping [Probe mode] [Options] {target specification} TARGET SPECIFICATION: diff --git a/nping/docs/nping.1 b/nping/docs/nping.1 index a84ed9da5..207db0ee8 100644 --- a/nping/docs/nping.1 +++ b/nping/docs/nping.1 @@ -2,12 +2,12 @@ .\" Title: nping .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 07/08/2015 +.\" Date: 11/05/2015 .\" Manual: Nping Reference Guide .\" Source: Nping .\" Language: English .\" -.TH "NPING" "1" "07/08/2015" "Nping" "Nping Reference Guide" +.TH "NPING" "1" "11/05/2015" "Nping" "Nping Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -60,7 +60,7 @@ to specify the target ports; and then the two target hostnames\&. .nf # \fBnping \-c 1 \-\-tcp \-p 80,433 scanme\&.nmap\&.org google\&.com\fR -Starting Nping ( http://nmap\&.org/nping ) +Starting Nping ( https://nmap\&.org/nping ) SENT (0\&.0120s) TCP 96\&.16\&.226\&.135:50091 > 64\&.13\&.134\&.52:80 S ttl=64 id=52072 iplen=40 seq=1077657388 win=1480 RCVD (0\&.1810s) TCP 64\&.13\&.134\&.52:80 > 96\&.16\&.226\&.135:50091 SA ttl=53 id=0 iplen=44 seq=4158134847 win=5840 SENT (1\&.0140s) TCP 96\&.16\&.226\&.135:50091 > 74\&.125\&.45\&.100:80 S ttl=64 id=13932 iplen=40 seq=1077657388 win=1480 @@ -92,7 +92,7 @@ This options summary is printed when Nping is run with no arguments\&. It helps .RS 4 .\} .nf -Nping 0\&.5\&.59BETA1 ( http://nmap\&.org/nping ) +Nping 0\&.5\&.59BETA1 ( https://nmap\&.org/nping ) Usage: nping [Probe mode] [Options] {target specification} TARGET SPECIFICATION: @@ -310,7 +310,7 @@ option\&. These examples show how it works\&. .nf # \fBnping \-\-tcp \-c 2 1\&.1\&.1\&.1 \-p 100\-102\fR -Starting Nping ( http://nmap\&.org/nping ) +Starting Nping ( https://nmap\&.org/nping ) SENT (0\&.0210s) TCP 192\&.168\&.1\&.77 > 1\&.1\&.1\&.1:100 SENT (1\&.0230s) TCP 192\&.168\&.1\&.77 > 1\&.1\&.1\&.1:101 SENT (2\&.0250s) TCP 192\&.168\&.1\&.77 > 1\&.1\&.1\&.1:102 @@ -332,7 +332,7 @@ SENT (5\&.0320s) TCP 192\&.168\&.1\&.77 > 1\&.1\&.1\&.1:102 .nf # \fBnping \-\-tcp \-c 2 1\&.1\&.1\&.1 2\&.2\&.2\&.2 3\&.3\&.3\&.3 \-p 8080\fR -Starting Nping ( http://nmap\&.org/nping ) +Starting Nping ( https://nmap\&.org/nping ) SENT (0\&.0230s) TCP 192\&.168\&.0\&.21 > 1\&.1\&.1\&.1:8080 SENT (1\&.0240s) TCP 192\&.168\&.0\&.21 > 2\&.2\&.2\&.2:8080 SENT (2\&.0260s) TCP 192\&.168\&.0\&.21 > 3\&.3\&.3\&.3:8080 @@ -354,7 +354,7 @@ SENT (5\&.0310s) TCP 192\&.168\&.0\&.21 > 3\&.3\&.3\&.3:8080 .nf # \fBnping \-\-tcp \-c 1 \-\-delay 500ms 1\&.1\&.1\&.1 2\&.2\&.2\&.2 3\&.3\&.3\&.3 \-p 137\-139\fR -Starting Nping ( http://nmap\&.org/nping ) +Starting Nping ( https://nmap\&.org/nping ) SENT (0\&.0230s) TCP 192\&.168\&.0\&.21 > 1\&.1\&.1\&.1:137 SENT (0\&.5250s) TCP 192\&.168\&.0\&.21 > 2\&.2\&.2\&.2:137 SENT (1\&.0250s) TCP 192\&.168\&.0\&.21 > 3\&.3\&.3\&.3:137 @@ -561,7 +561,7 @@ must be a number in the range [0\(en65535]\&. \fB\-\-badsum\fR (Invalid Checksum) .\" --badsum (Nping option) .RS 4 Asks Nping to use an invalid TCP checksum for the packets sent to target hosts\&. Since virtually all host IP stacks properly drop these packets, any responses received are likely coming from a firewall or an IDS that didn\*(Aqt bother to verify the checksum\&. For more details on this technique, see -\m[blue]\fB\%http://nmap.org/p60-12.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/p60-12.html\fR\m[]\&. .RE .SH "UDP MODE" .PP @@ -583,7 +583,7 @@ This option asks Nping to use the specified port as source port for the transmit \fB\-\-badsum\fR (Invalid Checksum) .RS 4 Asks Nping to use an invalid UDP checksum for the packets sent to target hosts\&. Since virtually all host IP stacks properly drop these packets, any responses received are likely coming from a firewall or an IDS that didn\*(Aqt bother to verify the checksum\&. For more details on this technique, see -\m[blue]\fB\%http://nmap.org/p60-12.html\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/p60-12.html\fR\m[]\&. .RE .SH "ICMP MODE" .PP @@ -1417,7 +1417,7 @@ This scheme lets the client see the differences between the packets that it send The Echo mode is also useful for troubleshooting routing and firewall issues\&. Among other things, it can be used to determine if the traffic generated by the Nping client is being dropped in transit and never gets to its destination or if the responses are the ones that don\*(Aqt get back to it\&. .PP Internally, client and server communicate over an encrypted and authenticated channel, using the Nping Echo Protocol (NEP), whose technical specification can be found in -\m[blue]\fB\%http://nmap.org/svn/nping/docs/EchoProtoRFC.txt\fR\m[] +\m[blue]\fB\%https://nmap.org/svn/nping/docs/EchoProtoRFC.txt\fR\m[] .PP The following paragraphs describe the different options available in Nping\*(Aqs Echo mode\&. .PP @@ -1491,7 +1491,7 @@ The following examples illustrate how Nping\*(Aqs Echo mode can be used to disco .nf # \fBnping \-\-echo\-client "public" echo\&.nmap\&.org \-\-udp \fR - Starting Nping ( http://nmap\&.org/nping ) + Starting Nping ( https://nmap\&.org/nping ) SENT (1\&.0970s) UDP 10\&.1\&.20\&.128:53 > 178\&.79\&.165\&.17:40125 ttl=64 id=32523 iplen=28 CAPT (1\&.1270s) UDP 80\&.38\&.10\&.21:45657 > 178\&.79\&.165\&.17:40125 ttl=54 id=32523 iplen=28 RCVD (1\&.1570s) ICMP 178\&.79\&.165\&.17 > 10\&.1\&.20\&.128 Port unreachable (type=3/code=3) ttl=49 id=16619 iplen=56 @@ -1521,7 +1521,7 @@ The output clearly shows the presence of a NAT device in the client\*(Aqs local .nf # \fBnping \-\-echo\-client "public" echo\&.nmap\&.org \-\-tcp \-p80\fR - Starting Nping ( http://nmap\&.org/nping ) + Starting Nping ( https://nmap\&.org/nping ) SENT (1\&.2160s) TCP 10\&.0\&.1\&.77:41659 > 178\&.79\&.165\&.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480 RCVD (1\&.2180s) TCP 178\&.79\&.165\&.17:80 > 10\&.0\&.1\&.77:41659 SA ttl=128 id=13177 iplen=44 seq=3647106954 win=16384 SENT (2\&.2150s) TCP 10\&.0\&.1\&.77:41659 > 178\&.79\&.165\&.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480 @@ -1774,7 +1774,7 @@ Like level 5 but it enables full, very detailed, debug information related to ex .\" bugs, reporting .PP Like its author, Nping isn\*(Aqt perfect\&. But you can help make it better by sending bug reports or even writing patches\&. If Nping doesn\*(Aqt behave the way you expect, first upgrade to the latest Nmap version available from -\m[blue]\fB\%http://nmap.org/download.html\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try searching for the error message on our search page at +\m[blue]\fB\%https://nmap.org/download.html\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try searching for the error message on our search page at \m[blue]\fB\%http://insecure.org/search.html\fR\m[] or at Google\&. Also try browsing the nmap\-dev @@ -1784,7 +1784,7 @@ Read this full manual page as well\&. If nothing comes out of this, mail a bug r \&. Please include everything you have learned about the problem, as well as what version of Nping you are running and what operating system version it is running on\&. Problem reports and Nping usage questions sent to are far more likely to be answered than those sent to Fyodor directly\&. If you subscribe to the nmap\-dev list before posting, your message will bypass moderation and get through more quickly\&. Subscribe at -\m[blue]\fB\%http://nmap.org/mailman/listinfo/dev\fR\m[]\&. +\m[blue]\fB\%https://nmap.org/mailman/listinfo/dev\fR\m[]\&. .PP Code patches to fix bugs are even better than bug reports\&. Basic instructions for creating patch files with your changes are available at \m[blue]\fB\%https://svn.nmap.org/nmap/HACKING\fR\m[]\&. Patches may be sent to @@ -1794,7 +1794,7 @@ nmap\-dev .PP Luis MartinGarcia -(\m[blue]\fB\%http://aldabaknocking.com\fR\m[]) +(\m[blue]\fB\%http://www.luismg.com\fR\m[]) .PP Fyodor diff --git a/nping/nping-dev/NpingCommandLine.txt b/nping/nping-dev/NpingCommandLine.txt index 95a4a727f..df4175dd5 100644 --- a/nping/nping-dev/NpingCommandLine.txt +++ b/nping/nping-dev/NpingCommandLine.txt @@ -7,7 +7,7 @@ now definitive. Howerever, comments and suggestions are still welcome. -Nping 0.01a ( http://nmap.org/nping ) +Nping 0.01a ( https://nmap.org/nping ) Usage: nping [Probe mode] [Options] {target specification} TARGET SPECIFICATION: diff --git a/nping/nping-dev/echo_proposal.txt b/nping/nping-dev/echo_proposal.txt index fb63e553e..336202de5 100644 --- a/nping/nping-dev/echo_proposal.txt +++ b/nping/nping-dev/echo_proposal.txt @@ -134,7 +134,7 @@ things like variation of TCP window size and warn about possible transparent proxies, etc. - Starting Nping 0.5.30BETA1 ( http://nmap.org/nping ) at 2010-06-30 17:20 CEST + Starting Nping 0.5.30BETA1 ( https://nmap.org/nping ) at 2010-06-30 17:20 CEST SENT (0.0980s) TCP 192.168.1.99:33856 > 74.207.254.18:80 S ttl=64 id=60467 iplen=40 seq=1754993861 win=0 CAPT (0.4504s) TCP 10.1.2.158:33856 > 10.0.23.56:80 ttl=53 @@ -158,7 +158,7 @@ The side channel will be run over a custom application layer protocol called NEP, Nping Echo Protocol. The protocol itself is described in a separate document: "Nping Echo Protocol Specification", available from: - + The following flow diagram describes a typical client/server interaction. Please refer to the document cited above for more information. diff --git a/nping/nping.h b/nping/nping.h index 89bde012f..f02c3d126 100644 --- a/nping/nping.h +++ b/nping/nping.h @@ -338,7 +338,7 @@ /* General tunable defines **************************************************/ #define NPING_NAME "Nping" -#define NPING_URL "http://nmap.org/nping" +#define NPING_URL "https://nmap.org/nping" #define NPING_VERSION "0.6.49SVN" diff --git a/nping/nping.spec b/nping/nping.spec index 9490c5089..345ccee8e 100644 --- a/nping/nping.spec +++ b/nping/nping.spec @@ -7,8 +7,8 @@ Summary: Network packet generation, response analysis and response time m Group: Applications/Internet License: GPLv2 with exceptions -URL: http://nmap.org/nping/ -Source0: http://nmap.org/%{name}/dist/%{name}-%{version}%{prerelease}/%{name}-%{version}%{prerelease}.tar.gz +URL: https://nmap.org/nping/ +Source0: https://nmap.org/%{name}/dist/%{name}-%{version}%{prerelease}/%{name}-%{version}%{prerelease}.tar.gz BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) diff --git a/nping/nping_winconfig.h b/nping/nping_winconfig.h index 57a1f9abb..95686bf28 100644 --- a/nping/nping_winconfig.h +++ b/nping/nping_winconfig.h @@ -133,7 +133,7 @@ //#ifndef NPING_NAME // #define NPING_NAME "Nmap" -// #define NPING_URL "http://nmap.org" +// #define NPING_URL "https://nmap.org" //#endif #ifdef NPING_PLATFORM diff --git a/nse_fs.cc b/nse_fs.cc index 354470a20..7c7895df3 100644 --- a/nse_fs.cc +++ b/nse_fs.cc @@ -1,6 +1,6 @@ /* ** Note: this is a port of LuaFileSystem for the -** Nmap project (http://nmap.org). +** Nmap project (https://nmap.org). ** Many functions have been removed, because we only really ** need: dir, mkdir, rmdir and possibly link. */ diff --git a/nselib/afp.lua b/nselib/afp.lua index 2e704ddef..4b304d33c 100644 --- a/nselib/afp.lua +++ b/nselib/afp.lua @@ -86,7 +86,7 @@ -- Consult the documentation of each function to learn more about their respective return values. -- --@author Patrik Karlsson ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @args afp.username The username to use for authentication. -- @args afp.password The password to use for authentication. diff --git a/nselib/amqp.lua b/nselib/amqp.lua index 84208a4f3..2f2e505d8 100644 --- a/nselib/amqp.lua +++ b/nselib/amqp.lua @@ -14,7 +14,7 @@ -- - This class contains the core functions needed to communicate with AMQP -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Sebastian Dragomir " -- Version 0.1 diff --git a/nselib/asn1.lua b/nselib/asn1.lua index 5740b3811..7b2c85416 100644 --- a/nselib/asn1.lua +++ b/nselib/asn1.lua @@ -3,7 +3,7 @@ -- -- Large chunks of this code have been ripped right out from snmp.lua. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @author Patrik Karlsson -- diff --git a/nselib/base32.lua b/nselib/base32.lua index 562cdd6c3..00b8cab26 100644 --- a/nselib/base32.lua +++ b/nselib/base32.lua @@ -2,7 +2,7 @@ -- Base32 encoding and decoding. Follows RFC 4648. -- -- @author Philip Pickering --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @ported base64 to base32 -- thanks to Patrick Donnelly for some optimizations diff --git a/nselib/base64.lua b/nselib/base64.lua index 25da8cc1a..624cedc2f 100644 --- a/nselib/base64.lua +++ b/nselib/base64.lua @@ -2,7 +2,7 @@ -- Base64 encoding and decoding. Follows RFC 4648. -- -- @author Philip Pickering --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- thanks to Patrick Donnelly for some optimizations diff --git a/nselib/bitcoin.lua b/nselib/bitcoin.lua index 51ef289e7..1ca8fad3d 100644 --- a/nselib/bitcoin.lua +++ b/nselib/bitcoin.lua @@ -20,7 +20,7 @@ -- --@author Patrik Karlsson --@author Andrew Orr ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- Version 0.2 diff --git a/nselib/bittorrent.lua b/nselib/bittorrent.lua index b1c37f0de..f1708ac0a 100644 --- a/nselib/bittorrent.lua +++ b/nselib/bittorrent.lua @@ -20,7 +20,7 @@ -- torrent.nodes tables respectively -- -- @author "Gorjan Petrovski" --- @license "Same as Nmap--See http://nmap.org/book/man-legal.html" +-- @license "Same as Nmap--See https://nmap.org/book/man-legal.html" -- -- The usage of the library would be first to initialize a new Torrent diff --git a/nselib/brute.lua b/nselib/brute.lua index 857ac052e..d32d11f76 100644 --- a/nselib/brute.lua +++ b/nselib/brute.lua @@ -162,7 +162,7 @@ -- lockouts. -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- Version 0.73 diff --git a/nselib/cassandra.lua b/nselib/cassandra.lua index 03ad22590..3c987576a 100644 --- a/nselib/cassandra.lua +++ b/nselib/cassandra.lua @@ -2,7 +2,7 @@ -- Library methods for handling Cassandra Thrift communication as client -- -- @author Vlatko Kosturjak --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- Version 0.1 -- diff --git a/nselib/comm.lua b/nselib/comm.lua index ebcd6916f..5c1b3deb1 100644 --- a/nselib/comm.lua +++ b/nselib/comm.lua @@ -19,7 +19,7 @@ -- "lines" takes precedence. If neither are given, the functions -- read as many bytes as possible. -- @author Kris Katterjohn 04/2008 --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local nmap = require "nmap" local shortport = require "shortport" diff --git a/nselib/creds.lua b/nselib/creds.lua index 1f8459700..f926c1eeb 100644 --- a/nselib/creds.lua +++ b/nselib/creds.lua @@ -86,7 +86,7 @@ -- the filename based on the type requested. -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.5 -- Created 2011/02/06 - v0.1 - created by Patrik Karlsson diff --git a/nselib/cvs.lua b/nselib/cvs.lua index ca64aa11d..2eb421d99 100644 --- a/nselib/cvs.lua +++ b/nselib/cvs.lua @@ -2,7 +2,7 @@ -- A minimal CVS (Concurrent Versions System) pserver protocol implementation which currently only supports authentication. -- -- @author Patrik Karlsson --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- Version 0.1 diff --git a/nselib/data/http-fingerprints.lua b/nselib/data/http-fingerprints.lua index b88e80d35..04634f3ad 100644 --- a/nselib/data/http-fingerprints.lua +++ b/nselib/data/http-fingerprints.lua @@ -12,7 +12,7 @@ local table = require "table" -- http://www.irvineunderground.org -- -- This file is released under the Nmap license; see: --- http://nmap.org/book/man-legal.html +-- https://nmap.org/book/man-legal.html -- -- @args http-fingerprints.nikto-db-path Looks at the given path for nikto database. -- It then converts the records in nikto's database into our Lua table format diff --git a/nselib/data/ike-fingerprints.lua b/nselib/data/ike-fingerprints.lua index 438a4bb11..0d1dcc1c6 100644 --- a/nselib/data/ike-fingerprints.lua +++ b/nselib/data/ike-fingerprints.lua @@ -16,7 +16,7 @@ Unknown ids: ]] author = "Jesper Kueckelhahn" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" fingerprints = {}; diff --git a/nselib/data/jdwp-class/JDWPExecCmd.java b/nselib/data/jdwp-class/JDWPExecCmd.java index 479a10aba..a6d18fd09 100644 --- a/nselib/data/jdwp-class/JDWPExecCmd.java +++ b/nselib/data/jdwp-class/JDWPExecCmd.java @@ -10,7 +10,7 @@ import java.io.*; * javac JDWPExecCmd.java (should be in the nselib/data/ directory). * * author = "Aleksandar Nikolic" - * license = "Same as Nmap--See http://nmap.org/book/man-legal.html" + * license = "Same as Nmap--See https://nmap.org/book/man-legal.html" */ public class JDWPExecCmd { @@ -28,4 +28,4 @@ public class JDWPExecCmd { } return result; } -} \ No newline at end of file +} diff --git a/nselib/data/jdwp-class/JDWPSystemInfo.java b/nselib/data/jdwp-class/JDWPSystemInfo.java index 006015c31..8e7e6d8a3 100644 --- a/nselib/data/jdwp-class/JDWPSystemInfo.java +++ b/nselib/data/jdwp-class/JDWPSystemInfo.java @@ -7,7 +7,7 @@ import java.util.Date; * javac JDWPSystemInfo.java (should be in the nselib/data/jdwp-class directory). * * author = "Aleksandar Nikolic" - * license = "Same as Nmap--See http://nmap.org/book/man-legal.html" + * license = "Same as Nmap--See https://nmap.org/book/man-legal.html" */ public class JDWPSystemInfo { @@ -38,4 +38,4 @@ public class JDWPSystemInfo { System.out.println(run()); } -} \ No newline at end of file +} diff --git a/nselib/data/packetdecoders.lua b/nselib/data/packetdecoders.lua index c29f205a4..8a70c5f64 100644 --- a/nselib/data/packetdecoders.lua +++ b/nselib/data/packetdecoders.lua @@ -49,7 +49,7 @@ local target = require "target" -- -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.2 -- Created 07/25/2011 - v0.1 - created by Patrik Karlsson diff --git a/nselib/data/psexec/nmap_service.c b/nselib/data/psexec/nmap_service.c index 23fd2f8f7..89c1424d2 100644 --- a/nselib/data/psexec/nmap_service.c +++ b/nselib/data/psexec/nmap_service.c @@ -26,7 +26,7 @@ * * @auther Ron Bowes * @copyright Ron Bowes - * @license "Same as Nmap--See http://nmap.org/book/man-legal.html" + * @license "Same as Nmap--See https://nmap.org/book/man-legal.html" */ #include diff --git a/nselib/datafiles.lua b/nselib/datafiles.lua index 32611f557..2e3bad908 100644 --- a/nselib/datafiles.lua +++ b/nselib/datafiles.lua @@ -8,7 +8,7 @@ -- the function result. On failure, they return false and an error message. -- @author Kris Katterjohn 03/2008 -- @author jah 08/2008 --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local io = require "io" local nmap = require "nmap" diff --git a/nselib/dns.lua b/nselib/dns.lua index 2fa3d242c..b5184a986 100644 --- a/nselib/dns.lua +++ b/nselib/dns.lua @@ -27,7 +27,7 @@ -- -- -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bin = require "bin" diff --git a/nselib/dnssd.lua b/nselib/dnssd.lua index 33b2beecc..678d70362 100644 --- a/nselib/dnssd.lua +++ b/nselib/dnssd.lua @@ -34,7 +34,7 @@ -- @args dnssd.services string or table containing services to query -- -- @author Patrik Karlsson --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- local coroutine = require "coroutine" diff --git a/nselib/drda.lua b/nselib/drda.lua index aa5b403a1..289f49868 100644 --- a/nselib/drda.lua +++ b/nselib/drda.lua @@ -44,7 +44,7 @@ -- There is some documentation at -- http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/topic/com.ibm.db29.doc.drda/db2z_drda.htm. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " -- diff --git a/nselib/eap.lua b/nselib/eap.lua index 706c0ec6f..1031a46a0 100644 --- a/nselib/eap.lua +++ b/nselib/eap.lua @@ -26,7 +26,7 @@ -- -- -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @author "Riccardo Cecolin " -- diff --git a/nselib/eigrp.lua b/nselib/eigrp.lua index 8305937fb..09b2da49c 100644 --- a/nselib/eigrp.lua +++ b/nselib/eigrp.lua @@ -1,7 +1,7 @@ --- A library supporting parsing and generating a limited subset of the Cisco' EIGRP packets. -- -- @author "Hani Benhabiles" --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.1 -- 19/07/2012 - First version. diff --git a/nselib/formulas.lua b/nselib/formulas.lua index 1489fe3ad..a91d890a1 100644 --- a/nselib/formulas.lua +++ b/nselib/formulas.lua @@ -5,7 +5,7 @@ -- averages, entropy, randomness and other calculations. Scripts that generate statistics -- and metrics can also make use of this library. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html --- local bin = require "bin" diff --git a/nselib/ftp.lua b/nselib/ftp.lua index afb715663..d553094b9 100644 --- a/nselib/ftp.lua +++ b/nselib/ftp.lua @@ -1,7 +1,7 @@ --- -- FTP functions. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local comm = require "comm" local stdnse = require "stdnse" diff --git a/nselib/giop.lua b/nselib/giop.lua index 33b2fdcf6..644c0b12d 100644 --- a/nselib/giop.lua +++ b/nselib/giop.lua @@ -44,7 +44,7 @@ -- This implementation is tested and known to work against: -- x Sun's JAVA orbd -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " -- diff --git a/nselib/http.lua b/nselib/http.lua index b58009228..3a3736837 100644 --- a/nselib/http.lua +++ b/nselib/http.lua @@ -89,7 +89,7 @@ -- -- @args http.useragent The value of the User-Agent header field sent with -- requests. By default it is --- "Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)". +-- "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)". -- A value of the empty string disables sending the User-Agent header field. -- -- @args http.pipeline If set, it represents the number of HTTP requests that'll be @@ -123,7 +123,7 @@ _ENV = stdnse.module("http", stdnse.seeall) ---Use ssl if we have it local have_ssl, openssl = pcall(require,'openssl') -USER_AGENT = stdnse.get_script_args('http.useragent') or "Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)" +USER_AGENT = stdnse.get_script_args('http.useragent') or "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)" local MAX_REDIRECT_COUNT = 5 -- Recursively copy a table. diff --git a/nselib/ike.lua b/nselib/ike.lua index 4eb77cd24..803ecfd30 100644 --- a/nselib/ike.lua +++ b/nselib/ike.lua @@ -19,7 +19,7 @@ --An a implementation resembling 'ike-scan' could be built. -- --@author Jesper Kueckelhahn ---@license Same as Nmap--See http://nmap.org/book/man-legal.html +--@license Same as Nmap--See https://nmap.org/book/man-legal.html local _G = require "_G" local bin = require "bin" diff --git a/nselib/imap.lua b/nselib/imap.lua index 9126db97b..2d63dadc8 100644 --- a/nselib/imap.lua +++ b/nselib/imap.lua @@ -16,7 +16,7 @@ -- helper:close() -- -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author = "Brandon Enright, Patrik Karlsson" -- Version 0.2 diff --git a/nselib/informix.lua b/nselib/informix.lua index 562f5c0a1..c8035f407 100644 --- a/nselib/informix.lua +++ b/nselib/informix.lua @@ -59,7 +59,7 @@ -- x IBM Informix Dynamic Server Express Edition v11.50 32-bit on Ubuntu -- x IBM Informix Dynamic Server xxx 32-bit on Windows 2003 -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " -- -- @args informix.instance specifies the Informix instance to connect to diff --git a/nselib/ipOps.lua b/nselib/ipOps.lua index b5ed44268..e505da107 100644 --- a/nselib/ipOps.lua +++ b/nselib/ipOps.lua @@ -1,7 +1,7 @@ --- -- Utility functions for manipulating and comparing IP addresses. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bin = require "bin" local bit = require "bit" diff --git a/nselib/iscsi.lua b/nselib/iscsi.lua index 7aedea390..1c9666740 100644 --- a/nselib/iscsi.lua +++ b/nselib/iscsi.lua @@ -26,7 +26,7 @@ -- -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.2 -- Created 2010/11/18 - v0.1 - created by Patrik Karlsson diff --git a/nselib/jdwp.lua b/nselib/jdwp.lua index 55dee9f2c..6bcf6ecf7 100644 --- a/nselib/jdwp.lua +++ b/nselib/jdwp.lua @@ -28,7 +28,7 @@ -- References: -- * http://docs.oracle.com/javase/6/docs/technotes/guides/jpda/jdwp-spec.html -- ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html --@author Aleksandar Nikolic -- -- Version 0.1 diff --git a/nselib/json.lua b/nselib/json.lua index 532dd13da..2de8c59d9 100644 --- a/nselib/json.lua +++ b/nselib/json.lua @@ -13,7 +13,7 @@ -- the special value json.NULL. -- -- @author Martin Holst Swende (originally), David Fifield, Patrick Donnelly --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.4 -- Created 01/25/2010 - v0.1 - created by Martin Holst Swende diff --git a/nselib/ldap.lua b/nselib/ldap.lua index f10b78d56..0c29fda0c 100644 --- a/nselib/ldap.lua +++ b/nselib/ldap.lua @@ -2,7 +2,7 @@ -- Library methods for handling LDAP. -- -- @author Patrik Karlsson --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- Credit goes out to Martin Swende who provided me with the initial code that got me started writing this. -- diff --git a/nselib/listop.lua b/nselib/listop.lua index 354cd3b76..7dd8386ea 100644 --- a/nselib/listop.lua +++ b/nselib/listop.lua @@ -7,7 +7,7 @@ -- functional languages to Lua using Lua's central data structure, the table, as -- a base for its list operations. Highlights include a map -- function applying a given function to each element of a list. --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local stdnse = require "stdnse" local table = require "table" diff --git a/nselib/lpeg-utility.lua b/nselib/lpeg-utility.lua index b9313d7ad..7a4b5f33f 100644 --- a/nselib/lpeg-utility.lua +++ b/nselib/lpeg-utility.lua @@ -1,7 +1,7 @@ --- -- Utility functions for LPeg. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @class module -- @name lpeg-utility diff --git a/nselib/ls.lua b/nselib/ls.lua index 548c0d53f..f1d116dab 100644 --- a/nselib/ls.lua +++ b/nselib/ls.lua @@ -28,7 +28,7 @@ -- given. -- -- @author Pierre Lalet --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html ----------------------------------------------------------------------- local LIBRARY_NAME = "ls" diff --git a/nselib/match.lua b/nselib/match.lua index 03f8da6ba..b24922857 100644 --- a/nselib/match.lua +++ b/nselib/match.lua @@ -3,7 +3,7 @@ -- -- The functions in this module can be used for delimiting data received by the -- nmap.receive_buf function in the Network I/O API (which see). --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local stdnse = require "stdnse" _ENV = stdnse.module("match", stdnse.seeall) diff --git a/nselib/mongodb.lua b/nselib/mongodb.lua index 636733acb..79505e6c9 100644 --- a/nselib/mongodb.lua +++ b/nselib/mongodb.lua @@ -2,7 +2,7 @@ -- Library methods for handling MongoDB, creating and parsing packets. -- -- @author Martin Holst Swende --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @args mongodb.db - the database to use for authentication @@ -45,7 +45,7 @@ local err =stdnse.debug1 -- and licensed under the Apache License, Version 2.0 http://www.apache.org/licenses/LICENSE-2.0) -- -- @author Martin Holst Swende --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- Version 0.1 diff --git a/nselib/msrpc.lua b/nselib/msrpc.lua index a84ab47a7..0ce13f079 100644 --- a/nselib/msrpc.lua +++ b/nselib/msrpc.lua @@ -47,7 +47,7 @@ -- Revised 07/25/2012 - added Printer Spooler Service (spoolss) RPC functions and -- constants [Aleksandar Nikolic] --@author Ron Bowes ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html ----------------------------------------------------------------------- local bin = require "bin" diff --git a/nselib/msrpcperformance.lua b/nselib/msrpcperformance.lua index cef7c7732..4f0987e36 100644 --- a/nselib/msrpcperformance.lua +++ b/nselib/msrpcperformance.lua @@ -14,7 +14,7 @@ -- And my primary inspiration was PsTools, specifically, pstasklist.exe. -- --@author Ron Bowes ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html ----------------------------------------------------------------------- local bin = require "bin" diff --git a/nselib/mssql.lua b/nselib/mssql.lua index 2fdb43fd9..17f672868 100644 --- a/nselib/mssql.lua +++ b/nselib/mssql.lua @@ -58,7 +58,7 @@ -- * The library does database authentication only. No OS authentication or use of the integrated security model is supported. -- * Queries using SELECT, INSERT, DELETE and EXEC of procedures have been tested while developing scripts. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @author "Patrik Karlsson , Chris Woodbury" -- diff --git a/nselib/mysql.lua b/nselib/mysql.lua index 12ea18fa1..2c6b9b69d 100644 --- a/nselib/mysql.lua +++ b/nselib/mysql.lua @@ -3,7 +3,7 @@ -- -- http://forge.mysql.com/wiki/MySQL_Internals_ClientServer_Protocol -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @author "Patrik Karlsson " diff --git a/nselib/ncp.lua b/nselib/ncp.lua index 898481cb8..d4aa61ec8 100644 --- a/nselib/ncp.lua +++ b/nselib/ncp.lua @@ -45,7 +45,7 @@ -- --@author Patrik Karlsson ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.1 -- Created 24/04/2011 - v0.1 - created by Patrik Karlsson diff --git a/nselib/netbios.lua b/nselib/netbios.lua index 60f8725e2..97f748faf 100644 --- a/nselib/netbios.lua +++ b/nselib/netbios.lua @@ -3,7 +3,7 @@ -- NetBIOS name requests. -- -- @author Ron Bowes --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bin = require "bin" local bit = require "bit" diff --git a/nselib/nmap.luadoc b/nselib/nmap.luadoc index e125bae39..2e02d9740 100644 --- a/nselib/nmap.luadoc +++ b/nselib/nmap.luadoc @@ -5,7 +5,7 @@ -- and data structures. The API provides target host details such as port -- states and version detection results. It also offers an interface to the -- Nsock library for efficient network I/O. --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html module "nmap" diff --git a/nselib/nrpc.lua b/nselib/nrpc.lua index b71bacdcf..6de5123a9 100644 --- a/nselib/nrpc.lua +++ b/nselib/nrpc.lua @@ -28,7 +28,7 @@ -- status, err = nrpc:Close() -- -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " -- diff --git a/nselib/nsedebug.lua b/nselib/nsedebug.lua index d14e335b7..9effa3928 100644 --- a/nselib/nsedebug.lua +++ b/nselib/nsedebug.lua @@ -4,7 +4,7 @@ -- This module contains various handy functions for debugging. These should -- never be used for actual results, only during testing. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local coroutine = require "coroutine" local debug = require "debug" diff --git a/nselib/omp2.lua b/nselib/omp2.lua index 74d731cc5..945f57cab 100644 --- a/nselib/omp2.lua +++ b/nselib/omp2.lua @@ -22,7 +22,7 @@ -- -- -- @author Henri Doreau --- @copyright Same as Nmap -- See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap -- See https://nmap.org/book/man-legal.html -- -- @args omp2.username The username to use for authentication. -- @args omp2.password The password to use for authentication. diff --git a/nselib/openssl.luadoc b/nselib/openssl.luadoc index 58cf3b9ed..886a523dc 100644 --- a/nselib/openssl.luadoc +++ b/nselib/openssl.luadoc @@ -18,7 +18,7 @@ -- end -- -- @author Sven Klemm --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html module "openssl" diff --git a/nselib/ospf.lua b/nselib/ospf.lua index 9bb3f6f22..ca72bac10 100644 --- a/nselib/ospf.lua +++ b/nselib/ospf.lua @@ -5,7 +5,7 @@ -- The library consists of an OSPF class that contains code to handle OSPFv2 packets. -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bin = require "bin" local bit = require "bit" diff --git a/nselib/packet.lua b/nselib/packet.lua index f0be2c780..c431ca14d 100644 --- a/nselib/packet.lua +++ b/nselib/packet.lua @@ -2,7 +2,7 @@ -- Facilities for manipulating raw packets. -- -- @author Marek Majkowski --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bit = require "bit" local ipOps = require "ipOps" diff --git a/nselib/pgsql.lua b/nselib/pgsql.lua index 11b9db9ab..acab51b10 100644 --- a/nselib/pgsql.lua +++ b/nselib/pgsql.lua @@ -9,7 +9,7 @@ -- * http://developer.postgresql.org/pgdocs/postgres/protocol-flow.html -- * http://developer.postgresql.org/pgdocs/postgres/protocol-message-formats.html -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " local bin = require "bin" diff --git a/nselib/pop3.lua b/nselib/pop3.lua index 10fc78228..83bdb6ab7 100644 --- a/nselib/pop3.lua +++ b/nselib/pop3.lua @@ -1,7 +1,7 @@ --- -- POP3 functions. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local base64 = require "base64" local comm = require "comm" diff --git a/nselib/proxy.lua b/nselib/proxy.lua index 0ca7dac73..3119ed583 100644 --- a/nselib/proxy.lua +++ b/nselib/proxy.lua @@ -2,7 +2,7 @@ -- Functions for proxy testing. -- -- @author Joao Correa --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bin = require "bin" local dns = require "dns" diff --git a/nselib/rdp.lua b/nselib/rdp.lua index 9d38fda14..b50dcb0f3 100644 --- a/nselib/rdp.lua +++ b/nselib/rdp.lua @@ -4,7 +4,7 @@ -- -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- local bin = require("bin") diff --git a/nselib/rmi.lua b/nselib/rmi.lua index 08ad3fa5d..e85e55afe 100644 --- a/nselib/rmi.lua +++ b/nselib/rmi.lua @@ -32,7 +32,7 @@ -- fetched from the registry (afaik) but not currently implemented. Some object ids are static : the registry is always 0 -- -- @author Martin Holst Swende --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @see java 1.4 RMI-spec: http://java.sun.com/j2se/1.4.2/docs/guide/rmi/ -- @see java 5 RMI-spec: http://java.sun.com/j2se/1.5.0/docs/guide/rmi/spec/rmiTOC.html -- @see java 6 RMI-spec : http://java.sun.com/javase/6/docs/technotes/guides/rmi/index.html diff --git a/nselib/rpc.lua b/nselib/rpc.lua index d78418e6d..297130f53 100644 --- a/nselib/rpc.lua +++ b/nselib/rpc.lua @@ -66,7 +66,7 @@ -- When multiple versions exists for a specific RPC program the library -- always attempts to connect using the highest available version. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @author "Patrik Karlsson " -- diff --git a/nselib/rtsp.lua b/nselib/rtsp.lua index e8d4a95a8..6606ebf93 100644 --- a/nselib/rtsp.lua +++ b/nselib/rtsp.lua @@ -2,7 +2,7 @@ -- This Real Time Streaming Protocol (RTSP) library implements only a minimal -- subset of the protocol needed by the current scripts. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author Patrik Karlsson -- -- The library contains the following classes: diff --git a/nselib/sasl.lua b/nselib/sasl.lua index f7fb47842..13083df4a 100644 --- a/nselib/sasl.lua +++ b/nselib/sasl.lua @@ -34,7 +34,7 @@ -- and they can also use the low level functions to customize their -- encoding functions. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.2 -- Created 07/17/2011 - v0.1 - Created by Djalal Harouni diff --git a/nselib/shortport.lua b/nselib/shortport.lua index 2cc3025eb..7d5317ef1 100644 --- a/nselib/shortport.lua +++ b/nselib/shortport.lua @@ -4,7 +4,7 @@ -- Since portrules are mostly the same for many scripts, this -- module provides functions for the most common tests. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local nmap = require "nmap" local stdnse = require "stdnse" diff --git a/nselib/sip.lua b/nselib/sip.lua index 971b17d6e..ffb760eb6 100644 --- a/nselib/sip.lua +++ b/nselib/sip.lua @@ -29,7 +29,7 @@ -- -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @args sip.timeout - specifies the session (socket) timeout in seconds diff --git a/nselib/smb.lua b/nselib/smb.lua index 88481152e..c664202f8 100644 --- a/nselib/smb.lua +++ b/nselib/smb.lua @@ -119,7 +119,7 @@ -- @args randomseed Set to a value to change the filenames/service names that are randomly generated. -- -- @author Ron Bowes --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html ----------------------------------------------------------------------- local asn1 = require "asn1" local bin = require "bin" diff --git a/nselib/smtp.lua b/nselib/smtp.lua index a6854c854..135fc9520 100644 --- a/nselib/smtp.lua +++ b/nselib/smtp.lua @@ -1,7 +1,7 @@ --- -- Simple Mail Transfer Protocol (SMTP) operations. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local base64 = require "base64" local comm = require "comm" diff --git a/nselib/snmp.lua b/nselib/snmp.lua index b9ae154e4..9fe4617c9 100644 --- a/nselib/snmp.lua +++ b/nselib/snmp.lua @@ -3,7 +3,7 @@ -- -- @author Patrik Karlsson -- @author Gioacchino Mazzurco --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- 2015-06-11 Gioacchino Mazzurco - Use creds library to handle SNMP community diff --git a/nselib/srvloc.lua b/nselib/srvloc.lua index a935f65cd..688e0c2d0 100644 --- a/nselib/srvloc.lua +++ b/nselib/srvloc.lua @@ -26,7 +26,7 @@ -- --@author Patrik Karlsson ---@copyright Same as Nmap--See http://nmap.org/book/man-legal.html +--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.1 -- Created 24/04/2011 - v0.1 - created by Patrik Karlsson diff --git a/nselib/ssh1.lua b/nselib/ssh1.lua index 62d5c1ccc..e2a7fb84f 100644 --- a/nselib/ssh1.lua +++ b/nselib/ssh1.lua @@ -3,7 +3,7 @@ -- formatting key fingerprints. -- -- @author Sven Klemm --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bin = require "bin" diff --git a/nselib/ssh2.lua b/nselib/ssh2.lua index 194a13bfa..10472e03e 100644 --- a/nselib/ssh2.lua +++ b/nselib/ssh2.lua @@ -2,7 +2,7 @@ -- Functions for the SSH-2 protocol. -- -- @author Sven Klemm --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local base64 = require "base64" local bin = require "bin" diff --git a/nselib/stdnse.lua b/nselib/stdnse.lua index c88be73a4..96621974d 100644 --- a/nselib/stdnse.lua +++ b/nselib/stdnse.lua @@ -2,7 +2,7 @@ -- Standard Nmap Scripting Engine functions. This module contains various handy -- functions that are too small to justify modules of their own. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @class module -- @name stdnse diff --git a/nselib/strbuf.lua b/nselib/strbuf.lua index 7b7f9457e..4bd9cbca8 100644 --- a/nselib/strbuf.lua +++ b/nselib/strbuf.lua @@ -35,7 +35,7 @@ -- print(strbuf.dump(buf, ' ')) -- separated by spaces -- strbuf.clear(buf) -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- DEPENDENCIES -- diff --git a/nselib/strict.lua b/nselib/strict.lua index 4ac8c012b..c53449ab8 100644 --- a/nselib/strict.lua +++ b/nselib/strict.lua @@ -12,7 +12,7 @@ -- -- @class module -- @name strict --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local debug = require "debug" diff --git a/nselib/tab.lua b/nselib/tab.lua index abb59a24d..03d25288a 100644 --- a/nselib/tab.lua +++ b/nselib/tab.lua @@ -22,7 +22,7 @@ -- typing Enter at the end of a line. tab.addrow adds a whole row -- at a time and calls tab.nextrow automatically. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local stdnse = require "stdnse" local strbuf = require "strbuf" diff --git a/nselib/target.lua b/nselib/target.lua index 4c10654ed..46e4df2d7 100644 --- a/nselib/target.lua +++ b/nselib/target.lua @@ -7,7 +7,7 @@ -- able to add new targets. Post-scanning scripts (postrule) are not -- allowed to add new targets. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- @args newtargets If specified, lets NSE scripts add new targets. -- @args max-newtargets Sets the number of the maximum allowed diff --git a/nselib/tftp.lua b/nselib/tftp.lua index fdab85a89..d1bbddd38 100644 --- a/nselib/tftp.lua +++ b/nselib/tftp.lua @@ -20,7 +20,7 @@ -- -- -- @author Patrik Karlsson --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- -- version 0.2 diff --git a/nselib/tns.lua b/nselib/tns.lua index 310d73533..d622577de 100644 --- a/nselib/tns.lua +++ b/nselib/tns.lua @@ -66,7 +66,7 @@ -- on both Linux and Windows. For details regarding what versions where tested -- please consult the matrix below. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " -- -- @args tns.sid specifies the Oracle instance to connect to diff --git a/nselib/unicode.lua b/nselib/unicode.lua index c8c90c1cd..2ab4be3ad 100644 --- a/nselib/unicode.lua +++ b/nselib/unicode.lua @@ -2,7 +2,7 @@ -- Library methods for handling unicode strings. -- -- @author Daniel Miller --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bit = require "bit" diff --git a/nselib/unittest.lua b/nselib/unittest.lua index 22807c83a..3e43602c6 100644 --- a/nselib/unittest.lua +++ b/nselib/unittest.lua @@ -15,7 +15,7 @@ -- -- The library is driven by the unittest NSE script. -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local stdnse = require "stdnse" local string = require "string" diff --git a/nselib/unpwdb.lua b/nselib/unpwdb.lua index b17131c9e..c2a260ff0 100644 --- a/nselib/unpwdb.lua +++ b/nselib/unpwdb.lua @@ -63,7 +63,7 @@ -- 30 minutes. The default depends on the timing template level (see the module -- description). Use the value 0 to disable the time limit. -- @author Kris Katterjohn 06/2008 --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local io = require "io" local nmap = require "nmap" diff --git a/nselib/vnc.lua b/nselib/vnc.lua index 650ccd5be..6381a61e0 100644 --- a/nselib/vnc.lua +++ b/nselib/vnc.lua @@ -18,7 +18,7 @@ -- - This class contains the core functions needed to communicate with VNC -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author "Patrik Karlsson " -- Version 0.1 diff --git a/nselib/vulns.lua b/nselib/vulns.lua index 6f333d418..1049a9fb7 100644 --- a/nselib/vulns.lua +++ b/nselib/vulns.lua @@ -179,7 +179,7 @@ -- collect these last objects. -- -- @author "Djalal Harouni" and "Henri Doreau" --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local bit = require "bit" diff --git a/nselib/wsdd.lua b/nselib/wsdd.lua index cf55e12c6..69f83f5c9 100644 --- a/nselib/wsdd.lua +++ b/nselib/wsdd.lua @@ -29,7 +29,7 @@ -- -- -- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- local bin = require "bin" diff --git a/nselib/xmpp.lua b/nselib/xmpp.lua index 7cde20fda..a12f78a20 100644 --- a/nselib/xmpp.lua +++ b/nselib/xmpp.lua @@ -23,7 +23,7 @@ -- status, err = helper:login(user, pass, "DIGEST-MD5") -- -- --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html +-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- @author Patrik Karlsson -- Version 0.2 diff --git a/nsock/tests/Makefile.in b/nsock/tests/Makefile.in index 1562f5628..4c10658c9 100644 --- a/nsock/tests/Makefile.in +++ b/nsock/tests/Makefile.in @@ -1,6 +1,6 @@ # # nsock regression test suite -# Same license as nmap -- see http://nmap.org/book/man-legal.html +# Same license as nmap -- see https://nmap.org/book/man-legal.html ## NBASEDIR=@NBASEDIR@ diff --git a/nsock/tests/basic.c b/nsock/tests/basic.c index 9c31b7c85..9d8a12c9f 100644 --- a/nsock/tests/basic.c +++ b/nsock/tests/basic.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/nsock/tests/cancel.c b/nsock/tests/cancel.c index 42e9323a8..49f98bf6b 100644 --- a/nsock/tests/cancel.c +++ b/nsock/tests/cancel.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/nsock/tests/connect.c b/nsock/tests/connect.c index 065457983..736b082bd 100644 --- a/nsock/tests/connect.c +++ b/nsock/tests/connect.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/nsock/tests/ghheaps.c b/nsock/tests/ghheaps.c index a1478abde..11f3327a9 100644 --- a/nsock/tests/ghheaps.c +++ b/nsock/tests/ghheaps.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/nsock/tests/ghlists.c b/nsock/tests/ghlists.c index 1cacae224..54c026bcd 100644 --- a/nsock/tests/ghlists.c +++ b/nsock/tests/ghlists.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/nsock/tests/logs.c b/nsock/tests/logs.c index fdc3539d5..b8808e4e5 100644 --- a/nsock/tests/logs.c +++ b/nsock/tests/logs.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/nsock/tests/run_tests.sh b/nsock/tests/run_tests.sh index d8c468dec..c0392f811 100755 --- a/nsock/tests/run_tests.sh +++ b/nsock/tests/run_tests.sh @@ -1,7 +1,7 @@ #!/bin/sh # nsock regression test suite -# Same license as nmap -- see http://nmap.org/book/man-legal.html +# Same license as nmap -- see https://nmap.org/book/man-legal.html # hackish, I should consider using a configuration file. PORT_UDP=$(grep "PORT_UDP " test-common.h | awk '{print $3}') diff --git a/nsock/tests/test-common.h b/nsock/tests/test-common.h index 93a6d3741..2f849f13b 100644 --- a/nsock/tests/test-common.h +++ b/nsock/tests/test-common.h @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ diff --git a/nsock/tests/tests_main.c b/nsock/tests/tests_main.c index bfa6b93d9..46526a5f1 100644 --- a/nsock/tests/tests_main.c +++ b/nsock/tests/tests_main.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ diff --git a/nsock/tests/timer.c b/nsock/tests/timer.c index 5ae6aaeb0..27250ce79 100644 --- a/nsock/tests/timer.c +++ b/nsock/tests/timer.c @@ -1,6 +1,6 @@ /* * Nsock regression test suite - * Same license as nmap -- see http://nmap.org/book/man-legal.html + * Same license as nmap -- see https://nmap.org/book/man-legal.html */ #include "test-common.h" diff --git a/osscan.cc b/osscan.cc index d0023d2f6..73b1ed393 100644 --- a/osscan.cc +++ b/osscan.cc @@ -2,7 +2,7 @@ /*************************************************************************** * osscan.cc -- Routines used for OS detection via TCP/IP fingerprinting. * * For more information on how this works in Nmap, see my paper at * - * http://nmap.org/osdetect/ * + * https://nmap.org/osdetect/ * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/osscan.h b/osscan.h index d241eee3e..f6246dac2 100644 --- a/osscan.h +++ b/osscan.h @@ -1,7 +1,7 @@ /*************************************************************************** * osscan.h -- Routines used for OS detection via TCP/IP fingerprinting. * * For more information on how this works in Nmap, see my paper at * - * http://nmap.org/osdetect/ * + * https://nmap.org/osdetect/ * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/osscan2.cc b/osscan2.cc index 74e31fc34..c6584e8ae 100644 --- a/osscan2.cc +++ b/osscan2.cc @@ -2,7 +2,7 @@ /*************************************************************************** * osscan2.cc -- Routines used for 2nd Generation OS detection via * * TCP/IP fingerprinting. * For more information on how this works in * - * Nmap, see http://nmap.org/osdetect/ * + * Nmap, see https://nmap.org/osdetect/ * * * ***********************IMPORTANT NMAP LICENSE TERMS************************ * * diff --git a/scan_engine_raw.cc b/scan_engine_raw.cc index 0d9cdfa87..c821c3398 100644 --- a/scan_engine_raw.cc +++ b/scan_engine_raw.cc @@ -1796,7 +1796,7 @@ bool get_pcap_result(UltraScanInfo *USI, struct timeval *stime) { newstate = PORT_UNFILTERED; } else newstate = PORT_CLOSED; } else if (USI->scantype == SYN_SCAN && (tcp->th_flags & TH_SYN)) { - /* A SYN from a TCP Split Handshake - http://nmap.org/misc/split-handshake.pdf - open port */ + /* A SYN from a TCP Split Handshake - https://nmap.org/misc/split-handshake.pdf - open port */ newstate = PORT_OPEN; current_reason = ER_SYN; } else { diff --git a/scripts/acarsd-info.nse b/scripts/acarsd-info.nse index a1493aa5f..50500d906 100644 --- a/scripts/acarsd-info.nse +++ b/scripts/acarsd-info.nse @@ -41,7 +41,7 @@ For more information about acarsd, see: -- author = "Brendan Coles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe","discovery"} diff --git a/scripts/address-info.nse b/scripts/address-info.nse index 258e981c5..5da86efdc 100644 --- a/scripts/address-info.nse +++ b/scripts/address-info.nse @@ -112,7 +112,7 @@ definitions of some terms. author = "David Fifield" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/afp-brute.nse b/scripts/afp-brute.nse index 9be8364ee..960e5aed7 100644 --- a/scripts/afp-brute.nse +++ b/scripts/afp-brute.nse @@ -37,7 +37,7 @@ Performs password guessing against Apple Filing Protocol (AFP). -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/afp-ls.nse b/scripts/afp-ls.nse index e9761082e..4db44cdee 100644 --- a/scripts/afp-ls.nse +++ b/scripts/afp-ls.nse @@ -99,7 +99,7 @@ The output is intended to resemble the output of ls. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"afp-brute"} diff --git a/scripts/afp-path-vuln.nse b/scripts/afp-path-vuln.nse index 6415c2019..8b5e5ae75 100644 --- a/scripts/afp-path-vuln.nse +++ b/scripts/afp-path-vuln.nse @@ -65,7 +65,7 @@ For additional information: -- Revised 21/10/2011 - v0.4 - Use the vulnerability library vulns.lua author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive", "vuln"} diff --git a/scripts/afp-serverinfo.nse b/scripts/afp-serverinfo.nse index 5ad82e9a9..a0c4c0602 100644 --- a/scripts/afp-serverinfo.nse +++ b/scripts/afp-serverinfo.nse @@ -82,7 +82,7 @@ hostname, IPv4 and IPv6 addresses, and hardware type (for example -- Revised 2015/02/25 - v0.3 - XML structured output author = "Andrew Orr" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/afp-showmount.nse b/scripts/afp-showmount.nse index 865fc463b..a6a169c47 100644 --- a/scripts/afp-showmount.nse +++ b/scripts/afp-showmount.nse @@ -35,7 +35,7 @@ Shows AFP shares and ACLs. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/ajp-auth.nse b/scripts/ajp-auth.nse index c72a54c7e..0a258e016 100644 --- a/scripts/ajp-auth.nse +++ b/scripts/ajp-auth.nse @@ -22,7 +22,7 @@ Retrieves the authentication scheme and realm of an AJP service (Apache JServ Pr -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "auth", "safe"} diff --git a/scripts/ajp-brute.nse b/scripts/ajp-brute.nse index 14c15769d..88081065a 100644 --- a/scripts/ajp-brute.nse +++ b/scripts/ajp-brute.nse @@ -27,7 +27,7 @@ back-end Java application server containers. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/ajp-headers.nse b/scripts/ajp-headers.nse index 3ef2febd2..13cc58bc2 100644 --- a/scripts/ajp-headers.nse +++ b/scripts/ajp-headers.nse @@ -26,7 +26,7 @@ optional directory of an Apache JServ Protocol server and returns the server res portrule = shortport.port_or_service(8009, 'ajp13', 'tcp') author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} local arg_path = stdnse.get_script_args(SCRIPT_NAME .. '.path') or "/" diff --git a/scripts/ajp-methods.nse b/scripts/ajp-methods.nse index db38433fd..a65445957 100644 --- a/scripts/ajp-methods.nse +++ b/scripts/ajp-methods.nse @@ -26,13 +26,13 @@ http://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008% -- | ajp-methods: -- | Supported methods: GET HEAD POST PUT DELETE TRACE OPTIONS -- | Potentially risky methods: PUT DELETE TRACE --- |_ See http://nmap.org/nsedoc/scripts/ajp-methods.html +-- |_ See https://nmap.org/nsedoc/scripts/ajp-methods.html -- -- @args ajp-methods.path the path to check or / if none was given -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} @@ -73,7 +73,7 @@ action = function(host, port) local interesting = filter_out(methods, UNINTERESTING_METHODS) if ( #interesting > 0 ) then table.insert(output, "Potentially risky methods: " .. stdnse.strjoin(" ", interesting)) - table.insert(output, "See http://nmap.org/nsedoc/scripts/ajp-methods.html") + table.insert(output, "See https://nmap.org/nsedoc/scripts/ajp-methods.html") end return stdnse.format_output(true, output) end diff --git a/scripts/ajp-request.nse b/scripts/ajp-request.nse index f32bbb04d..29ffd526c 100644 --- a/scripts/ajp-request.nse +++ b/scripts/ajp-request.nse @@ -40,7 +40,7 @@ back-end Java application server containers. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/allseeingeye-info.nse b/scripts/allseeingeye-info.nse index 103b068b9..a562671cb 100644 --- a/scripts/allseeingeye-info.nse +++ b/scripts/allseeingeye-info.nse @@ -129,7 +129,7 @@ http://sourceforge.net/projects/gameq/ --
author = "Marin Maržić" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery", "safe", "version" } portrule = shortport.version_port_or_service({1258,2126,3123,12444,13200,23196,26000,27138,27244,27777,28138}, "allseeingeye", "udp") diff --git a/scripts/amqp-info.nse b/scripts/amqp-info.nse index 05a5f998b..b65cb0f02 100644 --- a/scripts/amqp-info.nse +++ b/scripts/amqp-info.nse @@ -34,7 +34,7 @@ See http://www.rabbitmq.com/extensions.html for details on the author = "Sebastian Dragomir" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe", "version"} diff --git a/scripts/asn-query.nse b/scripts/asn-query.nse index d314b58e4..f2e81f117 100644 --- a/scripts/asn-query.nse +++ b/scripts/asn-query.nse @@ -40,7 +40,7 @@ server (your default DNS server, or whichever one you specified with the -- |_ Peer AS: 174 2914 6461 author = "jah, Michael Pattrick" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "external", "safe"} diff --git a/scripts/auth-owners.nse b/scripts/auth-owners.nse index af6c3f951..2ea717ed3 100644 --- a/scripts/auth-owners.nse +++ b/scripts/auth-owners.nse @@ -27,7 +27,7 @@ also known as identd, normally runs on port 113. author = "Diman Todorov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/auth-spoof.nse b/scripts/auth-spoof.nse index 2824d79b4..42f0c4d6c 100644 --- a/scripts/auth-spoof.nse +++ b/scripts/auth-spoof.nse @@ -18,7 +18,7 @@ reasons. author = "Diman Todorov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"malware", "safe"} diff --git a/scripts/backorifice-brute.nse b/scripts/backorifice-brute.nse index ba5614bf8..80f74e19d 100644 --- a/scripts/backorifice-brute.nse +++ b/scripts/backorifice-brute.nse @@ -43,7 +43,7 @@ the script against). -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/backorifice-info.nse b/scripts/backorifice-info.nse index 5200f33a4..83b2735bd 100644 --- a/scripts/backorifice-info.nse +++ b/scripts/backorifice-info.nse @@ -71,7 +71,7 @@ installed with the service. -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"backorifice-brute"} diff --git a/scripts/bacnet-info.nse b/scripts/bacnet-info.nse index 9b67ac807..1cef159c1 100644 --- a/scripts/bacnet-info.nse +++ b/scripts/bacnet-info.nse @@ -50,7 +50,7 @@ http://digitalbond.com author = "Stephen Hilt, Michael Toecker (Digital Bond)" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "version"} diff --git a/scripts/banner.nse b/scripts/banner.nse index 138c916bb..e8ec7f162 100644 --- a/scripts/banner.nse +++ b/scripts/banner.nse @@ -22,7 +22,7 @@ increase in the level of verbosity requested on the command line. author = "jah" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/bitcoin-getaddr.nse b/scripts/bitcoin-getaddr.nse index cffe61840..dbed70507 100644 --- a/scripts/bitcoin-getaddr.nse +++ b/scripts/bitcoin-getaddr.nse @@ -26,7 +26,7 @@ Queries a Bitcoin server for a list of known Bitcoin nodes -- |_ 10.10.10.14:8333 11/09/11 17:37:12 author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/bitcoin-info.nse b/scripts/bitcoin-info.nse index 803ce766b..018f8567d 100644 --- a/scripts/bitcoin-info.nse +++ b/scripts/bitcoin-info.nse @@ -23,7 +23,7 @@ Extracts version and node information from a Bitcoin server -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} -- diff --git a/scripts/bitcoinrpc-info.nse b/scripts/bitcoinrpc-info.nse index 9c550fd26..4bc9544df 100644 --- a/scripts/bitcoinrpc-info.nse +++ b/scripts/bitcoinrpc-info.nse @@ -47,7 +47,7 @@ Obtains information from a Bitcoin server by calling getinfo on its -- author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"http-brute"} diff --git a/scripts/bittorrent-discovery.nse b/scripts/bittorrent-discovery.nse index 1c42cc14a..6084f4620 100644 --- a/scripts/bittorrent-discovery.nse +++ b/scripts/bittorrent-discovery.nse @@ -43,7 +43,7 @@ peers as targets. -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","safe"} diff --git a/scripts/broadcast-ataoe-discover.nse b/scripts/broadcast-ataoe-discover.nse index 7a4e243ad..43fa0c92d 100644 --- a/scripts/broadcast-ataoe-discover.nse +++ b/scripts/broadcast-ataoe-discover.nse @@ -27,7 +27,7 @@ header. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-avahi-dos.nse b/scripts/broadcast-avahi-dos.nse index acddc6e4d..34f25dd50 100644 --- a/scripts/broadcast-avahi-dos.nse +++ b/scripts/broadcast-avahi-dos.nse @@ -38,7 +38,7 @@ Reference: author = "Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "dos", "intrusive", "vuln"} diff --git a/scripts/broadcast-bjnp-discover.nse b/scripts/broadcast-bjnp-discover.nse index 1633627e3..45d89bb8a 100644 --- a/scripts/broadcast-bjnp-discover.nse +++ b/scripts/broadcast-bjnp-discover.nse @@ -30,7 +30,7 @@ information for all discovered devices. -- the network interface. (default 30s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "broadcast"} local bjnp = require("bjnp") diff --git a/scripts/broadcast-db2-discover.nse b/scripts/broadcast-db2-discover.nse index 249428b19..6f1def9f3 100644 --- a/scripts/broadcast-db2-discover.nse +++ b/scripts/broadcast-db2-discover.nse @@ -22,7 +22,7 @@ Attempts to discover DB2 servers on the network by sending a broadcast request t -- Created 07/10/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-dhcp-discover.nse b/scripts/broadcast-dhcp-discover.nse index 63c240b34..a73178f94 100644 --- a/scripts/broadcast-dhcp-discover.nse +++ b/scripts/broadcast-dhcp-discover.nse @@ -55,7 +55,7 @@ The script needs to be run as a privileged user, typically root. -- Created 07/14/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-dhcp6-discover.nse b/scripts/broadcast-dhcp6-discover.nse index 8ce5d9f47..f63eb4194 100644 --- a/scripts/broadcast-dhcp6-discover.nse +++ b/scripts/broadcast-dhcp6-discover.nse @@ -32,7 +32,7 @@ to a privileged port (udp/546). -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-dns-service-discovery.nse b/scripts/broadcast-dns-service-discovery.nse index f19648342..fca0dc624 100644 --- a/scripts/broadcast-dns-service-discovery.nse +++ b/scripts/broadcast-dns-service-discovery.nse @@ -40,7 +40,7 @@ get more information. -- Created 10/29/2010 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-dropbox-listener.nse b/scripts/broadcast-dropbox-listener.nse index ccea7669c..d3a9bc972 100644 --- a/scripts/broadcast-dropbox-listener.nse +++ b/scripts/broadcast-dropbox-listener.nse @@ -37,7 +37,7 @@ output. -- 1047/tcp open neod1 author = "Ron Bowes, Mak Kolybabi, Andrew Orr, Russ Tait Milne" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-eigrp-discovery.nse b/scripts/broadcast-eigrp-discovery.nse index 71c442d14..c0df938ea 100644 --- a/scripts/broadcast-eigrp-discovery.nse +++ b/scripts/broadcast-eigrp-discovery.nse @@ -70,7 +70,7 @@ through all valid ethernet interfaces simultaneously. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "broadcast", "safe"} diff --git a/scripts/broadcast-igmp-discovery.nse b/scripts/broadcast-igmp-discovery.nse index 2b21a24ea..53fdab72f 100644 --- a/scripts/broadcast-igmp-discovery.nse +++ b/scripts/broadcast-igmp-discovery.nse @@ -101,7 +101,7 @@ end author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} diff --git a/scripts/broadcast-listener.nse b/scripts/broadcast-listener.nse index 041a47c53..7c4076d6b 100644 --- a/scripts/broadcast-listener.nse +++ b/scripts/broadcast-listener.nse @@ -79,7 +79,7 @@ unless a specific interface was given using the -e argument to Nmap. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-ms-sql-discover.nse b/scripts/broadcast-ms-sql-discover.nse index 1d57e8e04..40c0bcb26 100644 --- a/scripts/broadcast-ms-sql-discover.nse +++ b/scripts/broadcast-ms-sql-discover.nse @@ -50,7 +50,7 @@ broadcast version will only use the SQL Server Browser service discovery method. -- Revised 02/01/2011 - v0.2 - Added compatibility with changes in mssql.lua (Chris Woodbury) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-netbios-master-browser.nse b/scripts/broadcast-netbios-master-browser.nse index c61c3f77f..63ca3f581 100644 --- a/scripts/broadcast-netbios-master-browser.nse +++ b/scripts/broadcast-netbios-master-browser.nse @@ -22,7 +22,7 @@ Attempts to discover master browsers and the domains they manage. -- Created 06/14/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-networker-discover.nse b/scripts/broadcast-networker-discover.nse index b8a15369a..1b9110dab 100644 --- a/scripts/broadcast-networker-discover.nse +++ b/scripts/broadcast-networker-discover.nse @@ -18,7 +18,7 @@ Discovers EMC Networker backup software servers on a LAN by sending a network br -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-novell-locate.nse b/scripts/broadcast-novell-locate.nse index 0285a95bb..07dd350d7 100644 --- a/scripts/broadcast-novell-locate.nse +++ b/scripts/broadcast-novell-locate.nse @@ -24,7 +24,7 @@ Attempts to use the Service Location Protocol to discover Novell NetWare Core Pr -- Created 04/26/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-pc-anywhere.nse b/scripts/broadcast-pc-anywhere.nse index 18ca5631c..6e6146073 100644 --- a/scripts/broadcast-pc-anywhere.nse +++ b/scripts/broadcast-pc-anywhere.nse @@ -20,7 +20,7 @@ Sends a special broadcast probe to discover PC-Anywhere hosts running on a LAN. -- the network interface. (default varies according to timing. -T3 = 5s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "broadcast", "safe" } local TIMEOUT = stdnse.parse_timespec(stdnse.get_script_args("broadcast-pc-anywhere.timeout")) diff --git a/scripts/broadcast-pc-duo.nse b/scripts/broadcast-pc-duo.nse index ae399ec09..a9f4e03e2 100644 --- a/scripts/broadcast-pc-duo.nse +++ b/scripts/broadcast-pc-duo.nse @@ -25,7 +25,7 @@ Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a -- the network interface. (default varies according to timing. -T3 = 5s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "broadcast", "safe" } local TIMEOUT = stdnse.parse_timespec(stdnse.get_script_args("broadcast-pc-duo.timeout")) diff --git a/scripts/broadcast-pim-discovery.nse b/scripts/broadcast-pim-discovery.nse index 35712c333..ac386835a 100644 --- a/scripts/broadcast-pim-discovery.nse +++ b/scripts/broadcast-pim-discovery.nse @@ -36,7 +36,7 @@ This works by sending a PIM Hello message to the PIM multicast address author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} diff --git a/scripts/broadcast-ping.nse b/scripts/broadcast-ping.nse index d2ab1ea3d..1c60d7662 100644 --- a/scripts/broadcast-ping.nse +++ b/scripts/broadcast-ping.nse @@ -57,7 +57,7 @@ is 0. The payload is consisted of random bytes. -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","safe","broadcast"} diff --git a/scripts/broadcast-pppoe-discover.nse b/scripts/broadcast-pppoe-discover.nse index 035a91578..18de05bb2 100644 --- a/scripts/broadcast-pppoe-discover.nse +++ b/scripts/broadcast-pppoe-discover.nse @@ -30,7 +30,7 @@ mode to operate. -- |_ Host-Uniq: 7f8552a0 author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-rip-discover.nse b/scripts/broadcast-rip-discover.nse index 63e92739c..ad32ba5c4 100644 --- a/scripts/broadcast-rip-discover.nse +++ b/scripts/broadcast-rip-discover.nse @@ -40,7 +40,7 @@ from all devices responding to the request. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-ripng-discover.nse b/scripts/broadcast-ripng-discover.nse index 684b01576..9087d004f 100644 --- a/scripts/broadcast-ripng-discover.nse +++ b/scripts/broadcast-ripng-discover.nse @@ -26,7 +26,7 @@ LAN by sending a broadcast RIPng Request command and collecting any responses. -- (default: 5s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-sybase-asa-discover.nse b/scripts/broadcast-sybase-asa-discover.nse index a7aa6f8b1..cbaaa5689 100644 --- a/scripts/broadcast-sybase-asa-discover.nse +++ b/scripts/broadcast-sybase-asa-discover.nse @@ -21,7 +21,7 @@ Discovers Sybase Anywhere servers on the LAN by sending broadcast discovery mess -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "broadcast", "safe" } prerule = function() return ( nmap.address_family() == "inet") end diff --git a/scripts/broadcast-tellstick-discover.nse b/scripts/broadcast-tellstick-discover.nse index 171f9f49f..bd2b5f092 100644 --- a/scripts/broadcast-tellstick-discover.nse +++ b/scripts/broadcast-tellstick-discover.nse @@ -22,7 +22,7 @@ dimmers and electric outlets. For more information: http://www.telldus.com/ -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} prerule = function() return ( nmap.address_family() == 'inet' ) end diff --git a/scripts/broadcast-upnp-info.nse b/scripts/broadcast-upnp-info.nse index 8a084db9a..3e0f482a3 100644 --- a/scripts/broadcast-upnp-info.nse +++ b/scripts/broadcast-upnp-info.nse @@ -30,7 +30,7 @@ Attempts to extract system information from the UPnP service by sending a multic -- Created 10/29/2010 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-versant-locate.nse b/scripts/broadcast-versant-locate.nse index 29c28dc99..015c0c80e 100644 --- a/scripts/broadcast-versant-locate.nse +++ b/scripts/broadcast-versant-locate.nse @@ -21,7 +21,7 @@ Discovers Versant object databases using the broadcast srvloc protocol. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-wake-on-lan.nse b/scripts/broadcast-wake-on-lan.nse index 98f1aa2db..e54988e79 100644 --- a/scripts/broadcast-wake-on-lan.nse +++ b/scripts/broadcast-wake-on-lan.nse @@ -21,7 +21,7 @@ Wakes a remote system up from sleep by sending a Wake-On-Lan packet. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} local MAC = stdnse.get_script_args("broadcast-wake-on-lan.MAC") diff --git a/scripts/broadcast-wpad-discover.nse b/scripts/broadcast-wpad-discover.nse index f39fa9234..6f049989a 100644 --- a/scripts/broadcast-wpad-discover.nse +++ b/scripts/broadcast-wpad-discover.nse @@ -32,7 +32,7 @@ argument or by attempting to reverse resolve the local IP. -- @args broadcast-wpad-discover.getwpad instructs the script to retrieve the WPAD file instead of parsing it author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-wsdd-discover.nse b/scripts/broadcast-wsdd-discover.nse index 62d35b804..09cca0d38 100644 --- a/scripts/broadcast-wsdd-discover.nse +++ b/scripts/broadcast-wsdd-discover.nse @@ -42,7 +42,7 @@ any published Windows Communication Framework (WCF) web services (.NET -- Created 10/31/2010 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/broadcast-xdmcp-discover.nse b/scripts/broadcast-xdmcp-discover.nse index c19b0a50b..c557bdb04 100644 --- a/scripts/broadcast-xdmcp-discover.nse +++ b/scripts/broadcast-xdmcp-discover.nse @@ -21,7 +21,7 @@ are marked using the keyword Willing in the result. -- @args broadcast-xdmcp-discover.timeout socket timeout (default: 5s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast", "safe"} diff --git a/scripts/cassandra-brute.nse b/scripts/cassandra-brute.nse index d9289ba88..5eedcd807 100644 --- a/scripts/cassandra-brute.nse +++ b/scripts/cassandra-brute.nse @@ -29,7 +29,7 @@ http://cassandra.apache.org/ -- author = "Vlatko Kosturjak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service({9160}, {"cassandra"}) diff --git a/scripts/cassandra-info.nse b/scripts/cassandra-info.nse index 54ebc5e36..594721836 100644 --- a/scripts/cassandra-info.nse +++ b/scripts/cassandra-info.nse @@ -31,7 +31,7 @@ http://cassandra.apache.org/ -- Created 14/09/2012 - v0.1 - created by Vlatko Kosturjak author = "Vlatko Kosturjak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"cassandra-brute"} diff --git a/scripts/citrix-brute-xml.nse b/scripts/citrix-brute-xml.nse index 42b40c8f4..021fe9ead 100644 --- a/scripts/citrix-brute-xml.nse +++ b/scripts/citrix-brute-xml.nse @@ -34,7 +34,7 @@ accounts will be locked. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/citrix-enum-apps-xml.nse b/scripts/citrix-enum-apps-xml.nse index 1d5e5e534..52af47001 100644 --- a/scripts/citrix-enum-apps-xml.nse +++ b/scripts/citrix-enum-apps-xml.nse @@ -67,7 +67,7 @@ The script returns more output with higher verbosity. -- Revised 12/16/2014 - v0.3 - Detect if encryption settings are minimum requirements author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/citrix-enum-apps.nse b/scripts/citrix-enum-apps.nse index e11cd11ed..400065cf8 100644 --- a/scripts/citrix-enum-apps.nse +++ b/scripts/citrix-enum-apps.nse @@ -29,7 +29,7 @@ Extracts a list of published applications from the ICA Browser service. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","safe"} diff --git a/scripts/citrix-enum-servers-xml.nse b/scripts/citrix-enum-servers-xml.nse index 20e67699f..16fcf9085 100644 --- a/scripts/citrix-enum-servers-xml.nse +++ b/scripts/citrix-enum-servers-xml.nse @@ -25,7 +25,7 @@ service. -- Revised 12/02/2009 - v0.2 - Use stdnse.format_ouput for output author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/citrix-enum-servers.nse b/scripts/citrix-enum-servers.nse index f9ad4b035..d8e5a78dc 100644 --- a/scripts/citrix-enum-servers.nse +++ b/scripts/citrix-enum-servers.nse @@ -27,7 +27,7 @@ Extracts a list of Citrix servers from the ICA Browser service. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/couchdb-databases.nse b/scripts/couchdb-databases.nse index a400bf2ee..c53c04b03 100644 --- a/scripts/couchdb-databases.nse +++ b/scripts/couchdb-databases.nse @@ -33,7 +33,7 @@ http://wiki.apache.org/couchdb/HTTP_database_API. -- TODO : Authentication not implemented author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service({5984}) diff --git a/scripts/couchdb-stats.nse b/scripts/couchdb-stats.nse index b0bec560f..9bcfe8b41 100644 --- a/scripts/couchdb-stats.nse +++ b/scripts/couchdb-stats.nse @@ -46,7 +46,7 @@ http://wiki.apache.org/couchdb/HTTP_database_API. -- Modified 07/02/2010 - v0.2 - added test if auth is enabled, compacted output a bit (mhs) author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service({5984}) -- Some lazy shortcuts diff --git a/scripts/creds-summary.nse b/scripts/creds-summary.nse index a596314ec..4b9a49536 100644 --- a/scripts/creds-summary.nse +++ b/scripts/creds-summary.nse @@ -25,7 +25,7 @@ Lists all discovered credentials (e.g. from brute force and default password che author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "default", "safe"} diff --git a/scripts/cups-info.nse b/scripts/cups-info.nse index 8772cd65c..d17586c7b 100644 --- a/scripts/cups-info.nse +++ b/scripts/cups-info.nse @@ -37,7 +37,7 @@ Lists printers managed by the CUPS printing service. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/cups-queue-info.nse b/scripts/cups-queue-info.nse index d64ec3f47..e89b1aef7 100644 --- a/scripts/cups-queue-info.nse +++ b/scripts/cups-queue-info.nse @@ -28,7 +28,7 @@ printer. categories = {"safe", "discovery"} author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/cvs-brute-repository.nse b/scripts/cvs-brute-repository.nse index 3cb67e0f5..e9b0fda4f 100644 --- a/scripts/cvs-brute-repository.nse +++ b/scripts/cvs-brute-repository.nse @@ -39,7 +39,7 @@ With knowledge of the correct repository name, usernames and passwords can be gu -- library [Aleksandar Nikolic] author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/cvs-brute.nse b/scripts/cvs-brute.nse index 20774d5d1..314830398 100644 --- a/scripts/cvs-brute.nse +++ b/scripts/cvs-brute.nse @@ -33,7 +33,7 @@ Performs brute force password auditing against CVS pserver authentication. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} dependencies = {"cvs-brute-repository"} diff --git a/scripts/daap-get-library.nse b/scripts/daap-get-library.nse index dc2efe4e8..23351d223 100644 --- a/scripts/daap-get-library.nse +++ b/scripts/daap-get-library.nse @@ -41,7 +41,7 @@ http://www.tapjam.net/daap/. -- |_ Coconut author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/daytime.nse b/scripts/daytime.nse index b9efbee88..ff3c2277a 100644 --- a/scripts/daytime.nse +++ b/scripts/daytime.nse @@ -13,7 +13,7 @@ Retrieves the day and time from the Daytime service. author = "Diman Todorov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/db2-das-info.nse b/scripts/db2-das-info.nse index fabe27ea2..cda06d13f 100644 --- a/scripts/db2-das-info.nse +++ b/scripts/db2-das-info.nse @@ -63,7 +63,7 @@ requested. author = "Patrik Karlsson, Tom Sellers" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery", "version"} diff --git a/scripts/dhcp-discover.nse b/scripts/dhcp-discover.nse index 057c74175..489d14ea0 100644 --- a/scripts/dhcp-discover.nse +++ b/scripts/dhcp-discover.nse @@ -76,7 +76,7 @@ Some of the more useful fields: author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/dict-info.nse b/scripts/dict-info.nse index e313cae86..b03b47318 100644 --- a/scripts/dict-info.nse +++ b/scripts/dict-info.nse @@ -31,7 +31,7 @@ list of databases will not be shown. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/distcc-cve2004-2687.nse b/scripts/distcc-cve2004-2687.nse index a8a7212be..8b9d72820 100644 --- a/scripts/distcc-cve2004-2687.nse +++ b/scripts/distcc-cve2004-2687.nse @@ -41,7 +41,7 @@ present in modern implementation due to poor configuration of the service. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive", "vuln"} diff --git a/scripts/dns-blacklist.nse b/scripts/dns-blacklist.nse index ff666c790..0ffd7f21c 100644 --- a/scripts/dns-blacklist.nse +++ b/scripts/dns-blacklist.nse @@ -67,7 +67,7 @@ PROXY) or to a specific service name. ]] -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"external", "safe"} diff --git a/scripts/dns-brute.nse b/scripts/dns-brute.nse index 06d8b2372..cdb9dcf18 100644 --- a/scripts/dns-brute.nse +++ b/scripts/dns-brute.nse @@ -62,7 +62,7 @@ try to enumerate common DNS SRV records. author = "Cirrus" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "discovery"} diff --git a/scripts/dns-cache-snoop.nse b/scripts/dns-cache-snoop.nse index b0e3e5b24..0f7337ba1 100644 --- a/scripts/dns-cache-snoop.nse +++ b/scripts/dns-cache-snoop.nse @@ -57,7 +57,7 @@ different list. author = "Eugene V. Alexeev" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "discovery"} diff --git a/scripts/dns-check-zone.nse b/scripts/dns-check-zone.nse index fbcbac6cf..7fe56092e 100644 --- a/scripts/dns-check-zone.nse +++ b/scripts/dns-check-zone.nse @@ -48,7 +48,7 @@ of different tests. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} local arg_domain = stdnse.get_script_args(SCRIPT_NAME .. '.domain') diff --git a/scripts/dns-client-subnet-scan.nse b/scripts/dns-client-subnet-scan.nse index 561c8eb18..19d339eb2 100644 --- a/scripts/dns-client-subnet-scan.nse +++ b/scripts/dns-client-subnet-scan.nse @@ -49,7 +49,7 @@ requests using a given subnet. -- author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"discovery", "safe"} diff --git a/scripts/dns-fuzz.nse b/scripts/dns-fuzz.nse index 0a1f32048..89df0e819 100644 --- a/scripts/dns-fuzz.nse +++ b/scripts/dns-fuzz.nse @@ -37,7 +37,7 @@ development lifecycle. -- |_dns-fuzz: Server stopped responding... He's dead, Jim. author = "Michael Pattrick" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"fuzzer", "intrusive"} diff --git a/scripts/dns-ip6-arpa-scan.nse b/scripts/dns-ip6-arpa-scan.nse index 0499082f8..722051aa7 100644 --- a/scripts/dns-ip6-arpa-scan.nse +++ b/scripts/dns-ip6-arpa-scan.nse @@ -34,7 +34,7 @@ http://7bits.nl/blog/2012/03/26/finding-v6-hosts-by-efficiently-mapping-ip6-arpa -- @args mask the ip6 mask to start scanning from author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "discovery"} diff --git a/scripts/dns-nsec-enum.nse b/scripts/dns-nsec-enum.nse index ad094dd96..473137169 100644 --- a/scripts/dns-nsec-enum.nse +++ b/scripts/dns-nsec-enum.nse @@ -45,7 +45,7 @@ servers that use NSEC3 rather than NSEC; for that, see -- |_ vulpix.example.com author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"discovery", "intrusive"} diff --git a/scripts/dns-nsec3-enum.nse b/scripts/dns-nsec3-enum.nse index 44609acf5..02f3ffb04 100644 --- a/scripts/dns-nsec3-enum.nse +++ b/scripts/dns-nsec3-enum.nse @@ -71,7 +71,7 @@ References: -- |_ Total hashes found: 8 author = "Aleksandar Nikolic, John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"discovery", "intrusive"} portrule = shortport.port_or_service(53, "domain", {"tcp", "udp"}) diff --git a/scripts/dns-nsid.nse b/scripts/dns-nsid.nse index 589241699..22b3b8beb 100644 --- a/scripts/dns-nsid.nse +++ b/scripts/dns-nsid.nse @@ -38,7 +38,7 @@ References: -- NSD 3.2.15 author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"discovery", "default"} diff --git a/scripts/dns-random-srcport.nse b/scripts/dns-random-srcport.nse index e4e48607d..df5bd5a89 100644 --- a/scripts/dns-random-srcport.nse +++ b/scripts/dns-random-srcport.nse @@ -18,7 +18,7 @@ server. In addition your IP address will be sent along with the porttest query to the DNS server running on the target. ]] -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" author = [[ Script: Brandon Enright diff --git a/scripts/dns-random-txid.nse b/scripts/dns-random-txid.nse index cd932332a..f91a8f01d 100644 --- a/scripts/dns-random-txid.nse +++ b/scripts/dns-random-txid.nse @@ -18,7 +18,7 @@ server. In addition your IP address will be sent along with the txidtest query to the DNS server running on the target. ]] -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" author = [[ Script: Brandon Enright diff --git a/scripts/dns-recursion.nse b/scripts/dns-recursion.nse index 0ea766ca6..e60c25881 100644 --- a/scripts/dns-recursion.nse +++ b/scripts/dns-recursion.nse @@ -20,7 +20,7 @@ nameservers. author = "Felix Groebert" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/dns-service-discovery.nse b/scripts/dns-service-discovery.nse index c7e4c8a30..8ef649225 100644 --- a/scripts/dns-service-discovery.nse +++ b/scripts/dns-service-discovery.nse @@ -48,7 +48,7 @@ get more information. -- Revised 10/29/2010 - v0.7 - factored out most of the code to dnssd library author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/dns-srv-enum.nse b/scripts/dns-srv-enum.nse index 0007f551b..86dd04291 100644 --- a/scripts/dns-srv-enum.nse +++ b/scripts/dns-srv-enum.nse @@ -59,7 +59,7 @@ The following services are enumerated by the script: -- (default: all) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/dns-update.nse b/scripts/dns-update.nse index ba1d64f1d..c768bf0b3 100644 --- a/scripts/dns-update.nse +++ b/scripts/dns-update.nse @@ -14,7 +14,7 @@ zone configured on your target. ]] author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive"} --- diff --git a/scripts/dns-zeustracker.nse b/scripts/dns-zeustracker.nse index 3a4298e56..1e19a9658 100644 --- a/scripts/dns-zeustracker.nse +++ b/scripts/dns-zeustracker.nse @@ -21,7 +21,7 @@ Please review the following information before you start to scan: -- |_ bar.example.com 1.2.3.5 SBL123456 1234 CN online Bulletproof hosted 0 2011-06-15 author = "Mikael Keri" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery", "external", "malware"} diff --git a/scripts/dns-zone-transfer.nse b/scripts/dns-zone-transfer.nse index a76f04bb5..e61c741b8 100644 --- a/scripts/dns-zone-transfer.nse +++ b/scripts/dns-zone-transfer.nse @@ -84,7 +84,7 @@ Useful resources author = "Eddie Bell" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {'intrusive', 'discovery'} -- DNS options diff --git a/scripts/docker-version.nse b/scripts/docker-version.nse index 511f17dd1..504deea33 100644 --- a/scripts/docker-version.nse +++ b/scripts/docker-version.nse @@ -11,7 +11,7 @@ description = [[Detects the Docker service version.]] -- 2375/tcp open docker Docker 1.1.2 author = "Claudio Criscione" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} portrule = shortport.version_port_or_service({2375, 2376}, {"docker", "docker-s"}, "tcp") diff --git a/scripts/domcon-brute.nse b/scripts/domcon-brute.nse index 0ba83a1d1..99941d4c1 100644 --- a/scripts/domcon-brute.nse +++ b/scripts/domcon-brute.nse @@ -31,7 +31,7 @@ Performs brute force password auditing against the Lotus Domino Console. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/domcon-cmd.nse b/scripts/domcon-cmd.nse index 6b3a61698..cdae66598 100644 --- a/scripts/domcon-cmd.nse +++ b/scripts/domcon-cmd.nse @@ -56,7 +56,7 @@ Runs a console command on the Lotus Domino Console using the given authenticatio -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} diff --git a/scripts/domino-enum-users.nse b/scripts/domino-enum-users.nse index 5cd5b907e..86910363a 100644 --- a/scripts/domino-enum-users.nse +++ b/scripts/domino-enum-users.nse @@ -41,7 +41,7 @@ Attempts to discover valid IBM Lotus Domino users and download their ID files by -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} diff --git a/scripts/dpap-brute.nse b/scripts/dpap-brute.nse index 1007c493e..7961eb406 100644 --- a/scripts/dpap-brute.nse +++ b/scripts/dpap-brute.nse @@ -27,7 +27,7 @@ Performs brute force password auditing against an iPhoto Library. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/drda-brute.nse b/scripts/drda-brute.nse index e4272f95f..0427479d2 100644 --- a/scripts/drda-brute.nse +++ b/scripts/drda-brute.nse @@ -26,7 +26,7 @@ Performs password guessing against databases supporting the IBM DB2 protocol suc -- |_ db2admin:db2admin => Valid credentials author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories={"intrusive", "brute"} diff --git a/scripts/drda-info.nse b/scripts/drda-info.nse index 795c651d4..5c8d80e40 100644 --- a/scripts/drda-info.nse +++ b/scripts/drda-info.nse @@ -22,7 +22,7 @@ command packet and parses the response. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery", "version"} diff --git a/scripts/duplicates.nse b/scripts/duplicates.nse index 1272f2a78..8c3b9f0d0 100644 --- a/scripts/duplicates.nse +++ b/scripts/duplicates.nse @@ -52,7 +52,7 @@ script to analyze the data. -- was for a particular information source. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe"} dependencies = {"ssl-cert", "ssh-hostkey", "nbstat"} diff --git a/scripts/eap-info.nse b/scripts/eap-info.nse index 27237687b..1a04780fc 100644 --- a/scripts/eap-info.nse +++ b/scripts/eap-info.nse @@ -30,7 +30,7 @@ anonymous identity if no argument is passed. -- @args eap-info.timeout Maximum time allowed for the scan (default 10s). Methods not tested because of timeout will be listed as "unknown". author = "Riccardo Cecolin" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "broadcast", "safe" } diff --git a/scripts/enip-info.nse b/scripts/enip-info.nse index 6f5d03b00..c77355741 100644 --- a/scripts/enip-info.nse +++ b/scripts/enip-info.nse @@ -47,7 +47,7 @@ http://digitalbond.com author = "Stephen Hilt (Digital Bond)" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "version"} -- diff --git a/scripts/epmd-info.nse b/scripts/epmd-info.nse index 620461760..e510bc820 100644 --- a/scripts/epmd-info.nse +++ b/scripts/epmd-info.nse @@ -28,7 +28,7 @@ Connects to Erlang Port Mapper Daemon (epmd) and retrieves a list of nodes with -- author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = shortport.port_or_service (4369, "epmd") diff --git a/scripts/eppc-enum-processes.nse b/scripts/eppc-enum-processes.nse index 2d1e3bbd1..d2404c8dd 100644 --- a/scripts/eppc-enum-processes.nse +++ b/scripts/eppc-enum-processes.nse @@ -33,7 +33,7 @@ prior to requesting authentication. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service(3031, "eppc", "tcp", "open") diff --git a/scripts/fcrdns.nse b/scripts/fcrdns.nse index 0086b3458..0edb7c4d9 100644 --- a/scripts/fcrdns.nse +++ b/scripts/fcrdns.nse @@ -62,7 +62,7 @@ References: author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" -- not default, because user may choose -n and expect no DNS categories = {"discovery", "safe"} diff --git a/scripts/finger.nse b/scripts/finger.nse index a8f90456c..88528a39c 100644 --- a/scripts/finger.nse +++ b/scripts/finger.nse @@ -8,7 +8,7 @@ Attempts to retrieve a list of usernames using the finger service. author = "Eddie Bell" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/firewalk.nse b/scripts/firewalk.nse index 9b752ffb8..537f98879 100644 --- a/scripts/firewalk.nse +++ b/scripts/firewalk.nse @@ -72,7 +72,7 @@ firewalk tool. author = "Henri Doreau" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/firewall-bypass.nse b/scripts/firewall-bypass.nse index b477544a5..dde2a9c13 100644 --- a/scripts/firewall-bypass.nse +++ b/scripts/firewall-bypass.nse @@ -43,7 +43,7 @@ For more information, see: author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive"} diff --git a/scripts/flume-master-info.nse b/scripts/flume-master-info.nse index 6723142a7..07017afc5 100644 --- a/scripts/flume-master-info.nse +++ b/scripts/flume-master-info.nse @@ -135,7 +135,7 @@ the Nmap scan queue. -- author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/freelancer-info.nse b/scripts/freelancer-info.nse index af2d16c7b..d8a8836d2 100644 --- a/scripts/freelancer-info.nse +++ b/scripts/freelancer-info.nse @@ -46,7 +46,7 @@ See http://sourceforge.net/projects/gameq/ -- yes author = "Marin Maržić" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "default", "discovery", "safe", "version" } portrule = shortport.version_port_or_service({2302}, "freelancer", "udp") diff --git a/scripts/ftp-anon.nse b/scripts/ftp-anon.nse index 01fdf69de..59b2f1bd1 100644 --- a/scripts/ftp-anon.nse +++ b/scripts/ftp-anon.nse @@ -31,7 +31,7 @@ and highlights writeable files. -- |_Only 6 shown. Use --script-args ftp-anon.maxlist=-1 to see all. author = "Eddie Bell, Rob Nicholls, Ange Gutek, David Fifield" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "auth", "safe"} diff --git a/scripts/ftp-bounce.nse b/scripts/ftp-bounce.nse index c513c3b3b..9c4a00d93 100644 --- a/scripts/ftp-bounce.nse +++ b/scripts/ftp-bounce.nse @@ -7,7 +7,7 @@ description=[[ Checks to see if an FTP server allows port scanning using the FTP bounce method. ]] author = "Marek Majkowski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" --- -- @args ftp-bounce.username Username to log in with. Default diff --git a/scripts/ftp-brute.nse b/scripts/ftp-brute.nse index 1449c1b24..a89030f3a 100644 --- a/scripts/ftp-brute.nse +++ b/scripts/ftp-brute.nse @@ -32,7 +32,7 @@ Based on old ftp-brute.nse script by Diman Todorov, Vlatko Kosturjak and Ron Bow -- having a delayed response on incorrect login attempts. (default: 5s) author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(21, "ftp") diff --git a/scripts/ftp-libopie.nse b/scripts/ftp-libopie.nse index 1ec36dcc0..13f63b2d2 100644 --- a/scripts/ftp-libopie.nse +++ b/scripts/ftp-libopie.nse @@ -6,7 +6,7 @@ local vulns = require "vulns" description = [[ Checks if an FTPd is prone to CVE-2010-1938 (OPIE off-by-one stack overflow), a vulnerability discovered by Maksymilian Arciemowicz and Adam "pi3" Zabrocki. -See the advisory at http://nmap.org/r/fbsd-sa-opie. +See the advisory at https://nmap.org/r/fbsd-sa-opie. Be advised that, if launched against a vulnerable host, this script will crash the FTPd. ]] @@ -34,7 +34,7 @@ Be advised that, if launched against a vulnerable host, this script will crash t author = "Ange Gutek" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln","intrusive"} diff --git a/scripts/ftp-proftpd-backdoor.nse b/scripts/ftp-proftpd-backdoor.nse index c3b655986..0ea5e06de 100644 --- a/scripts/ftp-proftpd-backdoor.nse +++ b/scripts/ftp-proftpd-backdoor.nse @@ -30,7 +30,7 @@ Tests for the presence of the ProFTPD 1.3.3c backdoor reported as OSVDB-ID -- |_ author = "Mak Kolybabi" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive", "malware", "vuln"} diff --git a/scripts/ftp-vsftpd-backdoor.nse b/scripts/ftp-vsftpd-backdoor.nse index 8e3ab29ed..18c127fd8 100644 --- a/scripts/ftp-vsftpd-backdoor.nse +++ b/scripts/ftp-vsftpd-backdoor.nse @@ -50,7 +50,7 @@ References: -- author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive", "malware", "vuln"} diff --git a/scripts/ftp-vuln-cve2010-4221.nse b/scripts/ftp-vuln-cve2010-4221.nse index 502a262a8..b117cb105 100644 --- a/scripts/ftp-vuln-cve2010-4221.nse +++ b/scripts/ftp-vuln-cve2010-4221.nse @@ -46,7 +46,7 @@ Reference: -- author = "Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/ganglia-info.nse b/scripts/ganglia-info.nse index 31db88603..a035105c3 100644 --- a/scripts/ganglia-info.nse +++ b/scripts/ganglia-info.nse @@ -123,7 +123,7 @@ For more information about Ganglia, see: -- Created 2015-07-30 - v0.2 - Added Support for SLAXML by Gyanendra Mishra author = {"Brendan Coles", "Gyanendra Mishra"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = shortport.port_or_service ({8649,8651}, "ganglia", {"tcp"}) diff --git a/scripts/giop-info.nse b/scripts/giop-info.nse index 8deebf030..c4aabd2c2 100644 --- a/scripts/giop-info.nse +++ b/scripts/giop-info.nse @@ -7,7 +7,7 @@ Queries a CORBA naming server for a list of objects. ]] author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} --- diff --git a/scripts/gkrellm-info.nse b/scripts/gkrellm-info.nse index 2bd13af03..8a6b1fe50 100644 --- a/scripts/gkrellm-info.nse +++ b/scripts/gkrellm-info.nse @@ -46,7 +46,7 @@ request. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/gopher-ls.nse b/scripts/gopher-ls.nse index a24d8c58e..07c521a63 100644 --- a/scripts/gopher-ls.nse +++ b/scripts/gopher-ls.nse @@ -25,7 +25,7 @@ Lists files and directories at the root of a gopher service. author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/gpsd-info.nse b/scripts/gpsd-info.nse index 7c421d0e9..20e85fa03 100644 --- a/scripts/gpsd-info.nse +++ b/scripts/gpsd-info.nse @@ -24,7 +24,7 @@ Retrieves GPS time, coordinates and speed from the GPSD network daemon. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/hadoop-datanode-info.nse b/scripts/hadoop-datanode-info.nse index ba081c4a9..97af4bf25 100644 --- a/scripts/hadoop-datanode-info.nse +++ b/scripts/hadoop-datanode-info.nse @@ -26,7 +26,7 @@ Information gathered: author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hadoop-jobtracker-info.nse b/scripts/hadoop-jobtracker-info.nse index 80a304433..253bb3e9b 100644 --- a/scripts/hadoop-jobtracker-info.nse +++ b/scripts/hadoop-jobtracker-info.nse @@ -58,7 +58,7 @@ Information gathered: author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hadoop-namenode-info.nse b/scripts/hadoop-namenode-info.nse index 1b678388a..5433d8871 100644 --- a/scripts/hadoop-namenode-info.nse +++ b/scripts/hadoop-namenode-info.nse @@ -61,7 +61,7 @@ Information gathered: author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hadoop-secondary-namenode-info.nse b/scripts/hadoop-secondary-namenode-info.nse index b6262862f..3b7e706a2 100644 --- a/scripts/hadoop-secondary-namenode-info.nse +++ b/scripts/hadoop-secondary-namenode-info.nse @@ -48,7 +48,7 @@ Information gathered: -- 12345678 MB author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hadoop-tasktracker-info.nse b/scripts/hadoop-tasktracker-info.nse index fc6b8b47a..3f60feb52 100644 --- a/scripts/hadoop-tasktracker-info.nse +++ b/scripts/hadoop-tasktracker-info.nse @@ -31,7 +31,7 @@ Information gathered: author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hbase-master-info.nse b/scripts/hbase-master-info.nse index 31dd3ad62..3892855d0 100644 --- a/scripts/hbase-master-info.nse +++ b/scripts/hbase-master-info.nse @@ -51,7 +51,7 @@ Information gathered: author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hbase-region-info.nse b/scripts/hbase-region-info.nse index 88ea748a2..d710bdb3d 100644 --- a/scripts/hbase-region-info.nse +++ b/scripts/hbase-region-info.nse @@ -33,7 +33,7 @@ Information gathered: author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"default", "discovery", "safe"} diff --git a/scripts/hddtemp-info.nse b/scripts/hddtemp-info.nse index 18abe393d..ec867b41a 100644 --- a/scripts/hddtemp-info.nse +++ b/scripts/hddtemp-info.nse @@ -33,7 +33,7 @@ Reads hard disk information (such as brand, model, and sometimes temperature) fr -- author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/hnap-info.nse b/scripts/hnap-info.nse index 55e19420e..97e0fad74 100644 --- a/scripts/hnap-info.nse +++ b/scripts/hnap-info.nse @@ -51,7 +51,7 @@ configuration, and management of devices (routers, cameras, PCs, NAS, etc.)]] ----------------------------------------------------------------------- author = "Gyanendra Mishra" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "safe", "discovery", diff --git a/scripts/hostmap-bfk.nse b/scripts/hostmap-bfk.nse index f22ac84e6..9490fc6b1 100644 --- a/scripts/hostmap-bfk.nse +++ b/scripts/hostmap-bfk.nse @@ -60,7 +60,7 @@ This script was formerly (until April 2012) known as hostmap.nse. author = "Ange Gutek" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"external", "discovery", "intrusive"} diff --git a/scripts/hostmap-ip2hosts.nse b/scripts/hostmap-ip2hosts.nse index a870aa01c..a9f781894 100644 --- a/scripts/hostmap-ip2hosts.nse +++ b/scripts/hostmap-ip2hosts.nse @@ -40,7 +40,7 @@ The script is in the "external" category because it sends target IPs to a third author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"external", "discovery"} diff --git a/scripts/hostmap-robtex.nse b/scripts/hostmap-robtex.nse index 9a0166e6f..b6f06098b 100644 --- a/scripts/hostmap-robtex.nse +++ b/scripts/hostmap-robtex.nse @@ -24,7 +24,7 @@ Discovers hostnames that resolve to the target's IP address by querying the onli --- author = "Arturo 'Buanzo' Busleiman" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery", "safe", diff --git a/scripts/http-adobe-coldfusion-apsa1301.nse b/scripts/http-adobe-coldfusion-apsa1301.nse index d9d3e188b..d69479576 100644 --- a/scripts/http-adobe-coldfusion-apsa1301.nse +++ b/scripts/http-adobe-coldfusion-apsa1301.nse @@ -21,7 +21,7 @@ Reference: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "vuln"} local http = require "http" diff --git a/scripts/http-affiliate-id.nse b/scripts/http-affiliate-id.nse index c4a212ea9..4fd325e47 100644 --- a/scripts/http-affiliate-id.nse +++ b/scripts/http-affiliate-id.nse @@ -44,7 +44,7 @@ Supported IDs: author = "Hani Benhabiles, Daniel Miller, Patrick Donnelly" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/http-apache-negotiation.nse b/scripts/http-apache-negotiation.nse index dfef62e62..42b79157d 100644 --- a/scripts/http-apache-negotiation.nse +++ b/scripts/http-apache-negotiation.nse @@ -34,7 +34,7 @@ For more information, see: author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/http-auth-finder.nse b/scripts/http-auth-finder.nse index 946c995aa..e899717eb 100644 --- a/scripts/http-auth-finder.nse +++ b/scripts/http-auth-finder.nse @@ -37,7 +37,7 @@ detected method. -- not be used in combination. (default: false) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-auth.nse b/scripts/http-auth.nse index 50f498370..7281adb83 100644 --- a/scripts/http-auth.nse +++ b/scripts/http-auth.nse @@ -54,7 +54,7 @@ authentication. author = "Thomas Buchanan" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "auth", "safe"} diff --git a/scripts/http-avaya-ipoffice-users.nse b/scripts/http-avaya-ipoffice-users.nse index 0ab0f44df..61ca62928 100644 --- a/scripts/http-avaya-ipoffice-users.nse +++ b/scripts/http-avaya-ipoffice-users.nse @@ -25,7 +25,7 @@ extension number. -- |_ data_source: IPOFFICE/7.0(27) xxx.xxx.xxx.xxx author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln"} local http = require "http" diff --git a/scripts/http-awstatstotals-exec.nse b/scripts/http-awstatstotals-exec.nse index a64287101..7c1e73d1c 100644 --- a/scripts/http-awstatstotals-exec.nse +++ b/scripts/http-awstatstotals-exec.nse @@ -46,7 +46,7 @@ References: -- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive", "exploit"} diff --git a/scripts/http-axis2-dir-traversal.nse b/scripts/http-axis2-dir-traversal.nse index 051243e49..1fac104b6 100644 --- a/scripts/http-axis2-dir-traversal.nse +++ b/scripts/http-axis2-dir-traversal.nse @@ -44,7 +44,7 @@ Reference: -- @args http-axis2-dir-traversal.basepath Basepath to the services page. Default: /axis2/services/ author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive", "exploit"} diff --git a/scripts/http-backup-finder.nse b/scripts/http-backup-finder.nse index 362d3a619..b758559a0 100644 --- a/scripts/http-backup-finder.nse +++ b/scripts/http-backup-finder.nse @@ -40,7 +40,7 @@ It does so by requesting a number of different combinations of the filename (eg. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-barracuda-dir-traversal.nse b/scripts/http-barracuda-dir-traversal.nse index 48fb11103..e321ccfeb 100644 --- a/scripts/http-barracuda-dir-traversal.nse +++ b/scripts/http-barracuda-dir-traversal.nse @@ -77,7 +77,7 @@ http://www.exploit-db.com/exploits/15130/ -- author = "Brendan Coles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "exploit", "auth"} diff --git a/scripts/http-brute.nse b/scripts/http-brute.nse index 37dbf2644..53bb09fcb 100644 --- a/scripts/http-brute.nse +++ b/scripts/http-brute.nse @@ -58,7 +58,7 @@ Performs brute force password auditing against http basic, digest and ntlm authe author = {"Patrik Karlsson", "Piotr Olma", "Gyanendra Mishra"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/http-cakephp-version.nse b/scripts/http-cakephp-version.nse index f0f33c570..a7e320c25 100644 --- a/scripts/http-cakephp-version.nse +++ b/scripts/http-cakephp-version.nse @@ -27,7 +27,7 @@ For more information about CakePHP visit: http://www.cakephp.org/. -- | Version of stylesheet: 1.2.6 author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","safe"} local http = require "http" diff --git a/scripts/http-chrono.nse b/scripts/http-chrono.nse index b1a28ee21..897ae1e01 100644 --- a/scripts/http-chrono.nse +++ b/scripts/http-chrono.nse @@ -58,7 +58,7 @@ the target server. This script could help identifying these web pages. author = "Ange Gutek" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-cisco-anyconnect.nse b/scripts/http-cisco-anyconnect.nse index 80fa77640..381b1c860 100644 --- a/scripts/http-cisco-anyconnect.nse +++ b/scripts/http-cisco-anyconnect.nse @@ -31,7 +31,7 @@ and tunnel information. -- author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = function(host, port) diff --git a/scripts/http-coldfusion-subzero.nse b/scripts/http-coldfusion-subzero.nse index ef70bd15a..908b33692 100644 --- a/scripts/http-coldfusion-subzero.nse +++ b/scripts/http-coldfusion-subzero.nse @@ -29,7 +29,7 @@ This was based on the exploit 'ColdSub-Zero.pyFusion v2'. --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit"} local http = require "http" diff --git a/scripts/http-comments-displayer.nse b/scripts/http-comments-displayer.nse index ce001ad3a..11e212084 100644 --- a/scripts/http-comments-displayer.nse +++ b/scripts/http-comments-displayer.nse @@ -35,7 +35,7 @@ Extracts and outputs HTML and JavaScript comments from HTTP responses. categories = {"discovery", "safe"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local shortport = require "shortport" diff --git a/scripts/http-config-backup.nse b/scripts/http-config-backup.nse index 04cdae5b0..0fb85889d 100644 --- a/scripts/http-config-backup.nse +++ b/scripts/http-config-backup.nse @@ -59,7 +59,7 @@ http://www.feross.org/cmsploit/. -- author = "Riccardo Cecolin"; -license = "Same as Nmap--See http://nmap.org/book/man-legal.html"; +license = "Same as Nmap--See https://nmap.org/book/man-legal.html"; categories = { "auth", "intrusive" }; diff --git a/scripts/http-cors.nse b/scripts/http-cors.nse index 9c1c6fd23..835e360fa 100644 --- a/scripts/http-cors.nse +++ b/scripts/http-cors.nse @@ -30,7 +30,7 @@ the responses. author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/http-cross-domain-policy.nse b/scripts/http-cross-domain-policy.nse index 0dcc723cf..28b9a8a71 100644 --- a/scripts/http-cross-domain-policy.nse +++ b/scripts/http-cross-domain-policy.nse @@ -134,7 +134,7 @@ References: --- author = {"Seth Art ", "Paulino Calderon ", "Gyanendra Mishra"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "external", "vuln"} portrule = shortport.http diff --git a/scripts/http-csrf.nse b/scripts/http-csrf.nse index 125645455..9a8f87906 100644 --- a/scripts/http-csrf.nse +++ b/scripts/http-csrf.nse @@ -47,7 +47,7 @@ exist. See the http library's documentation to set your own cookie. categories = {"intrusive", "exploit", "vuln"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local formulas = require "formulas" diff --git a/scripts/http-date.nse b/scripts/http-date.nse index 8889d0bd4..5f5032861 100644 --- a/scripts/http-date.nse +++ b/scripts/http-date.nse @@ -23,7 +23,7 @@ sent, so the difference includes at least the duration of one RTT. author = "David Fifield" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-default-accounts.nse b/scripts/http-default-accounts.nse index beeff9a2e..94264aa99 100644 --- a/scripts/http-default-accounts.nse +++ b/scripts/http-default-accounts.nse @@ -56,7 +56,7 @@ This script was based on http-enum. --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "auth", "intrusive"} portrule = shortport.http diff --git a/scripts/http-devframework.nse b/scripts/http-devframework.nse index 27aa749f4..531af358d 100644 --- a/scripts/http-devframework.nse +++ b/scripts/http-devframework.nse @@ -39,7 +39,7 @@ Note that the consumingDetect callback will not take place only if categories = {"discovery", "intrusive"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local nmap = require "nmap" local shortport = require "shortport" diff --git a/scripts/http-dlink-backdoor.nse b/scripts/http-dlink-backdoor.nse index 9df9ba9ec..4b8ca5505 100644 --- a/scripts/http-dlink-backdoor.nse +++ b/scripts/http-dlink-backdoor.nse @@ -32,7 +32,7 @@ Reference: http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor --- author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln"} local http = require "http" diff --git a/scripts/http-dombased-xss.nse b/scripts/http-dombased-xss.nse index 2a22c9b1c..9f7d9cae9 100644 --- a/scripts/http-dombased-xss.nse +++ b/scripts/http-dombased-xss.nse @@ -35,7 +35,7 @@ http://www.webappsec.org/projects/articles/071105.shtml categories = {"intrusive", "exploit", "vuln"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local shortport = require "shortport" diff --git a/scripts/http-domino-enum-passwords.nse b/scripts/http-domino-enum-passwords.nse index 738645119..fa7adb032 100644 --- a/scripts/http-domino-enum-passwords.nse +++ b/scripts/http-domino-enum-passwords.nse @@ -83,7 +83,7 @@ and password or indirectly from results of http-brute or http-form-brute. -- Revised 04/16/2015 - v0.4 - switched to 'creds' credential repository author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} dependencies = {"http-brute", "http-form-brute"} diff --git a/scripts/http-drupal-enum-users.nse b/scripts/http-drupal-enum-users.nse index 739c6c3ed..c1cca2784 100644 --- a/scripts/http-drupal-enum-users.nse +++ b/scripts/http-drupal-enum-users.nse @@ -32,7 +32,7 @@ For more information,see: -- @args http-drupal-enum-users.root base path. Defaults to "/" author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-drupal-enum.nse b/scripts/http-drupal-enum.nse index e561022f5..e6908b669 100644 --- a/scripts/http-drupal-enum.nse +++ b/scripts/http-drupal-enum.nse @@ -72,7 +72,7 @@ author = { "Gyanendra Mishra", } -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery", diff --git a/scripts/http-enum.nse b/scripts/http-enum.nse index 2a0826853..0e4ac50a8 100644 --- a/scripts/http-enum.nse +++ b/scripts/http-enum.nse @@ -75,7 +75,7 @@ database can specify their own criteria for accepting a page as valid. author = "Ron Bowes, Andrew Orr, Rob Nicholls" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive", "vuln"} diff --git a/scripts/http-errors.nse b/scripts/http-errors.nse index c68279903..4907d2e73 100644 --- a/scripts/http-errors.nse +++ b/scripts/http-errors.nse @@ -35,7 +35,7 @@ Please, note that the script will become more intrusive though. categories = {"discovery", "intrusive"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local shortport = require "shortport" local stdnse = require "stdnse" diff --git a/scripts/http-exif-spider.nse b/scripts/http-exif-spider.nse index 56c56bcbc..d5e265d40 100644 --- a/scripts/http-exif-spider.nse +++ b/scripts/http-exif-spider.nse @@ -23,7 +23,7 @@ taken, and the embedded geotag information. -- relative to the scanned host eg. /default.html (default: /) author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} local shortport = require 'shortport' diff --git a/scripts/http-favicon.nse b/scripts/http-favicon.nse index f6bcee252..bca4b9a26 100644 --- a/scripts/http-favicon.nse +++ b/scripts/http-favicon.nse @@ -38,7 +38,7 @@ a favicon points to a different host or port, it is ignored. author = "Vlatko Kosturjak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/http-feed.nse b/scripts/http-feed.nse index 903b7530c..18194e8a7 100644 --- a/scripts/http-feed.nse +++ b/scripts/http-feed.nse @@ -24,7 +24,7 @@ Please, note that the script will become more intrusive though. categories = {"discovery", "intrusive"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local shortport = require "shortport" diff --git a/scripts/http-fetch.nse b/scripts/http-fetch.nse index 767970d2f..051913fa1 100644 --- a/scripts/http-fetch.nse +++ b/scripts/http-fetch.nse @@ -62,7 +62,7 @@ The script supports three different use cases : author = "Gyanendra Mishra" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe"} diff --git a/scripts/http-fileupload-exploiter.nse b/scripts/http-fileupload-exploiter.nse index 01b3fd59d..53e2d06b7 100644 --- a/scripts/http-fileupload-exploiter.nse +++ b/scripts/http-fileupload-exploiter.nse @@ -52,7 +52,7 @@ payload in the comment. categories = {"intrusive", "exploit", "vuln"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local io = require "io" diff --git a/scripts/http-form-brute.nse b/scripts/http-form-brute.nse index c907cc2f0..f0a027812 100644 --- a/scripts/http-form-brute.nse +++ b/scripts/http-form-brute.nse @@ -93,7 +93,7 @@ the following rules: -- author = "Patrik Karlsson, nnposter" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/http-form-fuzzer.nse b/scripts/http-form-fuzzer.nse index f4cf4fbc6..bc2972d33 100644 --- a/scripts/http-form-fuzzer.nse +++ b/scripts/http-form-fuzzer.nse @@ -48,7 +48,7 @@ determine if the fuzzing was successful. -- author = "Piotr Olma, Gioacchino Mazzurco" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"fuzzer", "intrusive"} local shortport = require 'shortport' diff --git a/scripts/http-frontpage-login.nse b/scripts/http-frontpage-login.nse index 81cac37af..4fc3ac237 100644 --- a/scripts/http-frontpage-login.nse +++ b/scripts/http-frontpage-login.nse @@ -35,7 +35,7 @@ remote user to login anonymously which may lead to server compromise. author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} diff --git a/scripts/http-generator.nse b/scripts/http-generator.nse index 214781ab9..f1645c873 100644 --- a/scripts/http-generator.nse +++ b/scripts/http-generator.nse @@ -9,7 +9,7 @@ if there is one. ]] author = "Michael Kohl" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} --- diff --git a/scripts/http-git.nse b/scripts/http-git.nse index bae0f81ef..a9b517c2f 100644 --- a/scripts/http-git.nse +++ b/scripts/http-git.nse @@ -54,7 +54,7 @@ message, and repository description. categories = { "default", "safe", "vuln" } author = "Alex Weber" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" portrule = shortport.http -- We consider 200 to mean "okay, file exists and we received its contents". diff --git a/scripts/http-gitweb-projects-enum.nse b/scripts/http-gitweb-projects-enum.nse index a9ceb6244..1af0d7ce1 100644 --- a/scripts/http-gitweb-projects-enum.nse +++ b/scripts/http-gitweb-projects-enum.nse @@ -29,7 +29,7 @@ Retrieves a list of Git projects, owners and descriptions from a gitweb (web int -- (default: /) author = "riemann" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-google-malware.nse b/scripts/http-google-malware.nse index 01cd8dff2..1cb6d1f15 100644 --- a/scripts/http-google-malware.nse +++ b/scripts/http-google-malware.nse @@ -34,7 +34,7 @@ http://code.google.com/apis/safebrowsing/key_signup.html --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"malware", "discovery", "safe", "external"} diff --git a/scripts/http-grep.nse b/scripts/http-grep.nse index b368316ed..2d5d9fa08 100644 --- a/scripts/http-grep.nse +++ b/scripts/http-grep.nse @@ -120,7 +120,7 @@ The script searches for email and ip by default. -- author = {"Patrik Karlsson", "Gyanendra Mishra"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-headers.nse b/scripts/http-headers.nse index 22bd778b9..e6eb9aa33 100644 --- a/scripts/http-headers.nse +++ b/scripts/http-headers.nse @@ -27,7 +27,7 @@ Performs a HEAD request for the root folder ("/") of a web server and displays t author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-huawei-hg5xx-vuln.nse b/scripts/http-huawei-hg5xx-vuln.nse index 863835b25..e2361b9e8 100644 --- a/scripts/http-huawei-hg5xx-vuln.nse +++ b/scripts/http-huawei-hg5xx-vuln.nse @@ -54,7 +54,7 @@ References: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln"} local http = require "http" diff --git a/scripts/http-icloud-findmyiphone.nse b/scripts/http-icloud-findmyiphone.nse index 27db4de9a..08ddc3705 100644 --- a/scripts/http-icloud-findmyiphone.nse +++ b/scripts/http-icloud-findmyiphone.nse @@ -25,7 +25,7 @@ the MobileMe web service (authentication required). -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} diff --git a/scripts/http-icloud-sendmsg.nse b/scripts/http-icloud-sendmsg.nse index 010e223f6..2db5cc64b 100644 --- a/scripts/http-icloud-sendmsg.nse +++ b/scripts/http-icloud-sendmsg.nse @@ -32,7 +32,7 @@ application. -- played while displaying the message. (default: true) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} diff --git a/scripts/http-iis-short-name-brute.nse b/scripts/http-iis-short-name-brute.nse index 775caa192..f66f4a2a3 100644 --- a/scripts/http-iis-short-name-brute.nse +++ b/scripts/http-iis-short-name-brute.nse @@ -46,7 +46,7 @@ References: --- author = "Jesper Kueckelhahn, Paulino Calderon" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} local stdnse = require "stdnse" diff --git a/scripts/http-iis-webdav-vuln.nse b/scripts/http-iis-webdav-vuln.nse index e78aad6ca..8edd25d25 100644 --- a/scripts/http-iis-webdav-vuln.nse +++ b/scripts/http-iis-webdav-vuln.nse @@ -9,7 +9,7 @@ description = [[ Checks for a vulnerability in IIS 5.1/6.0 that allows arbitrary users to access secured WebDAV folders by searching for a password-protected folder and attempting to access it. This vulnerability was patched in Microsoft Security -Bulletin MS09-020, http://nmap.org/r/ms09-020. +Bulletin MS09-020, https://nmap.org/r/ms09-020. A list of well known folders (almost 900) is used by default. Each one is checked, and if returns an authentication request (401), another attempt is @@ -41,7 +41,7 @@ For more information on this vulnerability and script, see: ----------------------------------------------------------------------- author = "Ron Bowes, Andrew Orr" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive"} diff --git a/scripts/http-joomla-brute.nse b/scripts/http-joomla-brute.nse index 6e286fd2b..988e77e63 100644 --- a/scripts/http-joomla-brute.nse +++ b/scripts/http-joomla-brute.nse @@ -54,7 +54,7 @@ Joomla's default uri and form names: -- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} @@ -69,7 +69,7 @@ local security_token local session_cookie_str --- ---This class implements the Brute library (http://nmap.org/nsedoc/lib/brute.html) +--This class implements the Brute library (https://nmap.org/nsedoc/lib/brute.html) --- Driver = { new = function(self, host, port, options) diff --git a/scripts/http-litespeed-sourcecode-download.nse b/scripts/http-litespeed-sourcecode-download.nse index ce3774ab5..c8487edeb 100644 --- a/scripts/http-litespeed-sourcecode-download.nse +++ b/scripts/http-litespeed-sourcecode-download.nse @@ -38,7 +38,7 @@ References: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive", "exploit"} diff --git a/scripts/http-ls.nse b/scripts/http-ls.nse index 95a89b8c2..923d009fa 100644 --- a/scripts/http-ls.nse +++ b/scripts/http-ls.nse @@ -13,7 +13,7 @@ TODO: ]] author = "Pierre Lalet" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} --- diff --git a/scripts/http-majordomo2-dir-traversal.nse b/scripts/http-majordomo2-dir-traversal.nse index 534b7aefb..165efa6e8 100644 --- a/scripts/http-majordomo2-dir-traversal.nse +++ b/scripts/http-majordomo2-dir-traversal.nse @@ -37,7 +37,7 @@ For more information about this vulnerability: -- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln", "exploit"} diff --git a/scripts/http-malware-host.nse b/scripts/http-malware-host.nse index ff08985f4..99d868ffa 100644 --- a/scripts/http-malware-host.nse +++ b/scripts/http-malware-host.nse @@ -30,7 +30,7 @@ technique! author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"malware", "safe"} diff --git a/scripts/http-method-tamper.nse b/scripts/http-method-tamper.nse index fa6c086a7..a7f891847 100644 --- a/scripts/http-method-tamper.nse +++ b/scripts/http-method-tamper.nse @@ -53,7 +53,7 @@ References: author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "vuln"} diff --git a/scripts/http-methods.nse b/scripts/http-methods.nse index 6297249f7..f153727a5 100644 --- a/scripts/http-methods.nse +++ b/scripts/http-methods.nse @@ -57,7 +57,7 @@ only the potentially risky methods are shown. author = {"Bernd Stroessenreuther ", "Gyanendra Mishra"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/http-mobileversion-checker.nse b/scripts/http-mobileversion-checker.nse index 49a66eb49..261edb4b1 100644 --- a/scripts/http-mobileversion-checker.nse +++ b/scripts/http-mobileversion-checker.nse @@ -22,7 +22,7 @@ Checks if the website holds a mobile version. categories = {"discovery", "safe"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local target = require "target" diff --git a/scripts/http-ntlm-info.nse b/scripts/http-ntlm-info.nse index 76fcf0084..813b40397 100644 --- a/scripts/http-ntlm-info.nse +++ b/scripts/http-ntlm-info.nse @@ -46,7 +46,7 @@ available. author = "Justin Cacak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/http-open-proxy.nse b/scripts/http-open-proxy.nse index 38d83baff..21b78462d 100644 --- a/scripts/http-open-proxy.nse +++ b/scripts/http-open-proxy.nse @@ -42,7 +42,7 @@ the target to retrieve a web page from www.google.com. -- * If google is used, script checks for Server: gws author = "Arturo 'Buanzo' Busleiman" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "external", "safe"} --- Performs the custom test, with user's arguments diff --git a/scripts/http-open-redirect.nse b/scripts/http-open-redirect.nse index ac47f419e..707dfccc3 100644 --- a/scripts/http-open-redirect.nse +++ b/scripts/http-open-redirect.nse @@ -36,7 +36,7 @@ responds with a http redirect (3XX) to the target. Risks of open redirects are -- author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-passwd.nse b/scripts/http-passwd.nse index 73efd377d..a45d1f21b 100644 --- a/scripts/http-passwd.nse +++ b/scripts/http-passwd.nse @@ -62,7 +62,7 @@ The script uses several technique: author = "Kris Katterjohn, Ange Gutek" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/http-php-version.nse b/scripts/http-php-version.nse index b38607eac..c124b4344 100644 --- a/scripts/http-php-version.nse +++ b/scripts/http-php-version.nse @@ -34,7 +34,7 @@ Link: -- if the http code is 200 (ok), proceed. (thanks to Tom Sellers who has reported this lack of check) author = "Ange Gutek, Rob Nicholls" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-phpmyadmin-dir-traversal.nse b/scripts/http-phpmyadmin-dir-traversal.nse index c987eb074..5103870dc 100644 --- a/scripts/http-phpmyadmin-dir-traversal.nse +++ b/scripts/http-phpmyadmin-dir-traversal.nse @@ -67,7 +67,7 @@ Reference: -- | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299 -- |_ http://www.exploit-db.com/exploits/1244/ author = "Alexey Meshcheryakov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "exploit"} portrule = shortport.http diff --git a/scripts/http-phpself-xss.nse b/scripts/http-phpself-xss.nse index e2f009ef6..5fb1312d0 100644 --- a/scripts/http-phpself-xss.nse +++ b/scripts/http-phpself-xss.nse @@ -48,7 +48,7 @@ The attack vector/probe used is: /'"/> -- @args http-phpself-xss.uri URI. Default: / -- @args http-phpself-xss.timeout Spidering timeout. (default 10s) author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"fuzzer", "intrusive", "vuln"} local http = require 'http' diff --git a/scripts/http-proxy-brute.nse b/scripts/http-proxy-brute.nse index 62711c7f8..c14794357 100644 --- a/scripts/http-proxy-brute.nse +++ b/scripts/http-proxy-brute.nse @@ -28,7 +28,7 @@ Performs brute force password guessing against HTTP proxy servers. -- brute force guessing (default: HEAD) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" -- maybe the script does not need to be in the external category -- as most request should not "leave" the proxy. diff --git a/scripts/http-put.nse b/scripts/http-put.nse index ea83d012e..76bb34044 100644 --- a/scripts/http-put.nse +++ b/scripts/http-put.nse @@ -29,7 +29,7 @@ Uploads a local file to a remote web server using the HTTP PUT method. You must -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-qnap-nas-info.nse b/scripts/http-qnap-nas-info.nse index aba345d3e..a500267a4 100644 --- a/scripts/http-qnap-nas-info.nse +++ b/scripts/http-qnap-nas-info.nse @@ -39,7 +39,7 @@ QNAP Network Attached Storage (NAS) device. -- author = "Brendan Coles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe","discovery"} diff --git a/scripts/http-referer-checker.nse b/scripts/http-referer-checker.nse index f41fd28ff..048fdd6b2 100644 --- a/scripts/http-referer-checker.nse +++ b/scripts/http-referer-checker.nse @@ -22,7 +22,7 @@ third-party entities. categories = {"discovery", "safe"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local shortport = require "shortport" local stdnse = require "stdnse" diff --git a/scripts/http-rfi-spider.nse b/scripts/http-rfi-spider.nse index 9bd089248..9bd42e924 100644 --- a/scripts/http-rfi-spider.nse +++ b/scripts/http-rfi-spider.nse @@ -37,7 +37,7 @@ query. -- author = "Piotr Olma" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} local shortport = require 'shortport' diff --git a/scripts/http-robots.txt.nse b/scripts/http-robots.txt.nse index adca42b15..bc5632aa6 100644 --- a/scripts/http-robots.txt.nse +++ b/scripts/http-robots.txt.nse @@ -25,7 +25,7 @@ The higher the verbosity or debug level, the more disallowed entries are shown. author = "Eddie Bell" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = shortport.http diff --git a/scripts/http-robtex-reverse-ip.nse b/scripts/http-robtex-reverse-ip.nse index 481471d79..7a7865f55 100644 --- a/scripts/http-robtex-reverse-ip.nse +++ b/scripts/http-robtex-reverse-ip.nse @@ -37,7 +37,7 @@ Obtains up to 100 forward DNS names for a target IP address by querying the Robt -- author = "riemann" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} diff --git a/scripts/http-robtex-shared-ns.nse b/scripts/http-robtex-shared-ns.nse index 99e61cd90..8bbfcccf9 100644 --- a/scripts/http-robtex-shared-ns.nse +++ b/scripts/http-robtex-shared-ns.nse @@ -27,7 +27,7 @@ The target must be specified by DNS name, not IP address. -- author = "Arturo 'Buanzo' Busleiman" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "external"} local function unescape(s) diff --git a/scripts/http-server-header.nse b/scripts/http-server-header.nse index 653a925df..9ea75580c 100644 --- a/scripts/http-server-header.nse +++ b/scripts/http-server-header.nse @@ -28,7 +28,7 @@ correctly. -- author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} portrule = function(host, port) diff --git a/scripts/http-shellshock.nse b/scripts/http-shellshock.nse index 9d1ebd35d..636f6a432 100644 --- a/scripts/http-shellshock.nse +++ b/scripts/http-shellshock.nse @@ -73,7 +73,7 @@ References: -- @args http-shellshock.cmd Custom command to send inside payload. Default: nil --- author = {"Paulino Calderon "} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln","intrusive"} portrule = shortport.http diff --git a/scripts/http-sitemap-generator.nse b/scripts/http-sitemap-generator.nse index 836d443fa..d8d3d180c 100644 --- a/scripts/http-sitemap-generator.nse +++ b/scripts/http-sitemap-generator.nse @@ -44,7 +44,7 @@ are a root document. -- author = "Piotr Olma" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} local shortport = require 'shortport' diff --git a/scripts/http-slowloris-check.nse b/scripts/http-slowloris-check.nse index dde03a17b..5c749d7f1 100644 --- a/scripts/http-slowloris-check.nse +++ b/scripts/http-slowloris-check.nse @@ -58,7 +58,7 @@ Idea from Qualys blogpost: -- |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} diff --git a/scripts/http-slowloris.nse b/scripts/http-slowloris.nse index 0e01543dc..d184b1862 100644 --- a/scripts/http-slowloris.nse +++ b/scripts/http-slowloris.nse @@ -54,7 +54,7 @@ when run from Windows. -- |_ and 441 sent queries author = "Aleksandar Nikolic, Ange Gutek" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"dos", "intrusive"} diff --git a/scripts/http-sql-injection.nse b/scripts/http-sql-injection.nse index efe54ed64..760b5fefa 100644 --- a/scripts/http-sql-injection.nse +++ b/scripts/http-sql-injection.nse @@ -25,7 +25,7 @@ virtually hosted sites. author = "Eddie Bell, Piotr Olma" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} --- diff --git a/scripts/http-stored-xss.nse b/scripts/http-stored-xss.nse index da1a3de27..a484e53e6 100644 --- a/scripts/http-stored-xss.nse +++ b/scripts/http-stored-xss.nse @@ -54,7 +54,7 @@ strings to determine whether the payloads were successful. categories = {"intrusive", "exploit", "vuln"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local io = require "io" diff --git a/scripts/http-svn-enum.nse b/scripts/http-svn-enum.nse index 10dfef1da..24730f92b 100644 --- a/scripts/http-svn-enum.nse +++ b/scripts/http-svn-enum.nse @@ -52,7 +52,7 @@ description = [[Enumerates users of a Subversion repository by examining logs of author = "Gyanendra Mishra" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/http-svn-info.nse b/scripts/http-svn-info.nse index b7a70ad3c..e6c576e53 100644 --- a/scripts/http-svn-info.nse +++ b/scripts/http-svn-info.nse @@ -41,7 +41,7 @@ description = [[Requests information from a Subversion repository. author = "Gyanendra Mishra" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/http-title.nse b/scripts/http-title.nse index 1e30c4d89..d26daa62e 100644 --- a/scripts/http-title.nse +++ b/scripts/http-title.nse @@ -26,7 +26,7 @@ http library. author = "Diman Todorov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/http-tplink-dir-traversal.nse b/scripts/http-tplink-dir-traversal.nse index 2aac55d4f..f3a59a8ad 100644 --- a/scripts/http-tplink-dir-traversal.nse +++ b/scripts/http-tplink-dir-traversal.nse @@ -62,7 +62,7 @@ Other interesting files: -- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "exploit"} local http = require "http" diff --git a/scripts/http-trace.nse b/scripts/http-trace.nse index 6b2b15150..af2b098ef 100644 --- a/scripts/http-trace.nse +++ b/scripts/http-trace.nse @@ -26,7 +26,7 @@ is enabled, it returns the header fields that were modified in the response. author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "discovery", "safe"} diff --git a/scripts/http-traceroute.nse b/scripts/http-traceroute.nse index 910dd0de7..39a350651 100644 --- a/scripts/http-traceroute.nse +++ b/scripts/http-traceroute.nse @@ -59,7 +59,7 @@ For more information, see: author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-unsafe-output-escaping.nse b/scripts/http-unsafe-output-escaping.nse index 9e6a4e17a..64c2a2ba7 100644 --- a/scripts/http-unsafe-output-escaping.nse +++ b/scripts/http-unsafe-output-escaping.nse @@ -40,7 +40,7 @@ indication of potential XSS vulnerability. -- author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-useragent-tester.nse b/scripts/http-useragent-tester.nse index 12a8a654c..197e003cf 100644 --- a/scripts/http-useragent-tester.nse +++ b/scripts/http-useragent-tester.nse @@ -44,7 +44,7 @@ Checks if various crawling utilities are allowed by the host. categories = {"discovery", "safe"} author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local http = require "http" local target = require "target" diff --git a/scripts/http-userdir-enum.nse b/scripts/http-userdir-enum.nse index 13cad79cb..3ad497ec7 100644 --- a/scripts/http-userdir-enum.nse +++ b/scripts/http-userdir-enum.nse @@ -34,7 +34,7 @@ CVE-2001-1013: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1013. -- |_ apache-userdir-enum: Potential Users: root (403), user (200), test (200) author = "jah" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} diff --git a/scripts/http-vhosts.nse b/scripts/http-vhosts.nse index 81d040ffa..0e067c607 100644 --- a/scripts/http-vhosts.nse +++ b/scripts/http-vhosts.nse @@ -60,7 +60,7 @@ various names of the form .example.com are tried. author = "Carlos Pantelides" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery", "intrusive" } diff --git a/scripts/http-virustotal.nse b/scripts/http-virustotal.nse index 27f3e688d..c2dd0b52b 100644 --- a/scripts/http-virustotal.nse +++ b/scripts/http-virustotal.nse @@ -90,7 +90,7 @@ where status of the queued file may be checked. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories={"safe", "malware", "external"} diff --git a/scripts/http-vlcstreamer-ls.nse b/scripts/http-vlcstreamer-ls.nse index 3dc2e7370..fdf22c0d8 100644 --- a/scripts/http-vlcstreamer-ls.nse +++ b/scripts/http-vlcstreamer-ls.nse @@ -46,7 +46,7 @@ enable streaming of multimedia content from the remote server to the device. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/http-vmware-path-vuln.nse b/scripts/http-vmware-path-vuln.nse index a06076364..92aae11ac 100644 --- a/scripts/http-vmware-path-vuln.nse +++ b/scripts/http-vmware-path-vuln.nse @@ -28,7 +28,7 @@ The vulnerability was originally released by Justin Morehouse and Tony Flick, wh ----------------------------------------------------------------------- author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} diff --git a/scripts/http-vuln-cve2006-3392.nse b/scripts/http-vuln-cve2006-3392.nse index 9479e4d2c..d5edc7622 100644 --- a/scripts/http-vuln-cve2006-3392.nse +++ b/scripts/http-vuln-cve2006-3392.nse @@ -37,7 +37,7 @@ to bypass the removal of "../" directory traversal sequences. --- author = "Paul AMAR " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln","intrusive"} portrule = shortport.portnumber({10000}) diff --git a/scripts/http-vuln-cve2009-3960.nse b/scripts/http-vuln-cve2009-3960.nse index bade53c1f..62f6ef8a1 100644 --- a/scripts/http-vuln-cve2009-3960.nse +++ b/scripts/http-vuln-cve2009-3960.nse @@ -56,7 +56,7 @@ For more information see: --|_ author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive"} diff --git a/scripts/http-vuln-cve2010-0738.nse b/scripts/http-vuln-cve2010-0738.nse index 8f491e554..e4720e1a7 100644 --- a/scripts/http-vuln-cve2010-0738.nse +++ b/scripts/http-vuln-cve2010-0738.nse @@ -26,7 +26,7 @@ For more information, see: -- to {"/jmx-console/"}. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "auth", "vuln"} local http = require "http" diff --git a/scripts/http-vuln-cve2010-2861.nse b/scripts/http-vuln-cve2010-2861.nse index 4f001bd9d..d168de83e 100644 --- a/scripts/http-vuln-cve2010-2861.nse +++ b/scripts/http-vuln-cve2010-2861.nse @@ -51,7 +51,7 @@ the password hash. -- then use "nmap -sV" so that nmap discovers the port as an HTTP server. author = "Micah Hoffman" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/http-vuln-cve2011-3192.nse b/scripts/http-vuln-cve2011-3192.nse index 248f85842..608c0da3d 100644 --- a/scripts/http-vuln-cve2011-3192.nse +++ b/scripts/http-vuln-cve2011-3192.nse @@ -49,7 +49,7 @@ References: ----------------------------------------------------------------------- author = "Duarte Silva " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} diff --git a/scripts/http-vuln-cve2011-3368.nse b/scripts/http-vuln-cve2011-3368.nse index 6a47a95ad..c2952b557 100644 --- a/scripts/http-vuln-cve2011-3368.nse +++ b/scripts/http-vuln-cve2011-3368.nse @@ -45,7 +45,7 @@ References: -- author = "Ange Gutek, Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/http-vuln-cve2012-1823.nse b/scripts/http-vuln-cve2012-1823.nse index df6c11a7d..9bd23126e 100644 --- a/scripts/http-vuln-cve2012-1823.nse +++ b/scripts/http-vuln-cve2012-1823.nse @@ -49,7 +49,7 @@ vulnerable installations. --- author = "Paulino Calderon , Paul AMAR " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln","intrusive"} diff --git a/scripts/http-vuln-cve2013-0156.nse b/scripts/http-vuln-cve2013-0156.nse index fff5e153a..e112decea 100644 --- a/scripts/http-vuln-cve2013-0156.nse +++ b/scripts/http-vuln-cve2013-0156.nse @@ -43,7 +43,7 @@ References: -- * Add argument to exploit cmd exec vuln author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln"} local http = require "http" diff --git a/scripts/http-vuln-cve2013-7091.nse b/scripts/http-vuln-cve2013-7091.nse index ae6eb8445..52419a229 100644 --- a/scripts/http-vuln-cve2013-7091.nse +++ b/scripts/http-vuln-cve2013-7091.nse @@ -50,7 +50,7 @@ Then, send some payload to create the new mail account. --- author = "Paul AMAR , Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln","intrusive"} portrule = shortport.http diff --git a/scripts/http-vuln-cve2014-2126.nse b/scripts/http-vuln-cve2014-2126.nse index a6d801186..d5f4b37f3 100644 --- a/scripts/http-vuln-cve2014-2126.nse +++ b/scripts/http-vuln-cve2014-2126.nse @@ -30,7 +30,7 @@ Privilege Escalation Vulnerability (CVE-2014-2126). author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} portrule = function(host, port) diff --git a/scripts/http-vuln-cve2014-2127.nse b/scripts/http-vuln-cve2014-2127.nse index ea2578900..135e9180a 100644 --- a/scripts/http-vuln-cve2014-2127.nse +++ b/scripts/http-vuln-cve2014-2127.nse @@ -29,7 +29,7 @@ Privilege Escalation Vulnerability (CVE-2014-2127). -- |_ http://cvedetails.com/cve/2014-2127/ author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} portrule = function(host, port) diff --git a/scripts/http-vuln-cve2014-2128.nse b/scripts/http-vuln-cve2014-2128.nse index 3c74b9c43..ca9d27017 100644 --- a/scripts/http-vuln-cve2014-2128.nse +++ b/scripts/http-vuln-cve2014-2128.nse @@ -29,7 +29,7 @@ Authentication Bypass Vulnerability (CVE-2014-2128). -- |_ http://cvedetails.com/cve/2014-2128/ author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} portrule = function(host, port) diff --git a/scripts/http-vuln-cve2014-2129.nse b/scripts/http-vuln-cve2014-2129.nse index c56bc8e80..bc65a3002 100644 --- a/scripts/http-vuln-cve2014-2129.nse +++ b/scripts/http-vuln-cve2014-2129.nse @@ -29,7 +29,7 @@ Denial of Service Vulnerability (CVE-2014-2129). -- |_ http://cvedetails.com/cve/2014-2129/ author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} portrule = function(host, port) diff --git a/scripts/http-vuln-cve2015-1427.nse b/scripts/http-vuln-cve2015-1427.nse index f02434be0..e5ccbc67b 100644 --- a/scripts/http-vuln-cve2015-1427.nse +++ b/scripts/http-vuln-cve2015-1427.nse @@ -45,7 +45,7 @@ This script attempts to detect a vulnerability, CVE-2015-1427, which allows att author = {"Gyanendra Mishra", "Daniel Miller"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive"} diff --git a/scripts/http-vuln-cve2015-1635.nse b/scripts/http-vuln-cve2015-1635.nse index 3752efa23..55970afad 100644 --- a/scripts/http-vuln-cve2015-1635.nse +++ b/scripts/http-vuln-cve2015-1635.nse @@ -39,7 +39,7 @@ References: --- author = {"Kl0nEz", "Paulino "} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} portrule = shortport.http diff --git a/scripts/http-vuln-misfortune-cookie.nse b/scripts/http-vuln-misfortune-cookie.nse index c1d390f47..258c0eab0 100644 --- a/scripts/http-vuln-misfortune-cookie.nse +++ b/scripts/http-vuln-misfortune-cookie.nse @@ -1,7 +1,7 @@ description = [[Detects the RomPager 4.07 Misfortune Cookie vulnerability by safely exploiting it.]] author = "Andrew Orr" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "intrusive"} --- diff --git a/scripts/http-vuln-wnr1000-creds.nse b/scripts/http-vuln-wnr1000-creds.nse index 6c752de5b..2fa9f7717 100644 --- a/scripts/http-vuln-wnr1000-creds.nse +++ b/scripts/http-vuln-wnr1000-creds.nse @@ -34,7 +34,7 @@ Vulnerability discovered by c1ph04. --- author = "Paul AMAR , Rob Nicholls" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln","intrusive"} portrule = shortport.http diff --git a/scripts/http-waf-detect.nse b/scripts/http-waf-detect.nse index a30a5f0cd..bf943188d 100644 --- a/scripts/http-waf-detect.nse +++ b/scripts/http-waf-detect.nse @@ -50,7 +50,7 @@ following products: -- the document's body author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-waf-fingerprint.nse b/scripts/http-waf-fingerprint.nse index e73cb3ce0..109f563e6 100644 --- a/scripts/http-waf-fingerprint.nse +++ b/scripts/http-waf-fingerprint.nse @@ -34,7 +34,7 @@ Credit to wafw00f and w3af for some fingerprints. --|_ BinarySec version 3.2.2 author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} -- diff --git a/scripts/http-webdav-scan.nse b/scripts/http-webdav-scan.nse index 718bc77ce..fca1b10b6 100644 --- a/scripts/http-webdav-scan.nse +++ b/scripts/http-webdav-scan.nse @@ -54,7 +54,7 @@ This script takes inspiration from the various scripts listed here: -- author = "Gyanendra Mishra" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "safe", "discovery", diff --git a/scripts/http-wordpress-brute.nse b/scripts/http-wordpress-brute.nse index 31691fd2d..8bc9d62b5 100644 --- a/scripts/http-wordpress-brute.nse +++ b/scripts/http-wordpress-brute.nse @@ -52,7 +52,7 @@ Wordpress default uri and form names: -- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/http-wordpress-enum.nse b/scripts/http-wordpress-enum.nse index 2b6586bac..79afccf89 100644 --- a/scripts/http-wordpress-enum.nse +++ b/scripts/http-wordpress-enum.nse @@ -75,7 +75,7 @@ TODO: author = {"Ange Gutek", "Peter Hill", "Gyanendra Mishra", "Paulino Calderon"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/http-wordpress-users.nse b/scripts/http-wordpress-users.nse index 25e32c3c3..42fb7b3ca 100644 --- a/scripts/http-wordpress-users.nse +++ b/scripts/http-wordpress-users.nse @@ -37,7 +37,7 @@ Original advisory: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive", "vuln"} diff --git a/scripts/http-xssed.nse b/scripts/http-xssed.nse index 3c32bb54d..51335c75c 100644 --- a/scripts/http-xssed.nse +++ b/scripts/http-xssed.nse @@ -24,7 +24,7 @@ This script searches the xssed.com database and outputs the result. --- author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "external", "discovery"} local http = require "http" diff --git a/scripts/iax2-brute.nse b/scripts/iax2-brute.nse index ff52b1cba..79ccbc528 100644 --- a/scripts/iax2-brute.nse +++ b/scripts/iax2-brute.nse @@ -29,7 +29,7 @@ In order to avoid this problem try: -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/iax2-version.nse b/scripts/iax2-version.nse index 01c9fd6fb..14a64a5c8 100644 --- a/scripts/iax2-version.nse +++ b/scripts/iax2-version.nse @@ -20,7 +20,7 @@ connections between servers as well as client-server communication. author = "Ferdy Riphagen" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/icap-info.nse b/scripts/icap-info.nse index 812978047..cdbfe87dd 100644 --- a/scripts/icap-info.nse +++ b/scripts/icap-info.nse @@ -34,7 +34,7 @@ content filtering and antivirus scanning. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/ike-version.nse b/scripts/ike-version.nse index c9027a5d5..fbb9bbd02 100644 --- a/scripts/ike-version.nse +++ b/scripts/ike-version.nse @@ -25,7 +25,7 @@ Main and Aggressive Mode and sends multiple transforms per request. author = "Jesper Kueckelhahn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe", "version"} portrule = shortport.version_port_or_service(500, "isakmp", "udp") diff --git a/scripts/imap-brute.nse b/scripts/imap-brute.nse index 82d23e6b9..3321f6b31 100644 --- a/scripts/imap-brute.nse +++ b/scripts/imap-brute.nse @@ -32,7 +32,7 @@ Performs brute force password auditing against IMAP servers using either LOGIN, author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} portrule = shortport.port_or_service({143,993}, {"imap","imaps"}) diff --git a/scripts/imap-capabilities.nse b/scripts/imap-capabilities.nse index 62fc6a7c1..53d3a0af7 100644 --- a/scripts/imap-capabilities.nse +++ b/scripts/imap-capabilities.nse @@ -18,7 +18,7 @@ any site-specific policy. author = "Brandon Enright" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/informix-brute.nse b/scripts/informix-brute.nse index 01a16ee2d..398c51c24 100644 --- a/scripts/informix-brute.nse +++ b/scripts/informix-brute.nse @@ -34,7 +34,7 @@ Performs brute force password auditing against IBM Informix Dynamic Server. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/informix-query.nse b/scripts/informix-query.nse index 2a13076c0..a590490f4 100644 --- a/scripts/informix-query.nse +++ b/scripts/informix-query.nse @@ -38,7 +38,7 @@ authentication credentials (see also: informix-brute). -- Created 07/28/2010 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} dependencies = { "informix-brute" } diff --git a/scripts/informix-tables.nse b/scripts/informix-tables.nse index ba52513f4..ddf627779 100644 --- a/scripts/informix-tables.nse +++ b/scripts/informix-tables.nse @@ -50,7 +50,7 @@ Retrieves a list of tables and column definitions for each database on an Inform -- Created 27/07/2010 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} dependencies = { "informix-brute" } diff --git a/scripts/ip-forwarding.nse b/scripts/ip-forwarding.nse index 017f2aeee..955638076 100644 --- a/scripts/ip-forwarding.nse +++ b/scripts/ip-forwarding.nse @@ -32,7 +32,7 @@ to be on the LAN. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} local arg_target = stdnse.get_script_args(SCRIPT_NAME .. ".target") diff --git a/scripts/ip-geolocation-geobytes.nse b/scripts/ip-geolocation-geobytes.nse index 788c6a59f..9fb5321ac 100644 --- a/scripts/ip-geolocation-geobytes.nse +++ b/scripts/ip-geolocation-geobytes.nse @@ -33,7 +33,7 @@ further requests are made during a scan. -- Canada author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","external","safe"} diff --git a/scripts/ip-geolocation-geoplugin.nse b/scripts/ip-geolocation-geoplugin.nse index 576309f38..4b52973e0 100644 --- a/scripts/ip-geolocation-geoplugin.nse +++ b/scripts/ip-geolocation-geoplugin.nse @@ -22,7 +22,7 @@ is no limit on lookups using this service. -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","external","safe"} diff --git a/scripts/ip-geolocation-ipinfodb.nse b/scripts/ip-geolocation-ipinfodb.nse index 2a12a7f64..4a1ec4455 100644 --- a/scripts/ip-geolocation-ipinfodb.nse +++ b/scripts/ip-geolocation-ipinfodb.nse @@ -29,7 +29,7 @@ needs to be obtained through free registration for this service: -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","external","safe"} diff --git a/scripts/ip-geolocation-maxmind.nse b/scripts/ip-geolocation-maxmind.nse index 2e255f605..e9a358c99 100644 --- a/scripts/ip-geolocation-maxmind.nse +++ b/scripts/ip-geolocation-maxmind.nse @@ -28,7 +28,7 @@ the commercial ones. -- author = "Gorjan Petrovski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","external","safe"} diff --git a/scripts/ip-https-discover.nse b/scripts/ip-https-discover.nse index 097d8a4a5..7c2be1d35 100644 --- a/scripts/ip-https-discover.nse +++ b/scripts/ip-https-discover.nse @@ -19,7 +19,7 @@ of Windows and Windows Server are not supported. ]] author = "Niklaus Schiess " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {'discovery', 'safe', 'default'} --- diff --git a/scripts/ipidseq.nse b/scripts/ipidseq.nse index d1148eba0..8c9720410 100644 --- a/scripts/ipidseq.nse +++ b/scripts/ipidseq.nse @@ -32,7 +32,7 @@ for these hosts. author = "Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/ipv6-ra-flood.nse b/scripts/ipv6-ra-flood.nse index 5a35214da..db10fc3dc 100644 --- a/scripts/ipv6-ra-flood.nse +++ b/scripts/ipv6-ra-flood.nse @@ -42,7 +42,7 @@ Additional documents: https://tools.ietf.org/rfc/rfc6104.txt -- nmap -6 --script ipv6-ra-flood.nse --script-args 'interface=,timeout=10s' author = "Adam Števko" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"dos", "intrusive"} try = nmap.new_try() diff --git a/scripts/irc-botnet-channels.nse b/scripts/irc-botnet-channels.nse index 0fcb09603..fa678ef82 100644 --- a/scripts/irc-botnet-channels.nse +++ b/scripts/irc-botnet-channels.nse @@ -29,7 +29,7 @@ script argument. The default list of channels is author = "David Fifield, Ange Gutek" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "vuln", "safe"} diff --git a/scripts/irc-brute.nse b/scripts/irc-brute.nse index 86c7600f8..ed320decc 100644 --- a/scripts/irc-brute.nse +++ b/scripts/irc-brute.nse @@ -29,7 +29,7 @@ Performs brute force password auditing against IRC (Internet Relay Chat) servers author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories={"brute","intrusive"} portrule = shortport.port_or_service({6666,6667,6697,6679},{"irc","ircs"}) diff --git a/scripts/irc-info.nse b/scripts/irc-info.nse index fedb917f3..1e1a786ba 100644 --- a/scripts/irc-info.nse +++ b/scripts/irc-info.nse @@ -39,7 +39,7 @@ It uses STATS, LUSERS, and other queries to obtain this information. author = "Doug Hoyte, Patrick Donnelly" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/irc-sasl-brute.nse b/scripts/irc-sasl-brute.nse index 0e0d878da..c05ff8bdf 100644 --- a/scripts/irc-sasl-brute.nse +++ b/scripts/irc-sasl-brute.nse @@ -37,7 +37,7 @@ Performs brute force password auditing against IRC (Internet Relay Chat) servers author = "Piotr Olma" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories={"brute","intrusive"} portrule = shortport.port_or_service({6666,6667,6697,6679},{"irc","ircs"}) diff --git a/scripts/irc-unrealircd-backdoor.nse b/scripts/irc-unrealircd-backdoor.nse index d845d850e..4df24a5b8 100644 --- a/scripts/irc-unrealircd-backdoor.nse +++ b/scripts/irc-unrealircd-backdoor.nse @@ -57,7 +57,7 @@ Reference: -- author = "Vlatko Kosturjak, Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive", "malware", "vuln"} diff --git a/scripts/iscsi-brute.nse b/scripts/iscsi-brute.nse index ae5ebbbbf..e8c099865 100644 --- a/scripts/iscsi-brute.nse +++ b/scripts/iscsi-brute.nse @@ -24,7 +24,7 @@ Performs brute force password auditing against iSCSI targets. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.portnumber(3260, "tcp", {"open", "open|filtered"}) diff --git a/scripts/iscsi-info.nse b/scripts/iscsi-info.nse index 2da6ad150..cadab6ca1 100644 --- a/scripts/iscsi-info.nse +++ b/scripts/iscsi-info.nse @@ -35,7 +35,7 @@ Collects and displays information from remote iSCSI targets. -- Revised 2010/11/28 - v0.2 - improved error handling author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe", "discovery"} diff --git a/scripts/isns-info.nse b/scripts/isns-info.nse index c27913e99..3241abc70 100644 --- a/scripts/isns-info.nse +++ b/scripts/isns-info.nse @@ -31,7 +31,7 @@ Service (iSNS). portrule = shortport.port_or_service(3205, 'isns') author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} local function fail(err) return stdnse.format_output(false, err) end diff --git a/scripts/jdwp-exec.nse b/scripts/jdwp-exec.nse index dde093a3a..2255f164a 100644 --- a/scripts/jdwp-exec.nse +++ b/scripts/jdwp-exec.nse @@ -32,7 +32,7 @@ accepts a shell command as its argument. -- |_ author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","intrusive"} portrule = function(host, port) diff --git a/scripts/jdwp-info.nse b/scripts/jdwp-info.nse index b8e46730a..6845fbba7 100644 --- a/scripts/jdwp-info.nse +++ b/scripts/jdwp-info.nse @@ -13,7 +13,7 @@ Java class file that returns remote system information. ]] author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default","safe","discovery"} --- diff --git a/scripts/jdwp-inject.nse b/scripts/jdwp-inject.nse index d713ceef0..bec0828a4 100644 --- a/scripts/jdwp-inject.nse +++ b/scripts/jdwp-inject.nse @@ -29,7 +29,7 @@ See nselib/data/jdwp-class/README for more. -- |_ Hello world from the remote machine! author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","intrusive"} portrule = function(host, port) diff --git a/scripts/jdwp-version.nse b/scripts/jdwp-version.nse index 29ab02357..64f840719 100644 --- a/scripts/jdwp-version.nse +++ b/scripts/jdwp-version.nse @@ -13,7 +13,7 @@ Documentation for JDWP is available at http://java.sun.com/javase/6/docs/technotes/guides/jpda/jdwp-spec.html ]] author = "Michael Schierl " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} --- diff --git a/scripts/knx-gateway-discover.nse b/scripts/knx-gateway-discover.nse index 22d7bbdf3..074856684 100644 --- a/scripts/knx-gateway-discover.nse +++ b/scripts/knx-gateway-discover.nse @@ -21,7 +21,7 @@ Further information: ]] author = "Niklaus Schiess , Dominik Schneider " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} --- diff --git a/scripts/knx-gateway-info.nse b/scripts/knx-gateway-info.nse index fd21015c2..c67254a24 100644 --- a/scripts/knx-gateway-info.nse +++ b/scripts/knx-gateway-info.nse @@ -14,7 +14,7 @@ Further information: ]] author = "Niklaus Schiess , Dominik Schneider " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = shortport.port_or_service(3671, "efcp", "udp") diff --git a/scripts/krb5-enum-users.nse b/scripts/krb5-enum-users.nse index 88a1ffd4d..2b2bb42e9 100644 --- a/scripts/krb5-enum-users.nse +++ b/scripts/krb5-enum-users.nse @@ -44,7 +44,7 @@ It needs a valid Kerberos REALM in order to operate. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} diff --git a/scripts/ldap-brute.nse b/scripts/ldap-brute.nse index 490eaf671..01e2583b7 100644 --- a/scripts/ldap-brute.nse +++ b/scripts/ldap-brute.nse @@ -78,7 +78,7 @@ This script uses some AD-specific support and optimizations: -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/ldap-novell-getpass.nse b/scripts/ldap-novell-getpass.nse index 8157b3131..ff8024301 100644 --- a/scripts/ldap-novell-getpass.nse +++ b/scripts/ldap-novell-getpass.nse @@ -46,7 +46,7 @@ administrative account. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/ldap-rootdse.nse b/scripts/ldap-rootdse.nse index 73508298b..1813958b7 100644 --- a/scripts/ldap-rootdse.nse +++ b/scripts/ldap-rootdse.nse @@ -90,7 +90,7 @@ Retrieves the LDAP root DSA-specific Entry (DSE) author = "Patrik Karlsson" copyright = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"ldap-brute"} diff --git a/scripts/ldap-search.nse b/scripts/ldap-search.nse index 7d58dd930..f5de4d215 100644 --- a/scripts/ldap-search.nse +++ b/scripts/ldap-search.nse @@ -107,7 +107,7 @@ anonymous bind will be used as a last attempt. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/lexmark-config.nse b/scripts/lexmark-config.nse index f3e7c6b37..c95125787 100644 --- a/scripts/lexmark-config.nse +++ b/scripts/lexmark-config.nse @@ -49,7 +49,7 @@ http://www.lexmark.com/vgn/images/portal/Security%20Features%20of%20Lexmark%20MF -- Revised 01/23/2010 - v0.3 - revised script to use the proper ports author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/llmnr-resolve.nse b/scripts/llmnr-resolve.nse index 5dcc88ba5..dcd436f93 100644 --- a/scripts/llmnr-resolve.nse +++ b/scripts/llmnr-resolve.nse @@ -46,7 +46,7 @@ end author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} diff --git a/scripts/lltd-discovery.nse b/scripts/lltd-discovery.nse index f1cdff3b0..25ffb06af 100644 --- a/scripts/lltd-discovery.nse +++ b/scripts/lltd-discovery.nse @@ -41,7 +41,7 @@ http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx -- author = "Gorjan Petrovski, Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"broadcast","discovery","safe"} diff --git a/scripts/maxdb-info.nse b/scripts/maxdb-info.nse index adf6270b4..72f5d6c86 100644 --- a/scripts/maxdb-info.nse +++ b/scripts/maxdb-info.nse @@ -31,7 +31,7 @@ Retrieves version and database information from a SAP Max DB database. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "default", "version" } diff --git a/scripts/mcafee-epo-agent.nse b/scripts/mcafee-epo-agent.nse index a291b724a..0527dc977 100644 --- a/scripts/mcafee-epo-agent.nse +++ b/scripts/mcafee-epo-agent.nse @@ -20,7 +20,7 @@ Check if ePO agent is running on port 8081 or port identified as ePO Agent port. author = "Didier Stevens, Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version", "safe"} diff --git a/scripts/membase-brute.nse b/scripts/membase-brute.nse index 9f2483446..da6133c4c 100644 --- a/scripts/membase-brute.nse +++ b/scripts/membase-brute.nse @@ -26,7 +26,7 @@ Performs brute force password auditing against Couchbase Membase servers. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/membase-http-info.nse b/scripts/membase-http-info.nse index 859ef6612..dd8bce3d5 100644 --- a/scripts/membase-http-info.nse +++ b/scripts/membase-http-info.nse @@ -36,7 +36,7 @@ does not require any credentials. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/memcached-info.nse b/scripts/memcached-info.nse index 8c9470eb2..8c9dda4e9 100644 --- a/scripts/memcached-info.nse +++ b/scripts/memcached-info.nse @@ -30,7 +30,7 @@ server time) from distributed memory object caching system memcached. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/metasploit-info.nse b/scripts/metasploit-info.nse index 588677260..3c11d58be 100644 --- a/scripts/metasploit-info.nse +++ b/scripts/metasploit-info.nse @@ -41,7 +41,7 @@ References: author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","safe"} portrule = shortport.port_or_service(55553,"metasploit-msgrpc") diff --git a/scripts/metasploit-msgrpc-brute.nse b/scripts/metasploit-msgrpc-brute.nse index 71e0e9490..65aac4d67 100644 --- a/scripts/metasploit-msgrpc-brute.nse +++ b/scripts/metasploit-msgrpc-brute.nse @@ -32,7 +32,7 @@ Metasploit msgrpc interface. author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(55553,"metasploit-msgrpc") diff --git a/scripts/metasploit-xmlrpc-brute.nse b/scripts/metasploit-xmlrpc-brute.nse index f8d6c996c..331dd38b5 100644 --- a/scripts/metasploit-xmlrpc-brute.nse +++ b/scripts/metasploit-xmlrpc-brute.nse @@ -27,7 +27,7 @@ Performs brute force password auditing against a Metasploit RPC server using the -- author = "Vlatko Kosturjak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/mikrotik-routeros-brute.nse b/scripts/mikrotik-routeros-brute.nse index bdcf70bb2..2be98da14 100644 --- a/scripts/mikrotik-routeros-brute.nse +++ b/scripts/mikrotik-routeros-brute.nse @@ -23,7 +23,7 @@ Additional information: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} local shortport = require "shortport" diff --git a/scripts/mmouse-brute.nse b/scripts/mmouse-brute.nse index aaadd11bd..9dc254637 100644 --- a/scripts/mmouse-brute.nse +++ b/scripts/mmouse-brute.nse @@ -29,7 +29,7 @@ http://mobilemouse.com/ -- @args mmouse-brute.timeout socket timeout for connecting to Mobile Mouse (default 5s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/modbus-discover.nse b/scripts/modbus-discover.nse index a7858a638..66d5b508f 100644 --- a/scripts/modbus-discover.nse +++ b/scripts/modbus-discover.nse @@ -49,7 +49,7 @@ Information about MODBUS protocol and security issues: -- Version 0.3 - /13.12.10/ - several bugfixes author = "Alexander Rudakov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/mongodb-brute.nse b/scripts/mongodb-brute.nse index e5419c9dc..cda6bb891 100644 --- a/scripts/mongodb-brute.nse +++ b/scripts/mongodb-brute.nse @@ -26,7 +26,7 @@ Performs brute force password auditing against the MongoDB database. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} local arg_db = stdnse.get_script_args(SCRIPT_NAME .. ".db") or "admin" diff --git a/scripts/mongodb-databases.nse b/scripts/mongodb-databases.nse index 53f8b2953..998ab3854 100644 --- a/scripts/mongodb-databases.nse +++ b/scripts/mongodb-databases.nse @@ -41,7 +41,7 @@ Attempts to get a list of tables from a MongoDB database. -- Revised 01/03/2012 - v0.2 - added authentication support author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"mongodb-brute"} diff --git a/scripts/mongodb-info.nse b/scripts/mongodb-info.nse index f1b201e42..5085f2536 100644 --- a/scripts/mongodb-info.nse +++ b/scripts/mongodb-info.nse @@ -54,7 +54,7 @@ Attempts to get build info and server status from a MongoDB database. author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"mongodb-brute"} diff --git a/scripts/mrinfo.nse b/scripts/mrinfo.nse index bb0921144..93a137f0d 100644 --- a/scripts/mrinfo.nse +++ b/scripts/mrinfo.nse @@ -65,7 +65,7 @@ Cisco IOS. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} diff --git a/scripts/ms-sql-brute.nse b/scripts/ms-sql-brute.nse index 5238289cc..afe9d1b72 100644 --- a/scripts/ms-sql-brute.nse +++ b/scripts/ms-sql-brute.nse @@ -72,7 +72,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- - Added compatibility with changes in mssql.lua author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} dependencies = {"ms-sql-empty-password"} diff --git a/scripts/ms-sql-config.nse b/scripts/ms-sql-config.nse index e5a9b79dd..dad49cf91 100644 --- a/scripts/ms-sql-config.nse +++ b/scripts/ms-sql-config.nse @@ -66,7 +66,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- added compatibility with changes in mssql.lua (Chris Woodbury) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/ms-sql-dac.nse b/scripts/ms-sql-dac.nse index cfce57da6..6cc67d9fe 100644 --- a/scripts/ms-sql-dac.nse +++ b/scripts/ms-sql-dac.nse @@ -32,7 +32,7 @@ accessible or not. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} hostrule = function(host) diff --git a/scripts/ms-sql-dump-hashes.nse b/scripts/ms-sql-dump-hashes.nse index 88bd868d6..641d1f982 100644 --- a/scripts/ms-sql-dump-hashes.nse +++ b/scripts/ms-sql-dump-hashes.nse @@ -32,7 +32,7 @@ discovered by other scripts. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "discovery", "safe"} diff --git a/scripts/ms-sql-empty-password.nse b/scripts/ms-sql-empty-password.nse index 3fefe9506..43fd2104e 100644 --- a/scripts/ms-sql-empty-password.nse +++ b/scripts/ms-sql-empty-password.nse @@ -54,7 +54,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- - Added compatibility with changes in mssql.lua author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth","intrusive"} diff --git a/scripts/ms-sql-hasdbaccess.nse b/scripts/ms-sql-hasdbaccess.nse index f4f7aeb8b..53e7db68a 100644 --- a/scripts/ms-sql-hasdbaccess.nse +++ b/scripts/ms-sql-hasdbaccess.nse @@ -69,7 +69,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- added compatibility with changes in mssql.lua (Chris Woodbury) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "discovery","safe"} diff --git a/scripts/ms-sql-info.nse b/scripts/ms-sql-info.nse index d679d90de..c718f8d67 100644 --- a/scripts/ms-sql-info.nse +++ b/scripts/ms-sql-info.nse @@ -146,7 +146,7 @@ be disabled using the mssql.scanned-ports-only script argument. author = "Chris Woodbury, Thomas Buchanan" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/ms-sql-query.nse b/scripts/ms-sql-query.nse index f0361ced4..aa8904111 100644 --- a/scripts/ms-sql-query.nse +++ b/scripts/ms-sql-query.nse @@ -56,7 +56,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- added compatibility with changes in mssql.lua (Chris Woodbury) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/ms-sql-tables.nse b/scripts/ms-sql-tables.nse index be2e26482..2a775efdc 100644 --- a/scripts/ms-sql-tables.nse +++ b/scripts/ms-sql-tables.nse @@ -93,7 +93,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- - Added compatibility with changes in mssql.lua author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/ms-sql-xp-cmdshell.nse b/scripts/ms-sql-xp-cmdshell.nse index e0b90b70f..ab1632b4c 100644 --- a/scripts/ms-sql-xp-cmdshell.nse +++ b/scripts/ms-sql-xp-cmdshell.nse @@ -82,7 +82,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- added compatibility with changes in mssql.lua (Chris Woodbury) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} diff --git a/scripts/msrpc-enum.nse b/scripts/msrpc-enum.nse index 01e34833b..63dc63db8 100644 --- a/scripts/msrpc-enum.nse +++ b/scripts/msrpc-enum.nse @@ -68,7 +68,7 @@ or dcedump tool from SPIKE fuzzer. -- -snip- author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe","discovery"} hostrule = function(host) diff --git a/scripts/mtrace.nse b/scripts/mtrace.nse index ccd246eea..e1dd2988d 100644 --- a/scripts/mtrace.nse +++ b/scripts/mtrace.nse @@ -63,7 +63,7 @@ This is similar to the mtrace utility provided in Cisco IOS. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "broadcast"} diff --git a/scripts/murmur-version.nse b/scripts/murmur-version.nse index bb4c968eb..fccb94581 100644 --- a/scripts/murmur-version.nse +++ b/scripts/murmur-version.nse @@ -38,7 +38,7 @@ See http://mumble.sourceforge.net/Protocol. -- 64740/udp open murmur Murmur 1.2.4 (voice port; users: 35; max. users: 100; bandwidth: 72000 b/s) author = "Marin Maržić" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "version" } portrule = shortport.version_port_or_service({64738}, "murmur", {"tcp", "udp"}) diff --git a/scripts/mysql-audit.nse b/scripts/mysql-audit.nse index 181a1e6f9..586c85857 100644 --- a/scripts/mysql-audit.nse +++ b/scripts/mysql-audit.nse @@ -86,7 +86,7 @@ audits by creating appropriate audit files). -- Created 05/29/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/mysql-brute.nse b/scripts/mysql-brute.nse index 2348f6cff..9f3bbbe70 100644 --- a/scripts/mysql-brute.nse +++ b/scripts/mysql-brute.nse @@ -24,7 +24,7 @@ Performs password guessing against MySQL. -- @args mysql-brute.timeout socket timeout for connecting to MySQL (default 5s) author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} -- Version 0.5 diff --git a/scripts/mysql-databases.nse b/scripts/mysql-databases.nse index 3e7cfc22b..512cf1817 100644 --- a/scripts/mysql-databases.nse +++ b/scripts/mysql-databases.nse @@ -28,7 +28,7 @@ Attempts to list all databases on a MySQL server. -- |_ squeezecenter author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/mysql-dump-hashes.nse b/scripts/mysql-dump-hashes.nse index a88c35bc7..b243ac80f 100644 --- a/scripts/mysql-dump-hashes.nse +++ b/scripts/mysql-dump-hashes.nse @@ -29,7 +29,7 @@ scripts. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "discovery", "safe"} diff --git a/scripts/mysql-empty-password.nse b/scripts/mysql-empty-password.nse index 88a55da3a..d45b97393 100644 --- a/scripts/mysql-empty-password.nse +++ b/scripts/mysql-empty-password.nse @@ -18,7 +18,7 @@ Checks for MySQL servers with an empty password for root or -- |_ root account has empty password author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} diff --git a/scripts/mysql-enum.nse b/scripts/mysql-enum.nse index 13a93870f..d8cd6a02f 100644 --- a/scripts/mysql-enum.nse +++ b/scripts/mysql-enum.nse @@ -38,7 +38,7 @@ old authentication mechanism from versions 4.x and earlier. -- @args mysql-enum.timeout socket timeout for connecting to MySQL (default 5s) author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(3306, "mysql") diff --git a/scripts/mysql-info.nse b/scripts/mysql-info.nse index bf4ff08a5..cfb54c362 100644 --- a/scripts/mysql-info.nse +++ b/scripts/mysql-info.nse @@ -42,7 +42,7 @@ isn't run (see the portrule). author = "Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "default", "discovery", "safe" } diff --git a/scripts/mysql-query.nse b/scripts/mysql-query.nse index e1dad0134..5e9c26a30 100644 --- a/scripts/mysql-query.nse +++ b/scripts/mysql-query.nse @@ -31,7 +31,7 @@ Runs a query against a MySQL database and returns the results as a table. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "discovery", "safe"} diff --git a/scripts/mysql-users.nse b/scripts/mysql-users.nse index 236b9d8a6..dc86a3dad 100644 --- a/scripts/mysql-users.nse +++ b/scripts/mysql-users.nse @@ -31,7 +31,7 @@ Attempts to list all users on a MySQL server. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} diff --git a/scripts/mysql-variables.nse b/scripts/mysql-variables.nse index f3d72b755..6f9b772bb 100644 --- a/scripts/mysql-variables.nse +++ b/scripts/mysql-variables.nse @@ -40,7 +40,7 @@ Attempts to show all variables on a MySQL server. -- |_ wait_timeout: 28800 author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/mysql-vuln-cve2012-2122.nse b/scripts/mysql-vuln-cve2012-2122.nse index ae941cdea..a3b812234 100644 --- a/scripts/mysql-vuln-cve2012-2122.nse +++ b/scripts/mysql-vuln-cve2012-2122.nse @@ -79,7 +79,7 @@ Interesting post about this vuln: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive", "vuln"} portrule = shortport.port_or_service(3306, "mysql") diff --git a/scripts/nat-pmp-info.nse b/scripts/nat-pmp-info.nse index 9608d56c9..a7f7f36c5 100644 --- a/scripts/nat-pmp-info.nse +++ b/scripts/nat-pmp-info.nse @@ -26,7 +26,7 @@ The NAT-PMP protocol is supported by a broad range of routers including: -- 192.0.2.13 author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/nat-pmp-mapport.nse b/scripts/nat-pmp-mapport.nse index 7f6811f05..f4f45c9df 100644 --- a/scripts/nat-pmp-mapport.nse +++ b/scripts/nat-pmp-mapport.nse @@ -43,7 +43,7 @@ o unmapall - unmaps all previously mapped ports for the requesting IP -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/nbstat.nse b/scripts/nbstat.nse index 9176a669d..4322b8739 100644 --- a/scripts/nbstat.nse +++ b/scripts/nbstat.nse @@ -78,7 +78,7 @@ owns. author = "Brandon Enright, Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" -- Current version of this script was based entirely on Implementing CIFS, by -- Christopher R. Hertel. diff --git a/scripts/ncp-enum-users.nse b/scripts/ncp-enum-users.nse index 2098fd3aa..73bf764ad 100644 --- a/scripts/ncp-enum-users.nse +++ b/scripts/ncp-enum-users.nse @@ -28,7 +28,7 @@ Retrieves a list of all eDirectory users from the Novell NetWare Core Protocol ( -- Created 04/26/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "safe"} diff --git a/scripts/ncp-serverinfo.nse b/scripts/ncp-serverinfo.nse index 8213b83e5..c540d5ae6 100644 --- a/scripts/ncp-serverinfo.nse +++ b/scripts/ncp-serverinfo.nse @@ -30,7 +30,7 @@ mounts, etc.) from the Novell NetWare Core Protocol (NCP) service. -- Created 04/26/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/ndmp-fs-info.nse b/scripts/ndmp-fs-info.nse index 36153f372..91ca57ebc 100644 --- a/scripts/ndmp-fs-info.nse +++ b/scripts/ndmp-fs-info.nse @@ -38,7 +38,7 @@ to support the protocol: -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/ndmp-version.nse b/scripts/ndmp-version.nse index 61acdef8a..53b177857 100644 --- a/scripts/ndmp-version.nse +++ b/scripts/ndmp-version.nse @@ -21,7 +21,7 @@ the backup server. The following products are known to support the protocol: ]] author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/nessus-brute.nse b/scripts/nessus-brute.nse index 6686e6b74..11a6fbeca 100644 --- a/scripts/nessus-brute.nse +++ b/scripts/nessus-brute.nse @@ -30,7 +30,7 @@ Performs brute force password auditing against a Nessus vulnerability scanning d -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/nessus-xmlrpc-brute.nse b/scripts/nessus-xmlrpc-brute.nse index 2963b34e3..3c428cbbf 100644 --- a/scripts/nessus-xmlrpc-brute.nse +++ b/scripts/nessus-xmlrpc-brute.nse @@ -24,7 +24,7 @@ Performs brute force password auditing against a Nessus vulnerability scanning d author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/netbus-auth-bypass.nse b/scripts/netbus-auth-bypass.nse index fbf97d5bd..22dcbff4e 100644 --- a/scripts/netbus-auth-bypass.nse +++ b/scripts/netbus-auth-bypass.nse @@ -21,7 +21,7 @@ and login to the service by typing Password;1; into the console. -- |_netbus-auth-bypass: Vulnerable author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "safe", "vuln"} diff --git a/scripts/netbus-brute.nse b/scripts/netbus-brute.nse index 5e050656f..4738b403b 100644 --- a/scripts/netbus-brute.nse +++ b/scripts/netbus-brute.nse @@ -17,7 +17,7 @@ Performs brute force password auditing against the Netbus backdoor ("remote admi -- |_netbus-brute: password123 author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} diff --git a/scripts/netbus-info.nse b/scripts/netbus-info.nse index 46a71f635..d076716ff 100644 --- a/scripts/netbus-info.nse +++ b/scripts/netbus-info.nse @@ -80,7 +80,7 @@ and an smtp-server used for notification delivery. -- @args netbus-info.password The password used for authentication author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/netbus-version.nse b/scripts/netbus-version.nse index b4bed1627..c8332fc8d 100644 --- a/scripts/netbus-version.nse +++ b/scripts/netbus-version.nse @@ -15,7 +15,7 @@ that mimes NetBus. -- 12345/tcp open netbus Netbuster (honeypot) author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/nexpose-brute.nse b/scripts/nexpose-brute.nse index 08b6e671c..38a819921 100644 --- a/scripts/nexpose-brute.nse +++ b/scripts/nexpose-brute.nse @@ -32,7 +32,7 @@ value or 0 (zero) to guess the whole dictionary. author = "Vlatko Kosturjak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/nfs-ls.nse b/scripts/nfs-ls.nse index 7cc7fb171..e43339e92 100644 --- a/scripts/nfs-ls.nse +++ b/scripts/nfs-ls.nse @@ -137,7 +137,7 @@ Recursive listing is not implemented. -- author = "Patrik Karlsson, Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"rpc-grind"} diff --git a/scripts/nfs-showmount.nse b/scripts/nfs-showmount.nse index e6891c510..0ae1dab2d 100644 --- a/scripts/nfs-showmount.nse +++ b/scripts/nfs-showmount.nse @@ -29,7 +29,7 @@ Shows NFS exports, like the showmount -e command. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"rpc-grind"} diff --git a/scripts/nfs-statfs.nse b/scripts/nfs-statfs.nse index 168806279..4f8e885c7 100644 --- a/scripts/nfs-statfs.nse +++ b/scripts/nfs-statfs.nse @@ -38,7 +38,7 @@ the version used is NFSv3. author = "Patrik Karlsson, Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"rpc-grind"} diff --git a/scripts/nping-brute.nse b/scripts/nping-brute.nse index 84d86141f..08a831a37 100644 --- a/scripts/nping-brute.nse +++ b/scripts/nping-brute.nse @@ -10,7 +10,7 @@ local openssl = stdnse.silent_require "openssl" description = [[ Performs brute force password auditing against an Nping Echo service. -See http://nmap.org/book/nping-man-echo-mode.html for Echo Mode +See https://nmap.org/book/nping-man-echo-mode.html for Echo Mode documentation. ]] @@ -27,7 +27,7 @@ documentation. -- |_ Perfomed 204 guesses in 204 seconds, average tps: 1 author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} diff --git a/scripts/nrpe-enum.nse b/scripts/nrpe-enum.nse index 3c2ac0735..c70c81895 100644 --- a/scripts/nrpe-enum.nse +++ b/scripts/nrpe-enum.nse @@ -35,7 +35,7 @@ enabled. User-supplied arguments are not supported. -- |_check_zombie_procs OK PROCS OK: 0 processes with STATE = Z author = "Mak Kolybabi" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/ntp-info.nse b/scripts/ntp-info.nse index 02f2fca8e..930902997 100644 --- a/scripts/ntp-info.nse +++ b/scripts/ntp-info.nse @@ -58,7 +58,7 @@ documentation of the protocol. -- 0.000 author = "Richard Sammet" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/ntp-monlist.nse b/scripts/ntp-monlist.nse index f3d5d90e1..19b258136 100644 --- a/scripts/ntp-monlist.nse +++ b/scripts/ntp-monlist.nse @@ -10,7 +10,7 @@ local string = require "string" local table = require "table" author = "jah" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} description = [[ Obtains and prints an NTP server's monitor data. diff --git a/scripts/omp2-brute.nse b/scripts/omp2-brute.nse index 631b357db..a0e302f7a 100644 --- a/scripts/omp2-brute.nse +++ b/scripts/omp2-brute.nse @@ -20,7 +20,7 @@ Performs brute force password auditing against the OpenVAS manager using OMPv2. -- author = "Henri Doreau" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} diff --git a/scripts/omp2-enum-targets.nse b/scripts/omp2-enum-targets.nse index 0dbdc30c6..2aa4f0dcd 100644 --- a/scripts/omp2-enum-targets.nse +++ b/scripts/omp2-enum-targets.nse @@ -35,7 +35,7 @@ These targets will be added to the scanning queue in case author = "Henri Doreau" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"omp2-brute"} diff --git a/scripts/omron-info.nse b/scripts/omron-info.nse index 3abbb6930..33ba241e2 100644 --- a/scripts/omron-info.nse +++ b/scripts/omron-info.nse @@ -44,7 +44,7 @@ will parse out the data. author = "Stephen Hilt (Digital Bond)" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "version"} -- diff --git a/scripts/openlookup-info.nse b/scripts/openlookup-info.nse index 7ce9e2f4f..aa20ec6ed 100644 --- a/scripts/openlookup-info.nse +++ b/scripts/openlookup-info.nse @@ -32,7 +32,7 @@ Parses and displays the banner information of an OpenLookup (network key-value s -- 5851 author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe", "version"} diff --git a/scripts/openvas-otp-brute.nse b/scripts/openvas-otp-brute.nse index fe5c0c134..d3c3e77ba 100644 --- a/scripts/openvas-otp-brute.nse +++ b/scripts/openvas-otp-brute.nse @@ -25,7 +25,7 @@ Performs brute force password auditing against a OpenVAS vulnerability scanner d author = "Vlatko Kosturjak" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/oracle-brute-stealth.nse b/scripts/oracle-brute-stealth.nse index f2a9bba2f..7b47ab7a2 100644 --- a/scripts/oracle-brute-stealth.nse +++ b/scripts/oracle-brute-stealth.nse @@ -51,7 +51,7 @@ password. -- library author = "Dhiru Kholia" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(1521, "oracle-tns", "tcp", "open") diff --git a/scripts/oracle-brute.nse b/scripts/oracle-brute.nse index 5e4b54026..0632d59b6 100644 --- a/scripts/oracle-brute.nse +++ b/scripts/oracle-brute.nse @@ -67,7 +67,7 @@ result in a large number of accounts being locked out on the database server. -- library author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/oracle-enum-users.nse b/scripts/oracle-enum-users.nse index b387cfac8..65248b32f 100644 --- a/scripts/oracle-enum-users.nse +++ b/scripts/oracle-enum-users.nse @@ -36,7 +36,7 @@ servers (this bug was fixed in Oracle's October 2009 Critical Patch Update). -- Revised 21/07/2010 - v0.3 - removed references to smb in get_random_string author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "auth"} diff --git a/scripts/oracle-sid-brute.nse b/scripts/oracle-sid-brute.nse index c6f537da9..a47a53ab3 100644 --- a/scripts/oracle-sid-brute.nse +++ b/scripts/oracle-sid-brute.nse @@ -37,7 +37,7 @@ author, Alexander Kornbrust (http://seclists.org/nmap-dev/2009/q4/645). -- Revised 12/14/2009 - v0.3 - Fixed ugly file_exist kludge author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/ovs-agent-version.nse b/scripts/ovs-agent-version.nse index 4cad3175d..96135e676 100644 --- a/scripts/ovs-agent-version.nse +++ b/scripts/ovs-agent-version.nse @@ -28,7 +28,7 @@ categories = {"version"} -- 8899/tcp open ssl/ovs-agent syn-ack Oracle Virtual Server Agent 3.0 (BaseHTTP 0.3; Python SimpleXMLRPCServer; Python 2.5.2) author = "David Fifield" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" portrule = shortport.version_port_or_service({8899}) diff --git a/scripts/p2p-conficker.nse b/scripts/p2p-conficker.nse index 6837a44e4..8b2e414d7 100644 --- a/scripts/p2p-conficker.nse +++ b/scripts/p2p-conficker.nse @@ -86,7 +86,7 @@ who contributed! author = "Ron Bowes (with research from Symantec Security Response)" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default","safe"} diff --git a/scripts/path-mtu.nse b/scripts/path-mtu.nse index b70b209ba..f64c9aff9 100644 --- a/scripts/path-mtu.nse +++ b/scripts/path-mtu.nse @@ -39,7 +39,7 @@ of that, this list is rarely traversed in whole because: author = "Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/pcanywhere-brute.nse b/scripts/pcanywhere-brute.nse index 1a9af0a5f..11688936f 100644 --- a/scripts/pcanywhere-brute.nse +++ b/scripts/pcanywhere-brute.nse @@ -33,7 +33,7 @@ some time until server becomes available again. author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/pgsql-brute.nse b/scripts/pgsql-brute.nse index 41330f3e2..1369ac0b3 100644 --- a/scripts/pgsql-brute.nse +++ b/scripts/pgsql-brute.nse @@ -33,7 +33,7 @@ Performs password guessing against PostgreSQL. -- o SSL can be denied per host or network level author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/pjl-ready-message.nse b/scripts/pjl-ready-message.nse index 64045f6e0..bdcd8c125 100644 --- a/scripts/pjl-ready-message.nse +++ b/scripts/pjl-ready-message.nse @@ -20,7 +20,7 @@ message and changes it to the message given. author = "Aaron Leininger" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} diff --git a/scripts/pop3-brute.nse b/scripts/pop3-brute.nse index e077827c0..e1290b673 100644 --- a/scripts/pop3-brute.nse +++ b/scripts/pop3-brute.nse @@ -25,7 +25,7 @@ Tries to log into a POP3 account by guessing usernames and passwords. -- |_ Performed 8 scans in 1 seconds, average tps: 8 author = "Philip Pickering, Piotr Olma" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/pop3-capabilities.nse b/scripts/pop3-capabilities.nse index 7d89e8e60..ef8a449b5 100644 --- a/scripts/pop3-capabilities.nse +++ b/scripts/pop3-capabilities.nse @@ -18,7 +18,7 @@ server version may be available. -- |_ pop3-capabilities: USER CAPA RESP-CODES UIDL PIPELINING STLS TOP SASL(PLAIN) author = "Philip Pickering" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default","discovery","safe"} diff --git a/scripts/pptp-version.nse b/scripts/pptp-version.nse index b74296421..aee967ddc 100644 --- a/scripts/pptp-version.nse +++ b/scripts/pptp-version.nse @@ -16,7 +16,7 @@ Attempts to extract system information from the point-to-point tunneling protoco author = "Thomas Buchanan" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/qconn-exec.nse b/scripts/qconn-exec.nse index 4bc61a1ba..ea142fabf 100644 --- a/scripts/qconn-exec.nse +++ b/scripts/qconn-exec.nse @@ -55,7 +55,7 @@ For more information about QNX QCONN, see: -- - now uses the vuln library for reporting author = "Brendan Coles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "exploit", "vuln"} portrule = shortport.port_or_service ({8000}, "qconn", {"tcp"}) diff --git a/scripts/qscan.nse b/scripts/qscan.nse index c08ce99a1..fe278e9e0 100644 --- a/scripts/qscan.nse +++ b/scripts/qscan.nse @@ -63,7 +63,7 @@ for Nmap. author = "Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/quake1-info.nse b/scripts/quake1-info.nse index 60e8c09cc..074b65859 100644 --- a/scripts/quake1-info.nse +++ b/scripts/quake1-info.nse @@ -64,7 +64,7 @@ http://www.gamers.org/dEngine/quake/QDP/qnp.html categories = {"default", "discovery", "safe", "version"} author = "Ulrik Haugen" copyright = "Linköpings universitet 2014, Ulrik Haugen 2014" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" --- Proceed with action on open/open|filtered udp ports in interval diff --git a/scripts/quake3-info.nse b/scripts/quake3-info.nse index ccf243348..8b1653733 100644 --- a/scripts/quake3-info.nse +++ b/scripts/quake3-info.nse @@ -64,7 +64,7 @@ Extracts information from a Quake3 game server and other games which use the sam -- |_ sv_privateClients: 0 author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe", "version"} diff --git a/scripts/quake3-master-getservers.nse b/scripts/quake3-master-getservers.nse index 507a96a3b..823525659 100644 --- a/scripts/quake3-master-getservers.nse +++ b/scripts/quake3-master-getservers.nse @@ -27,7 +27,7 @@ Queries Quake3-style master servers for game servers (many games other than Quak -- less, all files are shown. The default value is 10. author = "Toni Ruottu" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = shortport.port_or_service ({20110, 20510, 27950, 30710}, "quake3-master", {"udp"}) diff --git a/scripts/rdp-enum-encryption.nse b/scripts/rdp-enum-encryption.nse index 3298398c5..453b6d3ed 100644 --- a/scripts/rdp-enum-encryption.nse +++ b/scripts/rdp-enum-encryption.nse @@ -26,7 +26,7 @@ http://labs.mwrinfosecurity.com/tools/2009/01/12/rdp-cipher-checker/ -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local bin = require("bin") diff --git a/scripts/rdp-vuln-ms12-020.nse b/scripts/rdp-vuln-ms12-020.nse index 6a4a4f4c5..24cf7670b 100644 --- a/scripts/rdp-vuln-ms12-020.nse +++ b/scripts/rdp-vuln-ms12-020.nse @@ -65,7 +65,7 @@ Original check by by Worawit Wang (sleepya). -- |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0002 author = "Aleksandar Nikolic, based on python script by sleepya" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/realvnc-auth-bypass.nse b/scripts/realvnc-auth-bypass.nse index f49ec087e..e6fec14e7 100644 --- a/scripts/realvnc-auth-bypass.nse +++ b/scripts/realvnc-auth-bypass.nse @@ -6,7 +6,7 @@ Checks if a VNC server is vulnerable to the RealVNC authentication bypass (CVE-2006-2369). ]] author = "Brandon Enright" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" --- -- @output diff --git a/scripts/redis-brute.nse b/scripts/redis-brute.nse index 6ae508efc..8d4de9c6f 100644 --- a/scripts/redis-brute.nse +++ b/scripts/redis-brute.nse @@ -24,7 +24,7 @@ Performs brute force passwords auditing against a Redis key-value store. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/redis-info.nse b/scripts/redis-info.nse index 8aa839156..2c5132ca8 100644 --- a/scripts/redis-info.nse +++ b/scripts/redis-info.nse @@ -30,7 +30,7 @@ Retrieves information (such as version number and architecture) from a Redis key -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"redis-brute"} diff --git a/scripts/resolveall.nse b/scripts/resolveall.nse index 6f0371566..a9484339e 100644 --- a/scripts/resolveall.nse +++ b/scripts/resolveall.nse @@ -29,7 +29,7 @@ record) returned for each host name. author = "Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/reverse-index.nse b/scripts/reverse-index.nse index d02168dee..4dea6025f 100644 --- a/scripts/reverse-index.nse +++ b/scripts/reverse-index.nse @@ -29,7 +29,7 @@ services on each host. -- Version 0.1 -- Created 11/22/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "safe" } -- the postrule displays the reverse-index once all hosts are scanned diff --git a/scripts/rexec-brute.nse b/scripts/rexec-brute.nse index 18fac6562..33b93a8c6 100644 --- a/scripts/rexec-brute.nse +++ b/scripts/rexec-brute.nse @@ -28,7 +28,7 @@ Performs brute force password auditing against the classic UNIX rexec (remote ex author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} portrule = shortport.port_or_service(512, "exec", "tcp") diff --git a/scripts/rfc868-time.nse b/scripts/rfc868-time.nse index 7f77b1251..d838537be 100644 --- a/scripts/rfc868-time.nse +++ b/scripts/rfc868-time.nse @@ -17,7 +17,7 @@ Retrieves the day and time from the Time service. author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "version"} diff --git a/scripts/riak-http-info.nse b/scripts/riak-http-info.nse index 432c7b0f1..a5044f304 100644 --- a/scripts/riak-http-info.nse +++ b/scripts/riak-http-info.nse @@ -50,7 +50,7 @@ Retrieves information (such as node name and architecture) from a Basho Riak dis -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/rlogin-brute.nse b/scripts/rlogin-brute.nse index a68381ee5..f9168695f 100644 --- a/scripts/rlogin-brute.nse +++ b/scripts/rlogin-brute.nse @@ -31,7 +31,7 @@ must bind to a low source port number. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} portrule = shortport.port_or_service(513, "login", "tcp") diff --git a/scripts/rmi-dumpregistry.nse b/scripts/rmi-dumpregistry.nse index beb0117bc..a3f9667d5 100644 --- a/scripts/rmi-dumpregistry.nse +++ b/scripts/rmi-dumpregistry.nse @@ -147,7 +147,7 @@ Some apps give away the classpath, which this scripts catches in so-called "Cust --@version 0.5 author = "Martin Holst Swende" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} portrule = shortport.port_or_service({1098, 1099, 1090, 8901, 8902, 8903}, {"java-rmi", "rmiregistry"}) diff --git a/scripts/rmi-vuln-classloader.nse b/scripts/rmi-vuln-classloader.nse index 751dbe474..2993ba1bd 100644 --- a/scripts/rmi-vuln-classloader.nse +++ b/scripts/rmi-vuln-classloader.nse @@ -35,7 +35,7 @@ References: -- |_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb author = "Aleksandar Nikolic"; -license = "Same as Nmap--See http://nmap.org/book/man-legal.html"; +license = "Same as Nmap--See https://nmap.org/book/man-legal.html"; categories = { "intrusive", "vuln" diff --git a/scripts/rpc-grind.nse b/scripts/rpc-grind.nse index 2d8d00fe7..cb0d935f1 100644 --- a/scripts/rpc-grind.nse +++ b/scripts/rpc-grind.nse @@ -37,7 +37,7 @@ Any other accept state is an incorrect behaviour. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/rpcap-brute.nse b/scripts/rpcap-brute.nse index 6669ec7d8..37c3ca58f 100644 --- a/scripts/rpcap-brute.nse +++ b/scripts/rpcap-brute.nse @@ -25,7 +25,7 @@ Daemon (rpcap). author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(2002, "rpcap", "tcp") diff --git a/scripts/rpcap-info.nse b/scripts/rpcap-info.nse index 2353c8fbb..311bbc3cf 100644 --- a/scripts/rpcap-info.nse +++ b/scripts/rpcap-info.nse @@ -33,7 +33,7 @@ setup to require authentication or not and also supports IP restrictions. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"rpcap-brute"} diff --git a/scripts/rpcinfo.nse b/scripts/rpcinfo.nse index b9d68e056..80cead5ac 100644 --- a/scripts/rpcinfo.nse +++ b/scripts/rpcinfo.nse @@ -73,7 +73,7 @@ supported version numbers, port number and protocol, and program name. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "default", "safe"} diff --git a/scripts/rsync-brute.nse b/scripts/rsync-brute.nse index 4bc240276..c7fd19d64 100644 --- a/scripts/rsync-brute.nse +++ b/scripts/rsync-brute.nse @@ -28,7 +28,7 @@ Performs brute force password auditing against the rsync remote file syncing pro author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} portrule = shortport.port_or_service(873, "rsync", "tcp") diff --git a/scripts/rsync-list-modules.nse b/scripts/rsync-list-modules.nse index 9e9c5a5be..0fb1e2a29 100644 --- a/scripts/rsync-list-modules.nse +++ b/scripts/rsync-list-modules.nse @@ -21,7 +21,7 @@ Lists modules available for rsync (remote file sync) synchronization. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service(873, "rsync", "tcp") diff --git a/scripts/rtsp-methods.nse b/scripts/rtsp-methods.nse index 9ed3a3ce7..59b84c5ae 100644 --- a/scripts/rtsp-methods.nse +++ b/scripts/rtsp-methods.nse @@ -32,7 +32,7 @@ Determines which methods are supported by the RTSP (real time streaming protocol -- Created 23/10/2011 - v0.1 - created by Patrik Karlsson -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/rtsp-url-brute.nse b/scripts/rtsp-url-brute.nse index 8b7c3b1a8..ab622e580 100644 --- a/scripts/rtsp-url-brute.nse +++ b/scripts/rtsp-url-brute.nse @@ -34,7 +34,7 @@ Attempts to enumerate RTSP media URLS by testing for common paths on devices suc -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} diff --git a/scripts/s7-info.nse b/scripts/s7-info.nse index a0e4f37bf..b563ff440 100644 --- a/scripts/s7-info.nse +++ b/scripts/s7-info.nse @@ -18,7 +18,7 @@ Thanks to Positive Research, and Dmitry Efanov for creating PLCScan ]] author = "Stephen Hilt (Digital Bond)" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "version"} --- diff --git a/scripts/samba-vuln-cve-2012-1182.nse b/scripts/samba-vuln-cve-2012-1182.nse index 61bfc1ae5..cfcf50bfc 100644 --- a/scripts/samba-vuln-cve-2012-1182.nse +++ b/scripts/samba-vuln-cve-2012-1182.nse @@ -58,7 +58,7 @@ References: -- |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182 author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln","intrusive"} hostrule = function(host) diff --git a/scripts/script.db b/scripts/script.db index 5bef2b0f0..0bca95ad2 100644 --- a/scripts/script.db +++ b/scripts/script.db @@ -1,6 +1,5 @@ Entry { filename = "acarsd-info.nse", categories = { "discovery", "safe", } } Entry { filename = "address-info.nse", categories = { "default", "safe", } } -Entry { filename = "afp-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "afp-ls.nse", categories = { "discovery", "safe", } } Entry { filename = "afp-path-vuln.nse", categories = { "exploit", "intrusive", "vuln", } } Entry { filename = "afp-serverinfo.nse", categories = { "default", "discovery", "safe", } } @@ -19,10 +18,7 @@ Entry { filename = "backorifice-brute.nse", categories = { "brute", "intrusive", Entry { filename = "backorifice-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "bacnet-info.nse", categories = { "discovery", "version", } } Entry { filename = "banner.nse", categories = { "discovery", "safe", } } -Entry { filename = "bitcoin-getaddr.nse", categories = { "discovery", "safe", } } -Entry { filename = "bitcoin-info.nse", categories = { "discovery", "safe", } } Entry { filename = "bitcoinrpc-info.nse", categories = { "default", "discovery", "safe", } } -Entry { filename = "bittorrent-discovery.nse", categories = { "discovery", "safe", } } Entry { filename = "bjnp-discover.nse", categories = { "discovery", "safe", } } Entry { filename = "broadcast-ataoe-discover.nse", categories = { "broadcast", "safe", } } Entry { filename = "broadcast-avahi-dos.nse", categories = { "broadcast", "dos", "intrusive", "vuln", } } @@ -42,7 +38,6 @@ Entry { filename = "broadcast-novell-locate.nse", categories = { "broadcast", "s Entry { filename = "broadcast-pc-anywhere.nse", categories = { "broadcast", "safe", } } Entry { filename = "broadcast-pc-duo.nse", categories = { "broadcast", "safe", } } Entry { filename = "broadcast-pim-discovery.nse", categories = { "broadcast", "discovery", "safe", } } -Entry { filename = "broadcast-ping.nse", categories = { "broadcast", "discovery", "safe", } } Entry { filename = "broadcast-pppoe-discover.nse", categories = { "broadcast", "safe", } } Entry { filename = "broadcast-rip-discover.nse", categories = { "broadcast", "safe", } } Entry { filename = "broadcast-ripng-discover.nse", categories = { "broadcast", "safe", } } @@ -83,7 +78,6 @@ Entry { filename = "dns-client-subnet-scan.nse", categories = { "discovery", "sa Entry { filename = "dns-fuzz.nse", categories = { "fuzzer", "intrusive", } } Entry { filename = "dns-ip6-arpa-scan.nse", categories = { "discovery", "intrusive", } } Entry { filename = "dns-nsec-enum.nse", categories = { "discovery", "intrusive", } } -Entry { filename = "dns-nsec3-enum.nse", categories = { "discovery", "intrusive", } } Entry { filename = "dns-nsid.nse", categories = { "default", "discovery", } } Entry { filename = "dns-random-srcport.nse", categories = { "external", "intrusive", } } Entry { filename = "dns-random-txid.nse", categories = { "external", "intrusive", } } @@ -100,7 +94,6 @@ Entry { filename = "domino-enum-users.nse", categories = { "auth", "intrusive", Entry { filename = "dpap-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "drda-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "drda-info.nse", categories = { "discovery", "safe", "version", } } -Entry { filename = "duplicates.nse", categories = { "safe", } } Entry { filename = "eap-info.nse", categories = { "broadcast", "safe", } } Entry { filename = "enip-info.nse", categories = { "discovery", "version", } } Entry { filename = "epmd-info.nse", categories = { "default", "discovery", "safe", } } @@ -146,10 +139,8 @@ Entry { filename = "http-axis2-dir-traversal.nse", categories = { "exploit", "in Entry { filename = "http-backup-finder.nse", categories = { "discovery", "safe", } } Entry { filename = "http-barracuda-dir-traversal.nse", categories = { "auth", "exploit", "intrusive", } } Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "http-cakephp-version.nse", categories = { "discovery", "safe", } } Entry { filename = "http-chrono.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-cisco-anyconnect.nse", categories = { "default", "discovery", "safe", } } -Entry { filename = "http-coldfusion-subzero.nse", categories = { "exploit", } } Entry { filename = "http-comments-displayer.nse", categories = { "discovery", "safe", } } Entry { filename = "http-config-backup.nse", categories = { "auth", "intrusive", } } Entry { filename = "http-cors.nse", categories = { "default", "discovery", "safe", } } @@ -166,7 +157,6 @@ Entry { filename = "http-drupal-enum.nse", categories = { "discovery", "intrusiv Entry { filename = "http-enum.nse", categories = { "discovery", "intrusive", "vuln", } } Entry { filename = "http-errors.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-exif-spider.nse", categories = { "intrusive", } } -Entry { filename = "http-favicon.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "http-feed.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-fetch.nse", categories = { "safe", } } Entry { filename = "http-fileupload-exploiter.nse", categories = { "exploit", "intrusive", "vuln", } } @@ -196,7 +186,6 @@ Entry { filename = "http-ntlm-info.nse", categories = { "default", "discovery", Entry { filename = "http-open-proxy.nse", categories = { "default", "discovery", "external", "safe", } } Entry { filename = "http-open-redirect.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-passwd.nse", categories = { "intrusive", "vuln", } } -Entry { filename = "http-php-version.nse", categories = { "discovery", "safe", } } Entry { filename = "http-phpmyadmin-dir-traversal.nse", categories = { "exploit", "vuln", } } Entry { filename = "http-phpself-xss.nse", categories = { "fuzzer", "intrusive", "vuln", } } Entry { filename = "http-proxy-brute.nse", categories = { "brute", "external", "intrusive", } } @@ -224,15 +213,12 @@ Entry { filename = "http-unsafe-output-escaping.nse", categories = { "discovery" Entry { filename = "http-useragent-tester.nse", categories = { "discovery", "safe", } } Entry { filename = "http-userdir-enum.nse", categories = { "auth", "intrusive", } } Entry { filename = "http-vhosts.nse", categories = { "discovery", "intrusive", } } -Entry { filename = "http-virustotal.nse", categories = { "external", "malware", "safe", } } Entry { filename = "http-vlcstreamer-ls.nse", categories = { "discovery", "safe", } } Entry { filename = "http-vmware-path-vuln.nse", categories = { "safe", "vuln", } } Entry { filename = "http-vuln-cve2006-3392.nse", categories = { "exploit", "intrusive", "vuln", } } Entry { filename = "http-vuln-cve2009-3960.nse", categories = { "exploit", "intrusive", } } Entry { filename = "http-vuln-cve2010-0738.nse", categories = { "auth", "safe", "vuln", } } -Entry { filename = "http-vuln-cve2010-2861.nse", categories = { "intrusive", "vuln", } } Entry { filename = "http-vuln-cve2011-3192.nse", categories = { "safe", "vuln", } } -Entry { filename = "http-vuln-cve2011-3368.nse", categories = { "intrusive", "vuln", } } Entry { filename = "http-vuln-cve2012-1823.nse", categories = { "exploit", "intrusive", "vuln", } } Entry { filename = "http-vuln-cve2013-0156.nse", categories = { "exploit", "vuln", } } Entry { filename = "http-vuln-cve2013-7091.nse", categories = { "exploit", "intrusive", "vuln", } } @@ -251,7 +237,6 @@ Entry { filename = "http-wordpress-brute.nse", categories = { "brute", "intrusiv Entry { filename = "http-wordpress-enum.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-wordpress-users.nse", categories = { "auth", "intrusive", "vuln", } } Entry { filename = "http-xssed.nse", categories = { "discovery", "external", "safe", } } -Entry { filename = "iax2-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "iax2-version.nse", categories = { "version", } } Entry { filename = "icap-info.nse", categories = { "discovery", "safe", } } Entry { filename = "ike-version.nse", categories = { "default", "discovery", "safe", "version", } } @@ -267,15 +252,12 @@ Entry { filename = "ip-geolocation-ipinfodb.nse", categories = { "discovery", "e Entry { filename = "ip-geolocation-maxmind.nse", categories = { "discovery", "external", "safe", } } Entry { filename = "ip-https-discover.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "ipidseq.nse", categories = { "discovery", "safe", } } -Entry { filename = "ipv6-node-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "ipv6-ra-flood.nse", categories = { "dos", "intrusive", } } Entry { filename = "irc-botnet-channels.nse", categories = { "discovery", "safe", "vuln", } } Entry { filename = "irc-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "irc-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "irc-sasl-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "irc-unrealircd-backdoor.nse", categories = { "exploit", "intrusive", "malware", "vuln", } } -Entry { filename = "iscsi-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "iscsi-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "isns-info.nse", categories = { "discovery", "safe", } } Entry { filename = "jdwp-exec.nse", categories = { "exploit", "intrusive", } } Entry { filename = "jdwp-info.nse", categories = { "default", "discovery", "safe", } } @@ -290,7 +272,6 @@ Entry { filename = "ldap-rootdse.nse", categories = { "discovery", "safe", } } Entry { filename = "ldap-search.nse", categories = { "discovery", "safe", } } Entry { filename = "lexmark-config.nse", categories = { "discovery", "safe", } } Entry { filename = "llmnr-resolve.nse", categories = { "broadcast", "discovery", "safe", } } -Entry { filename = "lltd-discovery.nse", categories = { "broadcast", "discovery", "safe", } } Entry { filename = "maxdb-info.nse", categories = { "default", "version", } } Entry { filename = "mcafee-epo-agent.nse", categories = { "safe", "version", } } Entry { filename = "membase-brute.nse", categories = { "brute", "intrusive", } } @@ -298,14 +279,9 @@ Entry { filename = "membase-http-info.nse", categories = { "discovery", "safe", Entry { filename = "memcached-info.nse", categories = { "discovery", "safe", } } Entry { filename = "metasploit-info.nse", categories = { "intrusive", "safe", } } Entry { filename = "metasploit-msgrpc-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "metasploit-xmlrpc-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "mikrotik-routeros-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "mmouse-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "mmouse-exec.nse", categories = { "intrusive", } } Entry { filename = "modbus-discover.nse", categories = { "discovery", "intrusive", } } -Entry { filename = "mongodb-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "mongodb-databases.nse", categories = { "default", "discovery", "safe", } } -Entry { filename = "mongodb-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "mrinfo.nse", categories = { "broadcast", "discovery", "safe", } } Entry { filename = "ms-sql-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "ms-sql-config.nse", categories = { "discovery", "safe", } } @@ -321,16 +297,10 @@ Entry { filename = "msrpc-enum.nse", categories = { "discovery", "safe", } } Entry { filename = "mtrace.nse", categories = { "broadcast", "discovery", "safe", } } Entry { filename = "murmur-version.nse", categories = { "version", } } Entry { filename = "mysql-audit.nse", categories = { "discovery", "safe", } } -Entry { filename = "mysql-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "mysql-databases.nse", categories = { "discovery", "intrusive", } } Entry { filename = "mysql-dump-hashes.nse", categories = { "auth", "discovery", "safe", } } Entry { filename = "mysql-empty-password.nse", categories = { "auth", "intrusive", } } -Entry { filename = "mysql-enum.nse", categories = { "brute", "intrusive", } } Entry { filename = "mysql-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "mysql-query.nse", categories = { "auth", "discovery", "safe", } } -Entry { filename = "mysql-users.nse", categories = { "auth", "intrusive", } } -Entry { filename = "mysql-variables.nse", categories = { "discovery", "intrusive", } } -Entry { filename = "mysql-vuln-cve2012-2122.nse", categories = { "discovery", "intrusive", "vuln", } } Entry { filename = "nat-pmp-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "nat-pmp-mapport.nse", categories = { "discovery", "safe", } } Entry { filename = "nbstat.nse", categories = { "default", "discovery", "safe", } } @@ -344,11 +314,9 @@ Entry { filename = "netbus-auth-bypass.nse", categories = { "auth", "safe", "vul Entry { filename = "netbus-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "netbus-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "netbus-version.nse", categories = { "version", } } -Entry { filename = "nexpose-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "nfs-ls.nse", categories = { "discovery", "safe", } } Entry { filename = "nfs-showmount.nse", categories = { "discovery", "safe", } } Entry { filename = "nfs-statfs.nse", categories = { "discovery", "safe", } } -Entry { filename = "nping-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "nrpe-enum.nse", categories = { "discovery", "intrusive", } } Entry { filename = "ntp-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "ntp-monlist.nse", categories = { "discovery", "intrusive", } } @@ -356,16 +324,11 @@ Entry { filename = "omp2-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "omp2-enum-targets.nse", categories = { "discovery", "safe", } } Entry { filename = "omron-info.nse", categories = { "discovery", "version", } } Entry { filename = "openlookup-info.nse", categories = { "default", "discovery", "safe", "version", } } -Entry { filename = "openvas-otp-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "oracle-brute-stealth.nse", categories = { "brute", "intrusive", } } -Entry { filename = "oracle-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "oracle-enum-users.nse", categories = { "auth", "intrusive", } } Entry { filename = "oracle-sid-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "ovs-agent-version.nse", categories = { "version", } } Entry { filename = "p2p-conficker.nse", categories = { "default", "safe", } } Entry { filename = "path-mtu.nse", categories = { "discovery", "safe", } } Entry { filename = "pcanywhere-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "pgsql-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "pjl-ready-message.nse", categories = { "intrusive", } } Entry { filename = "pop3-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "pop3-capabilities.nse", categories = { "default", "discovery", "safe", } } @@ -392,17 +355,11 @@ Entry { filename = "rpc-grind.nse", categories = { "version", } } Entry { filename = "rpcap-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "rpcap-info.nse", categories = { "discovery", "safe", } } Entry { filename = "rpcinfo.nse", categories = { "default", "discovery", "safe", } } -Entry { filename = "rsync-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "rsync-list-modules.nse", categories = { "discovery", "safe", } } Entry { filename = "rtsp-methods.nse", categories = { "default", "safe", } } Entry { filename = "rtsp-url-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "s7-info.nse", categories = { "discovery", "version", } } Entry { filename = "samba-vuln-cve-2012-1182.nse", categories = { "intrusive", "vuln", } } Entry { filename = "servicetags.nse", categories = { "default", "discovery", "safe", } } -Entry { filename = "sip-brute.nse", categories = { "brute", "intrusive", } } -Entry { filename = "sip-call-spoof.nse", categories = { "discovery", "intrusive", } } -Entry { filename = "sip-enum-users.nse", categories = { "auth", "intrusive", } } -Entry { filename = "sip-methods.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "skypev2-version.nse", categories = { "version", } } Entry { filename = "smb-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "smb-enum-domains.nse", categories = { "discovery", "intrusive", } } @@ -412,7 +369,6 @@ Entry { filename = "smb-enum-sessions.nse", categories = { "discovery", "intrusi Entry { filename = "smb-enum-shares.nse", categories = { "discovery", "intrusive", } } Entry { filename = "smb-enum-users.nse", categories = { "auth", "intrusive", } } Entry { filename = "smb-flood.nse", categories = { "dos", "intrusive", } } -Entry { filename = "smb-ls.nse", categories = { "discovery", "safe", } } Entry { filename = "smb-mbenum.nse", categories = { "discovery", "safe", } } Entry { filename = "smb-os-discovery.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "smb-print-text.nse", categories = { "intrusive", } } @@ -453,8 +409,6 @@ Entry { filename = "snmp-win32-users.nse", categories = { "auth", "default", "sa Entry { filename = "socks-auth-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "socks-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "socks-open-proxy.nse", categories = { "default", "discovery", "external", "safe", } } -Entry { filename = "ssh-hostkey.nse", categories = { "default", "discovery", "safe", } } -Entry { filename = "ssh2-enum-algos.nse", categories = { "discovery", "safe", } } Entry { filename = "sshv1.nse", categories = { "default", "safe", } } Entry { filename = "ssl-ccs-injection.nse", categories = { "safe", "vuln", } } Entry { filename = "ssl-cert.nse", categories = { "default", "discovery", "safe", } } @@ -470,7 +424,6 @@ Entry { filename = "stun-info.nse", categories = { "discovery", "safe", } } Entry { filename = "stun-version.nse", categories = { "version", } } Entry { filename = "stuxnet-detect.nse", categories = { "discovery", "intrusive", } } Entry { filename = "supermicro-ipmi-conf.nse", categories = { "exploit", "vuln", } } -Entry { filename = "svn-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "targets-asn.nse", categories = { "discovery", "external", "safe", } } Entry { filename = "targets-ipv6-map4to6.nse", categories = { "discovery", } } Entry { filename = "targets-ipv6-multicast-echo.nse", categories = { "broadcast", "discovery", } } @@ -497,7 +450,6 @@ Entry { filename = "vmauthd-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "vnc-brute.nse", categories = { "brute", "intrusive", } } Entry { filename = "vnc-info.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "voldemort-info.nse", categories = { "discovery", "safe", } } -Entry { filename = "vuze-dht-info.nse", categories = { "discovery", "safe", } } Entry { filename = "wdb-version.nse", categories = { "default", "discovery", "version", "vuln", } } Entry { filename = "weblogic-t3-info.nse", categories = { "default", "discovery", "safe", "version", } } Entry { filename = "whois-domain.nse", categories = { "discovery", "external", "safe", } } diff --git a/scripts/servicetags.nse b/scripts/servicetags.nse index a454ddc0a..63efb53c3 100644 --- a/scripts/servicetags.nse +++ b/scripts/servicetags.nse @@ -75,7 +75,7 @@ http://arc.opensolaris.org/caselog/PSARC/2006/638/ServiceTag_API_CLI_v07.pdf author = "Matthew Flanagan" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/sip-brute.nse b/scripts/sip-brute.nse index fedd72b86..74f934ae3 100644 --- a/scripts/sip-brute.nse +++ b/scripts/sip-brute.nse @@ -26,7 +26,7 @@ Performs brute force password auditing against Session Initiation Protocol -- Created 04/03/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/sip-call-spoof.nse b/scripts/sip-call-spoof.nse index b50032459..67524b611 100644 --- a/scripts/sip-call-spoof.nse +++ b/scripts/sip-call-spoof.nse @@ -40,7 +40,7 @@ Timeout (408) or Hang up (200). author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/sip-enum-users.nse b/scripts/sip-enum-users.nse index 7e8e19f7e..704d93539 100644 --- a/scripts/sip-enum-users.nse +++ b/scripts/sip-enum-users.nse @@ -59,7 +59,7 @@ response status code. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} diff --git a/scripts/sip-methods.nse b/scripts/sip-methods.nse index a51a5ec4e..458f48f07 100644 --- a/scripts/sip-methods.nse +++ b/scripts/sip-methods.nse @@ -33,7 +33,7 @@ the value of the Allow header in the response. author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe", "discovery"} diff --git a/scripts/skypev2-version.nse b/scripts/skypev2-version.nse index f1b1c5cee..c72e649d8 100644 --- a/scripts/skypev2-version.nse +++ b/scripts/skypev2-version.nse @@ -14,7 +14,7 @@ Detects the Skype version 2 service. -- 80/tcp open skype2 Skype author = "Brandon Enright" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/smb-brute.nse b/scripts/smb-brute.nse index cfe1aec81..b8f3847ed 100644 --- a/scripts/smb-brute.nse +++ b/scripts/smb-brute.nse @@ -104,7 +104,7 @@ determined with a fairly efficient bruteforce. For example, if the actual passwo author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/smb-enum-domains.nse b/scripts/smb-enum-domains.nse index 3fd4e4630..2a2385990 100644 --- a/scripts/smb-enum-domains.nse +++ b/scripts/smb-enum-domains.nse @@ -57,7 +57,7 @@ After the initial bind to SAMR, the sequence of calls is: author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-enum-groups.nse b/scripts/smb-enum-groups.nse index 8e035aa9c..78beec6ba 100644 --- a/scripts/smb-enum-groups.nse +++ b/scripts/smb-enum-groups.nse @@ -128,7 +128,7 @@ the same thing. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-enum-processes.nse b/scripts/smb-enum-processes.nse index 6d28c7d89..64cc6b1ed 100644 --- a/scripts/smb-enum-processes.nse +++ b/scripts/smb-enum-processes.nse @@ -81,7 +81,7 @@ impact the system, besides showing a message box to the user. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-enum-sessions.nse b/scripts/smb-enum-sessions.nse index cea9ea107..76eb08216 100644 --- a/scripts/smb-enum-sessions.nse +++ b/scripts/smb-enum-sessions.nse @@ -62,7 +62,7 @@ the system, besides showing a message box to the user. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-enum-shares.nse b/scripts/smb-enum-shares.nse index d1f5c0542..f21dac468 100644 --- a/scripts/smb-enum-shares.nse +++ b/scripts/smb-enum-shares.nse @@ -93,7 +93,7 @@ for shares that require a user account. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-enum-users.nse b/scripts/smb-enum-users.nse index 018ffedd6..26b1b1a96 100644 --- a/scripts/smb-enum-users.nse +++ b/scripts/smb-enum-users.nse @@ -142,7 +142,7 @@ in this script. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-flood.nse b/scripts/smb-flood.nse index 25d71c07d..f2c600256 100644 --- a/scripts/smb-flood.nse +++ b/scripts/smb-flood.nse @@ -32,7 +32,7 @@ never ends (until timeout). author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","dos"} dependencies = {"smb-brute"} diff --git a/scripts/smb-ls.nse b/scripts/smb-ls.nse index 7a8d67f97..1bf808830 100644 --- a/scripts/smb-ls.nse +++ b/scripts/smb-ls.nse @@ -107,7 +107,7 @@ The output is intended to resemble the output of the UNIX ls comman -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"smb-enum-shares"} diff --git a/scripts/smb-mbenum.nse b/scripts/smb-mbenum.nse index fdd23b938..04673afd3 100644 --- a/scripts/smb-mbenum.nse +++ b/scripts/smb-mbenum.nse @@ -58,7 +58,7 @@ Queries information managed by the Windows Master Browser. -- Created 06/11/2011 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/smb-os-discovery.nse b/scripts/smb-os-discovery.nse index 42f4742da..67b7db6dc 100644 --- a/scripts/smb-os-discovery.nse +++ b/scripts/smb-os-discovery.nse @@ -70,7 +70,7 @@ will speed up the script on targets that do not allow guest access. -- test.local author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"smb-brute"} diff --git a/scripts/smb-print-text.nse b/scripts/smb-print-text.nse index 346a7bbc5..f021fa5af 100644 --- a/scripts/smb-print-text.nse +++ b/scripts/smb-print-text.nse @@ -33,7 +33,7 @@ which you can specify trough smb library arguments smbuser and -- author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} hostrule = function(host) diff --git a/scripts/smb-psexec.nse b/scripts/smb-psexec.nse index 3d8920380..1e46e4aaf 100644 --- a/scripts/smb-psexec.nse +++ b/scripts/smb-psexec.nse @@ -532,14 +532,14 @@ Some ideas for later versions (TODO): author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} dependencies = {"smb-brute"} -- Where we tell the user to get nmap_service.exe if it's not installed. -local NMAP_SERVICE_EXE_DOWNLOAD = "http://nmap.org/psexec/nmap_service.exe" +local NMAP_SERVICE_EXE_DOWNLOAD = "https://nmap.org/psexec/nmap_service.exe" hostrule = function(host) diff --git a/scripts/smb-security-mode.nse b/scripts/smb-security-mode.nse index 3cfca0781..c679fb0a5 100644 --- a/scripts/smb-security-mode.nse +++ b/scripts/smb-security-mode.nse @@ -61,7 +61,7 @@ them. -- author = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"smb-brute"} diff --git a/scripts/smb-server-stats.nse b/scripts/smb-server-stats.nse index 596340ba8..caa93643d 100644 --- a/scripts/smb-server-stats.nse +++ b/scripts/smb-server-stats.nse @@ -34,7 +34,7 @@ up to version 1.0.3 (and possibly higher). author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-system-info.nse b/scripts/smb-system-info.nse index 0fe950781..2e186a4f0 100644 --- a/scripts/smb-system-info.nse +++ b/scripts/smb-system-info.nse @@ -53,7 +53,7 @@ the system, besides showing a message box to the user. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} dependencies = {"smb-brute"} diff --git a/scripts/smb-vuln-conficker.nse b/scripts/smb-vuln-conficker.nse index 19bec077b..95bc0ce57 100644 --- a/scripts/smb-vuln-conficker.nse +++ b/scripts/smb-vuln-conficker.nse @@ -35,7 +35,7 @@ This check was previously part of smb-check-vulns. author = {"Ron Bowes", "Jiayi Ye", "Paulino Calderon "} copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","exploit","dos","vuln"} -- run after all smb-* scripts (so if it DOES crash something, it doesn't kill -- other scans have had a chance to run) diff --git a/scripts/smb-vuln-cve2009-3103.nse b/scripts/smb-vuln-cve2009-3103.nse index ef096ac8a..801fa8451 100644 --- a/scripts/smb-vuln-cve2009-3103.nse +++ b/scripts/smb-vuln-cve2009-3103.nse @@ -44,7 +44,7 @@ This check was previously part of smb-check-vulns. author = {"Ron Bowes", "Jiayi Ye", "Paulino Calderon "} copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","exploit","dos","vuln"} -- run after all smb-* scripts (so if it DOES crash something, it doesn't kill -- other scans have had a chance to run) diff --git a/scripts/smb-vuln-ms06-025.nse b/scripts/smb-vuln-ms06-025.nse index b281acc46..eaf4cebf1 100644 --- a/scripts/smb-vuln-ms06-025.nse +++ b/scripts/smb-vuln-ms06-025.nse @@ -46,7 +46,7 @@ This script was previously part of smb-check-vulns. author = {"Ron Bowes", "Jiayi Ye", "Paulino Calderon "} copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","exploit","dos","vuln"} -- run after all smb-* scripts (so if it DOES crash something, it doesn't kill -- other scans have had a chance to run) diff --git a/scripts/smb-vuln-ms07-029.nse b/scripts/smb-vuln-ms07-029.nse index 89b74e6d2..fe2b7e8bd 100644 --- a/scripts/smb-vuln-ms07-029.nse +++ b/scripts/smb-vuln-ms07-029.nse @@ -42,7 +42,7 @@ This check was previously part of smb-check-vulns. author = {"Ron Bowes", "Jiayi Ye", "Paulino Calderon "} copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","exploit","dos","vuln"} -- run after all smb-* scripts (so if it DOES crash something, it doesn't kill -- other scans have had a chance to run) diff --git a/scripts/smb-vuln-ms08-067.nse b/scripts/smb-vuln-ms08-067.nse index 6e905e79b..05a263448 100644 --- a/scripts/smb-vuln-ms08-067.nse +++ b/scripts/smb-vuln-ms08-067.nse @@ -40,7 +40,7 @@ This check was previously part of smb-check-vulns.nse. author = {"Ron Bowes", "Jiayi Ye", "Paulino Calderon "} copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","exploit","dos","vuln"} -- run after all smb-* scripts (so if it DOES crash something, it doesn't kill -- other scans have had a chance to run) diff --git a/scripts/smb-vuln-ms10-054.nse b/scripts/smb-vuln-ms10-054.nse index 917efbb71..9c6b7efed 100644 --- a/scripts/smb-vuln-ms10-054.nse +++ b/scripts/smb-vuln-ms10-054.nse @@ -39,7 +39,7 @@ Either with guest credentials or with specified username/password. -- |_ http://seclists.org/fulldisclosure/2010/Aug/122 author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln","intrusive","dos"} hostrule = function(host) diff --git a/scripts/smb-vuln-ms10-061.nse b/scripts/smb-vuln-ms10-061.nse index af5fedd86..24424bbdf 100644 --- a/scripts/smb-vuln-ms10-061.nse +++ b/scripts/smb-vuln-ms10-061.nse @@ -54,7 +54,7 @@ References: -- |_ http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx author = "Aleksandar Nikolic" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln","intrusive"} hostrule = function(host) diff --git a/scripts/smb-vuln-regsvc-dos.nse b/scripts/smb-vuln-regsvc-dos.nse index 27a861b09..e95eb3fba 100644 --- a/scripts/smb-vuln-regsvc-dos.nse +++ b/scripts/smb-vuln-regsvc-dos.nse @@ -34,7 +34,7 @@ This check was previously part of smb-check-vulns. author = {"Ron Bowes", "Jiayi Ye", "Paulino Calderon "} copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive","exploit","dos","vuln"} -- run after all smb-* scripts (so if it DOES crash something, it doesn't kill -- other scans have had a chance to run) diff --git a/scripts/smbv2-enabled.nse b/scripts/smbv2-enabled.nse index 6cc6d3f15..ba8281721 100644 --- a/scripts/smbv2-enabled.nse +++ b/scripts/smbv2-enabled.nse @@ -23,7 +23,7 @@ Checks whether or not a server is running the SMBv2 protocol. author = "Ron Bowes" copyright = "Ron Bowes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/smtp-brute.nse b/scripts/smtp-brute.nse index dd5bae959..ce0206c44 100644 --- a/scripts/smtp-brute.nse +++ b/scripts/smtp-brute.nse @@ -32,7 +32,7 @@ Performs brute force password auditing against SMTP servers using either LOGIN, author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} portrule = shortport.port_or_service({ 25, 465, 587 }, diff --git a/scripts/smtp-commands.nse b/scripts/smtp-commands.nse index aa23e6a31..c2a2de5ca 100644 --- a/scripts/smtp-commands.nse +++ b/scripts/smtp-commands.nse @@ -63,7 +63,7 @@ SMTP server. -- + Rewrite the script to use the smtp.lua library. author = "Jason DePriest" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/smtp-enum-users.nse b/scripts/smtp-enum-users.nse index 9ab0f66b1..5affee28f 100644 --- a/scripts/smtp-enum-users.nse +++ b/scripts/smtp-enum-users.nse @@ -49,7 +49,7 @@ An example of how to specify the methods to use and the order is the following: ----------------------------------------------------------------------- author = "Duarte Silva " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth","external","intrusive"} diff --git a/scripts/smtp-open-relay.nse b/scripts/smtp-open-relay.nse index f2b288c48..7a07a29ee 100644 --- a/scripts/smtp-open-relay.nse +++ b/scripts/smtp-open-relay.nse @@ -74,7 +74,7 @@ printed with the list of any combinations that were found prior to the error. -- * Rewrite the script to use the smtp.lua library. author = "Arturo 'Buanzo' Busleiman" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","intrusive","external"} diff --git a/scripts/smtp-strangeport.nse b/scripts/smtp-strangeport.nse index fe62c8218..7613d6380 100644 --- a/scripts/smtp-strangeport.nse +++ b/scripts/smtp-strangeport.nse @@ -12,7 +12,7 @@ system to send spam or control the machine. author = "Diman Todorov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"malware", "safe"} diff --git a/scripts/smtp-vuln-cve2010-4344.nse b/scripts/smtp-vuln-cve2010-4344.nse index 39ec22093..f8279e7fd 100644 --- a/scripts/smtp-vuln-cve2010-4344.nse +++ b/scripts/smtp-vuln-cve2010-4344.nse @@ -70,7 +70,7 @@ Reference: -- smtp-vuln-cve2010-4344.exploit argument. author = "Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit", "intrusive", "vuln"} diff --git a/scripts/smtp-vuln-cve2011-1720.nse b/scripts/smtp-vuln-cve2011-1720.nse index fc14c530a..d1b150618 100644 --- a/scripts/smtp-vuln-cve2011-1720.nse +++ b/scripts/smtp-vuln-cve2011-1720.nse @@ -44,7 +44,7 @@ Reference: -- @args smtp.domain Define the domain to be used in the SMTP EHLO command. author = "Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/smtp-vuln-cve2011-1764.nse b/scripts/smtp-vuln-cve2011-1764.nse index a27c2de93..208450bea 100644 --- a/scripts/smtp-vuln-cve2011-1764.nse +++ b/scripts/smtp-vuln-cve2011-1764.nse @@ -51,7 +51,7 @@ Reference: -- to be used. author = "Djalal Harouni" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} diff --git a/scripts/sniffer-detect.nse b/scripts/sniffer-detect.nse index 5910b698a..0621f743f 100644 --- a/scripts/sniffer-detect.nse +++ b/scripts/sniffer-detect.nse @@ -17,7 +17,7 @@ http://www.securityfriday.com/promiscuous_detection_01.pdf. author = "Marek Majkowski" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/snmp-brute.nse b/scripts/snmp-brute.nse index a1bfee52f..375583997 100644 --- a/scripts/snmp-brute.nse +++ b/scripts/snmp-brute.nse @@ -52,7 +52,7 @@ No output is reported if no valid account is found. author = "Philip Pickering, Gorjan Petrovski, Patrik Karlsson, Gioacchino Mazzurco" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/snmp-hh3c-logins.nse b/scripts/snmp-hh3c-logins.nse index 7f9345d92..a903ca9ae 100644 --- a/scripts/snmp-hh3c-logins.nse +++ b/scripts/snmp-hh3c-logins.nse @@ -43,7 +43,7 @@ http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.ht -- author = "Kurt Grutzmacher" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-info.nse b/scripts/snmp-info.nse index b273c1629..0e7acb02c 100644 --- a/scripts/snmp-info.nse +++ b/scripts/snmp-info.nse @@ -32,7 +32,7 @@ here as in the service version detection scan. author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "version", "safe"} diff --git a/scripts/snmp-interfaces.nse b/scripts/snmp-interfaces.nse index 05dfdf0bc..054a36476 100644 --- a/scripts/snmp-interfaces.nse +++ b/scripts/snmp-interfaces.nse @@ -37,7 +37,7 @@ successfully added. -- author = "Thomas Buchanan, Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-ios-config.nse b/scripts/snmp-ios-config.nse index 588e86e49..6ca6dc10d 100644 --- a/scripts/snmp-ios-config.nse +++ b/scripts/snmp-ios-config.nse @@ -37,7 +37,7 @@ Attempts to downloads Cisco router IOS configuration files using SNMP RW (v1) an author = "Vikas Singhal, Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive"} diff --git a/scripts/snmp-netstat.nse b/scripts/snmp-netstat.nse index 29237a5e3..74c1ccbef 100644 --- a/scripts/snmp-netstat.nse +++ b/scripts/snmp-netstat.nse @@ -30,7 +30,7 @@ newtargets script argument. -- |_ UDP 192.168.56.3:464 *:* author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-processes.nse b/scripts/snmp-processes.nse index 2bb830b44..c1fbe5b71 100644 --- a/scripts/snmp-processes.nse +++ b/scripts/snmp-processes.nse @@ -61,7 +61,7 @@ Attempts to enumerate running processes through SNMP. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-sysdescr.nse b/scripts/snmp-sysdescr.nse index e30b59dbd..3c8cb2e55 100644 --- a/scripts/snmp-sysdescr.nse +++ b/scripts/snmp-sysdescr.nse @@ -18,7 +18,7 @@ Attempts to extract system information from an SNMP version 1 service. author = "Thomas Buchanan" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/snmp-win32-services.nse b/scripts/snmp-win32-services.nse index 042c1a00d..9f8fda831 100644 --- a/scripts/snmp-win32-services.nse +++ b/scripts/snmp-win32-services.nse @@ -41,7 +41,7 @@ Attempts to enumerate Windows services through SNMP. -- DCOM Server Process Launcher author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-win32-shares.nse b/scripts/snmp-win32-shares.nse index eb14a1ad0..0d5f763bc 100644 --- a/scripts/snmp-win32-shares.nse +++ b/scripts/snmp-win32-shares.nse @@ -22,7 +22,7 @@ Attempts to enumerate Windows Shares through SNMP. -- C:\Program Files\Apache Software Foundation\Tomcat 5.5\webapps\ROOT author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-win32-software.nse b/scripts/snmp-win32-software.nse index 3a37b97ce..64d0100e0 100644 --- a/scripts/snmp-win32-software.nse +++ b/scripts/snmp-win32-software.nse @@ -53,7 +53,7 @@ Attempts to enumerate installed software through SNMP. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/snmp-win32-users.nse b/scripts/snmp-win32-users.nse index 6dc057146..6c83dded9 100644 --- a/scripts/snmp-win32-users.nse +++ b/scripts/snmp-win32-users.nse @@ -34,7 +34,7 @@ Attempts to enumerate Windows user accounts through SNMP author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "auth", "safe"} dependencies = {"snmp-brute"} diff --git a/scripts/socks-auth-info.nse b/scripts/socks-auth-info.nse index 99829be98..091e6d0eb 100644 --- a/scripts/socks-auth-info.nse +++ b/scripts/socks-auth-info.nse @@ -34,7 +34,7 @@ types: -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "default"} portrule = shortport.port_or_service({1080, 9050}, {"socks", "socks5", "tor-socks"}) diff --git a/scripts/socks-brute.nse b/scripts/socks-brute.nse index 5672334f4..1693404df 100644 --- a/scripts/socks-brute.nse +++ b/scripts/socks-brute.nse @@ -23,7 +23,7 @@ Performs brute force password auditing against SOCKS 5 proxy servers. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} diff --git a/scripts/socks-open-proxy.nse b/scripts/socks-open-proxy.nse index 067225a82..b206cb1fe 100644 --- a/scripts/socks-open-proxy.nse +++ b/scripts/socks-open-proxy.nse @@ -38,7 +38,7 @@ argument. -- --script-args proxy.url=,proxy.pattern= author = "Joao Correa" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "external", "safe"} diff --git a/scripts/ssh-hostkey.nse b/scripts/ssh-hostkey.nse index d9c707574..daccec3fb 100644 --- a/scripts/ssh-hostkey.nse +++ b/scripts/ssh-hostkey.nse @@ -131,7 +131,7 @@ gathered keys. -- author = "Sven Klemm" -- comparing keys from known_hosts file added by Piotr Olma and George Chatzisofroniou -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe","default","discovery"} diff --git a/scripts/ssh2-enum-algos.nse b/scripts/ssh2-enum-algos.nse index d03053c2f..f4f5d5e64 100644 --- a/scripts/ssh2-enum-algos.nse +++ b/scripts/ssh2-enum-algos.nse @@ -97,7 +97,7 @@ type. author = "Kris Katterjohn" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/sshv1.nse b/scripts/sshv1.nse index a9667a35c..b285cb698 100644 --- a/scripts/sshv1.nse +++ b/scripts/sshv1.nse @@ -6,7 +6,7 @@ description = [[ Checks if an SSH server supports the obsolete and less secure SSH Protocol Version 1. ]] author = "Brandon Enright" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} --- diff --git a/scripts/ssl-ccs-injection.nse b/scripts/ssl-ccs-injection.nse index f8eec3d66..7d4d6cb9d 100644 --- a/scripts/ssl-ccs-injection.nse +++ b/scripts/ssl-ccs-injection.nse @@ -7,7 +7,7 @@ local vulns = require('vulns') local have_tls, tls = pcall(require,'tls') assert(have_tls, - "This script requires tls.lua from http://nmap.org/nsedoc/lib/tls.html") + "This script requires tls.lua from https://nmap.org/nsedoc/lib/tls.html") description = [[ Detects whether a server is vulnerable to the SSL/TLS "CCS Injection" @@ -67,7 +67,7 @@ the server is vulnerable. -- |_ http://www.openssl.org/news/secadv_20140605.txt author = "Claudiu Perta " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "vuln", "safe" } diff --git a/scripts/ssl-cert.nse b/scripts/ssl-cert.nse index e785dc4d7..6f513f825 100644 --- a/scripts/ssl-cert.nse +++ b/scripts/ssl-cert.nse @@ -112,7 +112,7 @@ certificate. author = "David Fifield" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "default", "safe", "discovery" } diff --git a/scripts/ssl-date.nse b/scripts/ssl-date.nse index b56d7bfbc..9806151ed 100644 --- a/scripts/ssl-date.nse +++ b/scripts/ssl-date.nse @@ -35,7 +35,7 @@ Original idea by Jacob Appelbaum and his TeaTime and tlsdate tools: -- 4 author = "Aleksandar Nikolic, nnposter" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "default"} portrule = function(host, port) diff --git a/scripts/ssl-enum-ciphers.nse b/scripts/ssl-enum-ciphers.nse index 5b439c958..ff7ee8091 100644 --- a/scripts/ssl-enum-ciphers.nse +++ b/scripts/ssl-enum-ciphers.nse @@ -129,7 +129,7 @@ and therefore is quite noisy. author = "Mak Kolybabi , Gabriel Lawrence" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/ssl-google-cert-catalog.nse b/scripts/ssl-google-cert-catalog.nse index 6fc4abfa1..7b67e1ac2 100644 --- a/scripts/ssl-google-cert-catalog.nse +++ b/scripts/ssl-google-cert-catalog.nse @@ -28,7 +28,7 @@ matching domain name, it may be suspicious. ---|_ Days in between: 20 author = "Vasiliy Kulikov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "safe", "discovery", "external" } --dependencies = { "ssl-cert" } diff --git a/scripts/ssl-heartbleed.nse b/scripts/ssl-heartbleed.nse index 0cfddc0f1..78764ddf4 100644 --- a/scripts/ssl-heartbleed.nse +++ b/scripts/ssl-heartbleed.nse @@ -7,7 +7,7 @@ local stdnse = require('stdnse') local table = require('table') local vulns = require('vulns') local have_tls, tls = pcall(require,'tls') -assert(have_tls, "This script requires the tls.lua library from http://nmap.org/nsedoc/lib/tls.html") +assert(have_tls, "This script requires the tls.lua library from https://nmap.org/nsedoc/lib/tls.html") description = [[ Detects whether a server is vulnerable to the OpenSSL Heartbleed bug (CVE-2014-0160). @@ -39,7 +39,7 @@ The code is based on the Python script ssltest.py authored by Jared Stafford (js -- author = "Patrik Karlsson " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "vuln", "safe" } local arg_protocols = stdnse.get_script_args(SCRIPT_NAME .. ".protocols") or {'TLSv1.0', 'TLSv1.1', 'TLSv1.2'} diff --git a/scripts/ssl-known-key.nse b/scripts/ssl-known-key.nse index c36f3ad94..a630e40f1 100644 --- a/scripts/ssl-known-key.nse +++ b/scripts/ssl-known-key.nse @@ -40,7 +40,7 @@ large to include with Nmap) list. -- author = "Mak Kolybabi" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery", "vuln", "default"} diff --git a/scripts/ssl-poodle.nse b/scripts/ssl-poodle.nse index eac30742d..9f43c6935 100644 --- a/scripts/ssl-poodle.nse +++ b/scripts/ssl-poodle.nse @@ -50,7 +50,7 @@ your TLS ciphersuites. author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} diff --git a/scripts/sslv2.nse b/scripts/sslv2.nse index 1c3314c45..6a5a76433 100644 --- a/scripts/sslv2.nse +++ b/scripts/sslv2.nse @@ -37,7 +37,7 @@ supports. author = "Matthew Boyle" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe"} diff --git a/scripts/stun-info.nse b/scripts/stun-info.nse index 7fcd5504e..37438efd3 100644 --- a/scripts/stun-info.nse +++ b/scripts/stun-info.nse @@ -19,7 +19,7 @@ Retrieves the external IP address of a NAT:ed host using the STUN protocol. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/stun-version.nse b/scripts/stun-version.nse index 2c8e706bd..679b58639 100644 --- a/scripts/stun-version.nse +++ b/scripts/stun-version.nse @@ -17,7 +17,7 @@ information from the response, if the server attribute is present. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"version"} diff --git a/scripts/stuxnet-detect.nse b/scripts/stuxnet-detect.nse index 7e7aa4feb..d52e8e6e1 100644 --- a/scripts/stuxnet-detect.nse +++ b/scripts/stuxnet-detect.nse @@ -29,7 +29,7 @@ for the filename is given on the command line. -- |_stuxnet-detect: INFECTED (version 4c:04:00:00:01:00:00:00) author = "Mak Kolybabi" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "intrusive"} diff --git a/scripts/supermicro-ipmi-conf.nse b/scripts/supermicro-ipmi-conf.nse index 58c3d6974..ccd6ffc54 100644 --- a/scripts/supermicro-ipmi-conf.nse +++ b/scripts/supermicro-ipmi-conf.nse @@ -38,7 +38,7 @@ References: --- author = "Paulino Calderon " -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"exploit","vuln"} local http = require "http" diff --git a/scripts/svn-brute.nse b/scripts/svn-brute.nse index 514b72437..89ee9b745 100644 --- a/scripts/svn-brute.nse +++ b/scripts/svn-brute.nse @@ -39,7 +39,7 @@ Performs brute force password auditing against Subversion source code control se author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} portrule = shortport.port_or_service(3690, "svnserve", "tcp", "open") diff --git a/scripts/targets-asn.nse b/scripts/targets-asn.nse index 8ff379b2a..dcef9c117 100644 --- a/scripts/targets-asn.nse +++ b/scripts/targets-asn.nse @@ -31,7 +31,7 @@ http://www.shadowserver.org/wiki/pmwiki.php/Services/IP-BGP -- |_ 171.64.0.0/14 author = "John R. Bond" -license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" +license = "Simplified (2-clause) BSD license--See https://nmap.org/svn/docs/licenses/BSD-simplified" categories = {"discovery", "external", "safe"} diff --git a/scripts/targets-ipv6-map4to6.nse b/scripts/targets-ipv6-map4to6.nse index 241a2e14c..821b16943 100644 --- a/scripts/targets-ipv6-map4to6.nse +++ b/scripts/targets-ipv6-map4to6.nse @@ -55,7 +55,7 @@ generates IPv4-compatible IPv6 addresses. -- author = "Raúl Armando Fuentes Samaniego" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery", } diff --git a/scripts/targets-ipv6-multicast-echo.nse b/scripts/targets-ipv6-multicast-echo.nse index 640b79cee..5354835d0 100644 --- a/scripts/targets-ipv6-multicast-echo.nse +++ b/scripts/targets-ipv6-multicast-echo.nse @@ -26,7 +26,7 @@ on a LAN without needing to individually ping each IPv6 address. author = "David Fifield, Xu Weilin" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","broadcast"} diff --git a/scripts/targets-ipv6-multicast-invalid-dst.nse b/scripts/targets-ipv6-multicast-invalid-dst.nse index 403ea8f62..b88a6146f 100644 --- a/scripts/targets-ipv6-multicast-invalid-dst.nse +++ b/scripts/targets-ipv6-multicast-invalid-dst.nse @@ -29,7 +29,7 @@ packet. author = "David Fifield, Xu Weilin" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","broadcast"} diff --git a/scripts/targets-ipv6-multicast-mld.nse b/scripts/targets-ipv6-multicast-mld.nse index eb9f5d19f..24b0c16be 100644 --- a/scripts/targets-ipv6-multicast-mld.nse +++ b/scripts/targets-ipv6-multicast-mld.nse @@ -33,7 +33,7 @@ responses from their multicast group. -- author = "niteesh" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","broadcast"} diff --git a/scripts/targets-ipv6-multicast-slaac.nse b/scripts/targets-ipv6-multicast-slaac.nse index 2bcab885b..eb240aa0d 100644 --- a/scripts/targets-ipv6-multicast-slaac.nse +++ b/scripts/targets-ipv6-multicast-slaac.nse @@ -42,7 +42,7 @@ See also: author = "David Fifield, Xu Weilin" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery","broadcast"} diff --git a/scripts/targets-ipv6-wordlist.nse b/scripts/targets-ipv6-wordlist.nse index d2ce3a0e1..48d18673a 100644 --- a/scripts/targets-ipv6-wordlist.nse +++ b/scripts/targets-ipv6-wordlist.nse @@ -42,7 +42,7 @@ that form addresses in a given subnet. -- author = "Raúl Fuentes" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery" } diff --git a/scripts/targets-sniffer.nse b/scripts/targets-sniffer.nse index 51311b0ae..265d21dc5 100644 --- a/scripts/targets-sniffer.nse +++ b/scripts/targets-sniffer.nse @@ -38,7 +38,7 @@ argument or -e Nmap option to define which interface to use. author = "Nick Nikolaou" categories = {"broadcast", "discovery", "safe"} -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local interface_info diff --git a/scripts/targets-traceroute.nse b/scripts/targets-traceroute.nse index d0416d8e8..f4989b0b8 100644 --- a/scripts/targets-traceroute.nse +++ b/scripts/targets-traceroute.nse @@ -23,7 +23,7 @@ script argument is given. -- 09/02/2010 author = "Henri Doreau" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/teamspeak2-version.nse b/scripts/teamspeak2-version.nse index 8b43def06..dba5a78b1 100644 --- a/scripts/teamspeak2-version.nse +++ b/scripts/teamspeak2-version.nse @@ -21,7 +21,7 @@ password set, the exact version, name, and OS type will also be reported on. -- Service Info: OS: Win32 author = "Marin Maržić" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "version" } local payload = "\xf4\xbe\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\z diff --git a/scripts/telnet-brute.nse b/scripts/telnet-brute.nse index 67fa63ede..3710c3bf5 100644 --- a/scripts/telnet-brute.nse +++ b/scripts/telnet-brute.nse @@ -33,7 +33,7 @@ Performs brute-force password auditing against telnet servers. -- (default: "true") author = "nnposter" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {'brute', 'intrusive'} portrule = shortport.port_or_service(23, 'telnet') diff --git a/scripts/telnet-encryption.nse b/scripts/telnet-encryption.nse index 7648fd5c8..5f7ea5627 100644 --- a/scripts/telnet-encryption.nse +++ b/scripts/telnet-encryption.nse @@ -35,7 +35,7 @@ categories = {"safe", "discovery"} portrule = shortport.port_or_service(23, 'telnet') author = "Patrik Karlsson, David Fifield, Fyodor" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" local COMMAND = { SubCommand = 0xFA, diff --git a/scripts/tftp-enum.nse b/scripts/tftp-enum.nse index dc61b69aa..2bd079943 100644 --- a/scripts/tftp-enum.nse +++ b/scripts/tftp-enum.nse @@ -35,7 +35,7 @@ http://code.google.com/p/tftptheft/. -- |_ bootrom.ld author = "Alexander Rudakov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "discovery", "intrusive" } diff --git a/scripts/tls-nextprotoneg.nse b/scripts/tls-nextprotoneg.nse index 4664dd626..18b92e152 100644 --- a/scripts/tls-nextprotoneg.nse +++ b/scripts/tls-nextprotoneg.nse @@ -36,7 +36,7 @@ For more information, see: author = "Hani Benhabiles" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe", "default"} diff --git a/scripts/tor-consensus-checker.nse b/scripts/tor-consensus-checker.nse index 5dcb18592..56a3e6ffa 100644 --- a/scripts/tor-consensus-checker.nse +++ b/scripts/tor-consensus-checker.nse @@ -22,7 +22,7 @@ number of requests and make lookups quicker. --- author = "Jiayi Ye" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"external", "safe"} -- from Tor 0.2.6.7/src/or/config.c diff --git a/scripts/traceroute-geolocation.nse b/scripts/traceroute-geolocation.nse index 9719d3fa1..3ec0ac2dc 100644 --- a/scripts/traceroute-geolocation.nse +++ b/scripts/traceroute-geolocation.nse @@ -65,7 +65,7 @@ saves the results to a KML file, plottable on Google earth and maps. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "external", "discovery"} local arg_kmlfile = stdnse.get_script_args(SCRIPT_NAME .. ".kmlfile") diff --git a/scripts/unittest.nse b/scripts/unittest.nse index a009e8950..ee18abbf2 100644 --- a/scripts/unittest.nse +++ b/scripts/unittest.nse @@ -21,7 +21,7 @@ Runs unit tests on all NSE libraries. author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe"} diff --git a/scripts/unusual-port.nse b/scripts/unusual-port.nse index 904d77881..2dd83bb25 100644 --- a/scripts/unusual-port.nse +++ b/scripts/unusual-port.nse @@ -21,7 +21,7 @@ service is actually running on each port. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "safe" } diff --git a/scripts/upnp-info.nse b/scripts/upnp-info.nse index 49b7d721b..92efaad71 100644 --- a/scripts/upnp-info.nse +++ b/scripts/upnp-info.nse @@ -26,7 +26,7 @@ Attempts to extract system information from the UPnP service. author = "Thomas Buchanan" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} diff --git a/scripts/url-snarf.nse b/scripts/url-snarf.nse index 26fd303c2..e0aab648c 100644 --- a/scripts/url-snarf.nse +++ b/scripts/url-snarf.nse @@ -32,7 +32,7 @@ ctrl+break is issued, by setting the timeout to 0. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe"} diff --git a/scripts/ventrilo-info.nse b/scripts/ventrilo-info.nse index 3404b2fca..a5f105c30 100644 --- a/scripts/ventrilo-info.nse +++ b/scripts/ventrilo-info.nse @@ -152,7 +152,7 @@ Original reversing of the protocol was done by Luigi Auriemma -- author = "Marin Maržić" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "default", "discovery", "safe", "version" } local crypt_head = { diff --git a/scripts/versant-info.nse b/scripts/versant-info.nse index d37bb8ec6..d46e29a7d 100644 --- a/scripts/versant-info.nse +++ b/scripts/versant-info.nse @@ -39,7 +39,7 @@ a Versant object database. author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service(5019, "versant", "tcp") diff --git a/scripts/vmauthd-brute.nse b/scripts/vmauthd-brute.nse index a1896ca3a..8c91983d7 100644 --- a/scripts/vmauthd-brute.nse +++ b/scripts/vmauthd-brute.nse @@ -23,7 +23,7 @@ Performs brute force password auditing against the VMWare Authentication Daemon -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} diff --git a/scripts/vnc-brute.nse b/scripts/vnc-brute.nse index 8be5489c0..89c1ef560 100644 --- a/scripts/vnc-brute.nse +++ b/scripts/vnc-brute.nse @@ -32,7 +32,7 @@ Performs brute force password auditing against VNC servers. -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"intrusive", "brute"} diff --git a/scripts/vnc-info.nse b/scripts/vnc-info.nse index 55c038bc8..8c7ae6e72 100644 --- a/scripts/vnc-info.nse +++ b/scripts/vnc-info.nse @@ -7,7 +7,7 @@ Queries a VNC server for its protocol version and supported security types. ]] author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "discovery", "safe"} --- diff --git a/scripts/voldemort-info.nse b/scripts/voldemort-info.nse index 9ef29e02c..621b0d34e 100644 --- a/scripts/voldemort-info.nse +++ b/scripts/voldemort-info.nse @@ -38,7 +38,7 @@ Retrieves cluster and store information from the Voldemort distributed key-value -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/vuze-dht-info.nse b/scripts/vuze-dht-info.nse index ea277d147..95306c6d8 100644 --- a/scripts/vuze-dht-info.nse +++ b/scripts/vuze-dht-info.nse @@ -35,7 +35,7 @@ Retrieves some basic information, including protocol version from a Vuze filesha -- @args vuze-dht-info.allports if set runs this script against every open port author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} diff --git a/scripts/wdb-version.nse b/scripts/wdb-version.nse index 5e5f0a229..52b26ee51 100644 --- a/scripts/wdb-version.nse +++ b/scripts/wdb-version.nse @@ -38,7 +38,7 @@ http://www.kb.cert.org/vuls/id/362332 -- lanswitchCmm: author = "Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" -- may also be "safe", but need testing to determine categories = {"default", "version", "discovery", "vuln"} diff --git a/scripts/weblogic-t3-info.nse b/scripts/weblogic-t3-info.nse index 97622a127..b17192735 100644 --- a/scripts/weblogic-t3-info.nse +++ b/scripts/weblogic-t3-info.nse @@ -5,7 +5,7 @@ local nmap = require "nmap" description = "Detect the T3 RMI protocol and Weblogic version" author = "Alessandro ZANNI , Daniel Miller" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default","safe","discovery","version"} portrule = function(host, port) diff --git a/scripts/whois-domain.nse b/scripts/whois-domain.nse index 9bf6ae749..5f0e6cacc 100644 --- a/scripts/whois-domain.nse +++ b/scripts/whois-domain.nse @@ -76,7 +76,7 @@ Attempts to retrieve information about the domain name of the target --- author = "George Chatzisofroniou" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "external", "safe"} local ipOps = require "ipOps" diff --git a/scripts/whois-ip.nse b/scripts/whois-ip.nse index a2c15b625..dc4b77a48 100644 --- a/scripts/whois-ip.nse +++ b/scripts/whois-ip.nse @@ -84,7 +84,7 @@ the RIRs. -- |_ country: US stateprov: CA author = "jah" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "external", "safe"} diff --git a/scripts/wsdd-discover.nse b/scripts/wsdd-discover.nse index 5b23363fb..411517035 100644 --- a/scripts/wsdd-discover.nse +++ b/scripts/wsdd-discover.nse @@ -32,7 +32,7 @@ services (.NET 4.0 or later). -- Created 10/31/2010 - v0.1 - created by Patrik Karlsson author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery", "default"} diff --git a/scripts/x11-access.nse b/scripts/x11-access.nse index 51be26d06..f434956fc 100644 --- a/scripts/x11-access.nse +++ b/scripts/x11-access.nse @@ -24,7 +24,7 @@ the xhost + list. In this case, script will display the message: -- true author = "vladz" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe", "auth"} portrule = function(host, port) diff --git a/scripts/xdmcp-discover.nse b/scripts/xdmcp-discover.nse index 8b538e13c..5414599a8 100644 --- a/scripts/xdmcp-discover.nse +++ b/scripts/xdmcp-discover.nse @@ -22,7 +22,7 @@ Requests an XDMCP (X display manager control protocol) session and lists support -- author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"safe", "discovery"} diff --git a/scripts/xmlrpc-methods.nse b/scripts/xmlrpc-methods.nse index 46d54d7c1..75fcfc785 100644 --- a/scripts/xmlrpc-methods.nse +++ b/scripts/xmlrpc-methods.nse @@ -36,7 +36,7 @@ of system.methodHelp for each method returned by listMethods. author = "Gyanendra Mishra" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe", "discovery"} diff --git a/scripts/xmpp-brute.nse b/scripts/xmpp-brute.nse index c8c88373c..2d33df1cf 100644 --- a/scripts/xmpp-brute.nse +++ b/scripts/xmpp-brute.nse @@ -36,7 +36,7 @@ Performs brute force password auditing against XMPP (Jabber) instant messaging s author = "Patrik Karlsson" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"brute", "intrusive"} portrule = shortport.port_or_service(5222, {"jabber", "xmpp-client"}) diff --git a/scripts/xmpp-info.nse b/scripts/xmpp-info.nse index 859f520f5..7019c6c52 100644 --- a/scripts/xmpp-info.nse +++ b/scripts/xmpp-info.nse @@ -69,7 +69,7 @@ server capabilities. If possible, studies server vendor. author = "Vasiliy Kulikov" -license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"default", "safe", "discovery", "version"} diff --git a/todo/done.txt b/todo/done.txt index 2c5ef6087..e7a258b4b 100644 --- a/todo/done.txt +++ b/todo/done.txt @@ -27,7 +27,7 @@ o Web: We should probably distribute RapidSSL intermediate certificate o The XML version of Nmap lists and describes the six port states recognized by Nmap near the top of the "Port Scanning Basics" section.  That can be seen in the HTML rendering at - http://nmap.org/book/man-port-scanning-basics.html.  But in the man + https://nmap.org/book/man-port-scanning-basics.html.  But in the man page (nroff) rendering, the list is missing and it just gives the title: "The six port states recognized by Nmap".  UPDATE: Now the descriptions for each state appear in the man page, but the headings @@ -53,7 +53,7 @@ o Fix a segmentation fault in Ncat when scanned with the SSL NSE o Investigate how we're ending up with OS fingerprints in nmap-os-db with attribute names like W0 and W8 when according to the docs they are only supposed to be W1 - W6 (and plain W). - http://nmap.org/book/osdetect-methods.html#osdetect-w. See also + https://nmap.org/book/osdetect-methods.html#osdetect-w. See also http://seclists.org/nmap-dev/2013/q4/68. Need to determine how these are getting into the file (from Nmap itself or our integration/merge tools) and fix that then remove them from the @@ -212,7 +212,7 @@ o Remove the -q/FAKE_ARGV stuff from Nmap, since I don't think people use that any more. o We should document Ron's sample script - (http://nmap.org/svn/docs/sample-script.nse) in docs/scripting.xml + (https://nmap.org/svn/docs/sample-script.nse) in docs/scripting.xml so that new script writers know about it. - Decided to remove it instead. Justification: "It is a great idea, but nobody seems to use it (for example, there were no replies to @@ -223,7 +223,7 @@ o We should document Ron's sample script to the one they want to write and start with that. 2) As a way to learn more about the format of an NSE script. Users instead seem to use our documentation - (http://nmap.org/book/nse-script-format.html). So I'm deleting it + (https://nmap.org/book/nse-script-format.html). So I'm deleting it for now. But if folks miss it, they're welcome and encouraged to say so on dev@nmap.org and we could consider putting it back and/or improving it" @@ -312,7 +312,7 @@ o Update our mswin32/OpenSSL to newest version (previous update was September 2010 to 1.0.0a). o Nmap should have a better way to handle XML script output. - o done: http://nmap.org/book/nse-api.html#nse-structured-output + o done: https://nmap.org/book/nse-api.html#nse-structured-output o We currently just stick the current script output text into an XML tag. o Daniel Miller is working on an implementation: https://secwiki.org/w/Nmap/Structured_Script_Output @@ -321,7 +321,7 @@ o Update more web content in real time (or near real-time, or at least on an automated basis rather than requiring manual checkin and update). In particular: o NSEDoc generation - o [done] SVN dir (http://nmap.org/svn/) should be removed and a redirect + o [done] SVN dir (https://nmap.org/svn/) should be removed and a redirect added to https svn server. o Maybe Nmap book building o Maybe the generated files in nmap.org/data/ @@ -364,7 +364,7 @@ o [NPING] At least on my (Fyodor) system, I get errors like "READ-PCAP Example: # nping --tcp -p80 -c1 scanme.nmap.org - Starting Nping 0.5.61TEST4 ( http://nmap.org/nping ) at 2012-02-16 17:52 PST + Starting Nping 0.5.61TEST4 ( https://nmap.org/nping ) at 2012-02-16 17:52 PST SENT (0.3307s) TCP 192.168.0.5:42005 > 74.207.244.221:80 S ttl=64 id=23109 iplen=40 seq=1015357225 win=1480 RCVD (0.3524s) TCP 74.207.244.221:80 > 192.168.0.5:42005 SA ttl=51 id=0 iplen=44 seq=3197025741 win=14600 nping_event_handler(): READ-PCAP killed: Resource temporarily unavailable @@ -850,7 +850,7 @@ o A program to canonicalize and tidy nmap-service-probes. | % = @ #). o Retain line breaks and comments. -o Document IPv6 OS detection at http://nmap.org/book/osdetect.html +o Document IPv6 OS detection at https://nmap.org/book/osdetect.html o Script review: - New scripts from Paulino: http-wordpress-brute and http-joomla-brute, @@ -1020,7 +1020,7 @@ o If possible, Ncat, in listen mode, should probably listen on the system's - Done. Tested on scanme with David & Fyodor on 7/18/11. o Right before the release, we could build Ncat portable and post it - on http://nmap.org/ncat/. + on https://nmap.org/ncat/. - Actually we did that for 5.59BETA1, which is good enough for now. o CHANGELOG updates [Fyodor] @@ -1464,7 +1464,7 @@ o Dependency licensing issues (OpenSSL, Python, GTK+, etc.) o libdnet o Small NSEDoc bug: - http://nmap.org/nsedoc/scripts/dns-zone-transfer.html contains 'id + https://nmap.org/nsedoc/scripts/dns-zone-transfer.html contains 'id \222\173' near the bottom. This is presumably due to misparsing this line from the script: local req_id = '\222\173'. Given that we don't use IDs any more, maybe we can just get rid of the functionality. @@ -1576,8 +1576,8 @@ o [NSE] In the same way as our -brute scripts limit their runtime by more intense qscanning. o [Web] We should see if we can easily put the Insecure chrome around - Apache directory listings and 404 pages (e.g. http://nmap.org/dist/ - and http://nmap.org/404). I think we may have had this working + Apache directory listings and 404 pages (e.g. https://nmap.org/dist/ + and https://nmap.org/404). I think we may have had this working before the move to Linode, so maybe check conf/httpd.conf.syn. o Do a serious analysis if and how we should use the NIST CPE standard @@ -1616,7 +1616,7 @@ o [NSE] Investigate sslv2.nse falsely reporting SSLv2 as being o [NSE] The NSEDoc for some scripts includes large "Functions" sections which aren't really useful to script users. For example, - see http://nmap.org/nsedoc/scripts/snmp-interfaces.html. Perhaps we + see https://nmap.org/nsedoc/scripts/snmp-interfaces.html. Perhaps we should hide these behind an expander like "Developer documentation (show)". I don't think we need to do this for libraries, since developers are the primary audience for those documents. @@ -1659,14 +1659,14 @@ o Add this patch for compilation on OpenSolaris. http://blogs.sun.com/sdaven/entry/nmap_5_35dc1_compile_on o Now that we've put the ndiff, ncat, and nping man pages under the - scope of the book (e.g. http://nmap.org/book/ncat-man.html), we need + scope of the book (e.g. https://nmap.org/book/ncat-man.html), we need to add a redirect from the old locations and also update our links. o Make sure the long output lines in Nping's man page are OK for the book. See r18829 and r18864. o Update "History and Future of Nmap" - (http://nmap.org/book/history-future.html) to include all the news + (https://nmap.org/book/history-future.html) to include all the news since September 2008. [Fyodor] o Fix Win7 networking issue reported by Luis which seems to have been @@ -2081,8 +2081,8 @@ o [NSE] Consider MongoDB scripts and libraries from Martin Holst Swende. o [NSE] Document Patrick's worker thread patch in scripting.xml (see http://seclists.org/nmap-dev/2009/q4/294, - http://nmap.org/nsedoc/lib/stdnse.html#new_thread, - http://nmap.org/nsedoc/lib/nmap.html#condvar) [Patrick] + https://nmap.org/nsedoc/lib/stdnse.html#new_thread, + https://nmap.org/nsedoc/lib/nmap.html#condvar) [Patrick] o Make Nmap 5.21 bugfix-only release @@ -2103,7 +2103,7 @@ o [NSE] Consider DAAP script from Patrik Karlsson. [merged to trunk] o NSEDoc left sidebar should include a link to - http://nmap.org/book/nse.html below "Index". + https://nmap.org/book/nse.html below "Index". o Consider enhancing the new OS Assist system to handle version detection too. [We decided not to do this as David noted that Doug's @@ -2149,9 +2149,9 @@ o Look at new Kerberos script from Patrik Karlsson. o Add feature to http library to let user set the user agent to be used. The NSEDoc for this feature should probably tell what our current default user agent is ("Mozilla/5.0 (compatible; Nmap - Scripting Engine; http://nmap.org/book/nse.html") [David] + Scripting Engine; https://nmap.org/book/nse.html") [David] -o On our NSEDoc pages (e.g. http://nmap.org/nsedoc/), perhaps the link +o On our NSEDoc pages (e.g. https://nmap.org/nsedoc/), perhaps the link text for scripts should not include the ".nse". Basides saving horizontal space, this may improve the sorting so that the likes of "citrix-enum-apps" comes before "citrix-enum-apps-xml". Also, we can @@ -2179,7 +2179,7 @@ o Talk to Libpcap folks about incorporating (at least some of) my o Nping -- like hping3 but uses Nmap infrastructure and to a large degree the same command-line options as Nmap. - [We now have an alpha version at http://nmap.org/nping/] + [We now have an alpha version at https://nmap.org/nping/] o Further investigate SCTP functionality, as some people reported problems (see this thread: @@ -2364,7 +2364,7 @@ o Add --confdir option to Zenmap. See o Update our Winpcap from 4.0.2 to 4.1.1 (http://seclists.org/nmap-dev/2009/q4/128). This is a bit complex because we have our own installer. See - http://nmap.org/svn/mswin32/winpcap/Upgrading-Instructions.txt. + https://nmap.org/svn/mswin32/winpcap/Upgrading-Instructions.txt. o Change Nmap to not show the "Host not scanned" lines in list scan @@ -2504,7 +2504,7 @@ o Device categorization improvements other category really fits them well. We should use a combined system for nmap-os-db and nmap-service-probes. o Add a classification sect1 to os-detection.xml - (http://nmap.org/book/osdetect.html) to cover how Nmap handles OS + (https://nmap.org/book/osdetect.html) to cover how Nmap handles OS classification. It should include a list with descriptions of each device type recognized by Nmap. Version-detection.xml should reference (link to) it in the approprate place. @@ -2572,7 +2572,7 @@ o Update nsedoc to refer to 'libraries' rather than 'modules'. This and 'Modules' on the list of right, and affects the url (we should change /modules/ to /lib/ and then have Fyodor add a redirect for people still using old URLs) and the title of the module pages like - http://nmap.org/nsedoc/modules/base64.html. [Patrick] + https://nmap.org/nsedoc/modules/base64.html. [Patrick] o [Ncat] Prefix Ncat stderr messages with "Ncat: " to make it clear that they are coming from Ncat and not the remote server (or typed in @@ -2718,7 +2718,7 @@ o [NSE] We need to deal with libraries which improperly use global long history of bugs caused by non-local variables defined in NSE libraies and often causing deadlocks. -o The Nmap refguide (http://nmap.org/book/man-performance.html) says +o The Nmap refguide (https://nmap.org/book/man-performance.html) says "The --max-parallelism option is sometimes set to one to prevent Nmap from sending more than one probe at a time to hosts. This can be useful in combination with --scan-delay (discussed later), although @@ -3108,7 +3108,7 @@ o Change Nmap signature files to use the .sig extension rather than - not needed since I decided on .asc extension rather than .sig * Update the generation scripts * Update the book documentation - - http://nmap.org/book/install.html#inst-integrity + https://nmap.org/book/install.html#inst-integrity o Ask Coverity if they'll scan latest version of Nmap. [Fyodor asked David Maxwell on 5/14/09 ] @@ -3135,7 +3135,7 @@ o [Ncat] Maybe we should create an SSL cert with no passphrase during on. But people who need that will have to buy a key from a certificate authority in any case. We could create the key by using the "openssl" command line tool as shown in - http://nmap.org/ncat/guide/ncat-advanced.html#ncat-ssl, or maybe + https://nmap.org/ncat/guide/ncat-advanced.html#ncat-ssl, or maybe better to have a way for ncat to do it using openssl calls. [David] o [Zenmap] Should probably give some sort of widget indication that a @@ -3261,7 +3261,7 @@ o Prepare for Summer of Code o NSEDoc script/module documentation pages should probably provide a link to the script/module source code (except for C modules). The link format should probably be of the form - http://nmap.org/data/scripts/[script].nse and + https://nmap.org/data/scripts/[script].nse and /data/nselib/[module].lua. NSEdoc can assume they already exist there, as we'll probably put them there using the same system we use to copy other stuff to the data dir. @@ -3622,10 +3622,10 @@ o Find way to document NSE library script arguments and perhaps have them bubble up to scripts themselves. For example, I had to read the SNMP library source code to determine the script argument to specify the SNMP community name for snmp-sysdescr - (http://nmap.org/nsedoc/scripts/snmp-sysdescr.html). Maybe we could + (https://nmap.org/nsedoc/scripts/snmp-sysdescr.html). Maybe we could just standardize on something like we do with SMB library and the - scripts which call it (http://nmap.org/nsedoc/modules/smb.html, - http://nmap.org/nsedoc/scripts/smb-check-vulns.html). [David] + scripts which call it (https://nmap.org/nsedoc/modules/smb.html, + https://nmap.org/nsedoc/scripts/smb-check-vulns.html). [David] o If it wouldn't bloat things too much, it would be nice to include ndiff in the Nmap win32 zip distribution files. diff --git a/todo/nmap.txt b/todo/nmap.txt index 18cb25c66..5e94aa502 100644 --- a/todo/nmap.txt +++ b/todo/nmap.txt @@ -222,7 +222,7 @@ o Treat the input to the escape function in xml.cc as UTF-8, not just byte->rune and rune->byte functions as in http://plan9.bell-labs.com/sys/doc/utf.html. -o We should probably redo the Nmap header (e.g. on http://nmap.org) to +o We should probably redo the Nmap header (e.g. on https://nmap.org) to make it more attractive. Or, at a minimum we should update the screenshots and think about which links we really need (some of those pages aren't really updated any more). @@ -282,7 +282,7 @@ o NSE WORK (note that this is mostly infrastructure because script http://seclists.org/nmap-dev/2011/q2/307. [Henri and Hani?] o Revive the Nmap Public Source License project (need to find an open - source attorney to review it). http://nmap.org/npsl/ + source attorney to review it). https://nmap.org/npsl/ o Also take close look at Mozilla's license modernization project: http://mpl.mozilla.org/scope/ @@ -648,7 +648,7 @@ o Scanning through proxies servers. Whoever does this should probably start by reading the code for the main port scanning engine (ultra_scan()) and also the version detection code (service_scan()). And the version - detection paper at http://nmap.org/book/vscan.html. If you + detection paper at https://nmap.org/book/vscan.html. If you understand all that, you may be ready for this project :). This is important, because it is easy to do poorly. The tough part is high performance and clean code which is general enough that all @@ -672,10 +672,10 @@ o [Web] Consider adding training/introduction videos to the Nmap site that far): http://www.splunk.com/product o The Zenmap translation system - (http://nmap.org/book/zenmap-lang.html) has been pretty successful + (https://nmap.org/book/zenmap-lang.html) has been pretty successful so far. We should consider doing the same for Nmap. After all, we already have the reference guide in 16 languages at - http://nmap.org/docs.html. We should definitely try to use the same + https://nmap.org/docs.html. We should definitely try to use the same translation methods for Zenmap as we do for Nmap. In fact, maybe we can create a combined PO file Nmap, Zenmap, Ncat, and Ndiff so that they can all be translated and maintained together. Something to diff --git a/todo/nping.txt b/todo/nping.txt index 741674781..2388e16c5 100644 --- a/todo/nping.txt +++ b/todo/nping.txt @@ -41,7 +41,7 @@ Questions, comments and patches should be sent to the Nmap development mailing list (nmap-dev). To suscribe: - + /***************************************************************************** @@ -542,7 +542,7 @@ [DONE] Move nping to /nping in SVN rather than being in nmap-exp [DONE] Set up automatic conversion from nping XML man page to HTML for - http://nmap.org/nping/man.html [Fyodor working on this] + https://nmap.org/nping/man.html [Fyodor working on this] [DONE] Include signature files in new releases. [Requested by Henri Salo] [DONE] It would be nice to have Bzip2 packages. [Requested by Henri Salo] @@ -632,7 +632,7 @@ [DONE] Update documentation for option --delay, including that now, time specification as float numbers is supported (eg: --delay 0.1 meaning 100ms) -[DONE] Change info about TODO file in http://nmap.org/nping web page. +[DONE] Change info about TODO file in https://nmap.org/nping web page. - If you wish to contribute code to Nping there is a TO-DO list you can have - a look at (file "TODO" in the source package). + If you wish to contribute code to Nping there is a TO-DO list you can have diff --git a/zenmap.spec.in b/zenmap.spec.in index c037e3687..ec5452d7c 100644 --- a/zenmap.spec.in +++ b/zenmap.spec.in @@ -16,10 +16,10 @@ Name: %{name} Version: %{version} Release: %{release} Epoch: 2 -License: http://nmap.org/man/man-legal.html +License: https://nmap.org/man/man-legal.html Group: Applications/System -Source0: http://nmap.org/dist/nmap-%{version}.tgz -URL: http://nmap.org +Source0: https://nmap.org/dist/nmap-%{version}.tgz +URL: https://nmap.org BuildArch: noarch # Disable automatic dependency calculation because we want to provide diff --git a/zenmap/COPYING b/zenmap/COPYING index 9ea02cf3c..bea68e8cc 100644 --- a/zenmap/COPYING +++ b/zenmap/COPYING @@ -1,3 +1,3 @@ Zenmap is distributed under the same license terms as Nmap. See the COPYING file in the Nmap tarball, the man page legal section, or -http://nmap.org/man/man-legal.html . +https://nmap.org/man/man-legal.html . diff --git a/zenmap/README b/zenmap/README index cb3e63453..c61a5702b 100644 --- a/zenmap/README +++ b/zenmap/README @@ -56,6 +56,6 @@ Links: [1] Python official website - http://www.python.org [2] GTK official website - http://www.gtk.org [3] PyGTK official website - http://www.pygtk.org -[4] Nmap official website - http://nmap.org +[4] Nmap official website - https://nmap.org [5] PySQLite2 official website - http://initd.org/tracker/pysqlite [7] Umit website - http://umit.sourceforge.net diff --git a/zenmap/setup.py b/zenmap/setup.py index 1176f45ba..68e60825a 100755 --- a/zenmap/setup.py +++ b/zenmap/setup.py @@ -548,7 +548,7 @@ class my_uninstall(Command): # all the operations. COMMON_SETUP_ARGS = { 'name': APP_NAME, - 'license': 'Nmap License (http://nmap.org/book/man-legal.html)', + 'license': 'Nmap License (https://nmap.org/book/man-legal.html)', 'url': APP_WEB_SITE, 'download_url': APP_DOWNLOAD_SITE, 'author': 'Nmap Project', diff --git a/zenmap/share/zenmap/docs/help.html b/zenmap/share/zenmap/docs/help.html index 20e3b9c28..30307606c 100644 --- a/zenmap/share/zenmap/docs/help.html +++ b/zenmap/share/zenmap/docs/help.html @@ -6,9 +6,9 @@

Nmap/Zenmap Help

-

Nmap is documented extensively online. Zenmap documentation exists and is improving. You can find it all at the Nmap documentation directory. Further information is available from the Zenmap web page itself. +

Nmap is documented extensively online. Zenmap documentation exists and is improving. You can find it all at the Nmap documentation directory. Further information is available from the Zenmap web page itself. -

On Unix, you can also run man nmap and man zenmap to learn about your installed Nmap version, though the online Nmap docs are more comprehensive and always up-to-date. +

On Unix, you can also run man nmap and man zenmap to learn about your installed Nmap version, though the online Nmap docs are more comprehensive and always up-to-date.

For quick reference to the most popular Nmap command-line arguments, run nmap -h. diff --git a/zenmap/share/zenmap/locale/de.po b/zenmap/share/zenmap/locale/de.po index cb72c7b3d..1661d7185 100644 --- a/zenmap/share/zenmap/locale/de.po +++ b/zenmap/share/zenmap/locale/de.po @@ -706,7 +706,7 @@ msgid "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" msgstr "" "Wie ein Fehler gemeldet wird\n" @@ -729,7 +729,7 @@ msgstr "" "\n" "Code-Patches zum Beheben von Fehlern sind sogar besser als Fehlerberichte. " "Grundsätzliche Anleitungen zum Erstellen von Patches mit Ihren Änderungen " -"finden Sie unter http://nmap.org/data/HACKING. Patches können an nmap-dev " +"finden Sie unter https://nmap.org/data/HACKING. Patches können an nmap-dev " "(empfohlen) oder direkt an Fyodor gesandt werden.\n" #: zenmapGUI/SearchGUI.py:325 diff --git a/zenmap/share/zenmap/locale/de/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/de/LC_MESSAGES/zenmap.mo index 3e9099cda2d52df1f16ccea9ee19cc757e4bfea2..aecb10aeb99641099563f639aec5b7f9598f1ec6 100644 GIT binary patch delta 7755 zcmXZg33$!N8prWTLLwwiA`6n6g%CuEB}lcm>e^%9)f!t8weMRwwx-q=L93-zMQydk zo@(v8S}$o;)zbFip{d@|(&B!9X8JsRJ~MOvGxN?nGyikq`ANU2r~Ky6^^PfI%#_N; z_#0#XOg6@Y&#)L4uVzdjMxj10hh?!c7Qt4|&dzjH{{gN(9@T#us{dTqp5xk=RWn{w zln>U>P#CvjaomMveT+GZRjA*oZU-n?!v+?MskA4dCg_XVI2aq?AJ`mIYubJ@Z~^r> z7=$q?#>8S$ir1KbQD{bkBG14`9D{Xn9xC$VsEnLNt^6v6;%zLAk5GYx)H0?gMqzmz zkLvdcYJnS2<84I+vfJwlM^F=Az+k+C0r;o;{5fjkpxV|5RKT&QEvbqcu&w*NCu+h> z*FG3oyqSO+cN4Pn#=Fx!kcS%ZIEG+8D)Kvc2p^&%-&4m9upjmLaV&$EP$_+cB{72i z`3I|De@uGWn3gynqwoi-*F2_Bf`)MN9f1`v3;&IYxCXQRj5&i7h@iu3b|q&U+KK!c z+5XYasu)GT`dALTV;D|FjlUQb;07$t`7?(oD0LSw2Ct(s@f4Nv;Kp{ZBa!({MQ1W< z&ugRlzmDqH5|x=Au6+P1rox{xX%xv0z8M| zc-wvc7$d3sH8aK+qfq0U|Q0dcHhP#+NVh&!XyAUHt}XqWkz_ zh0X0*h(ZnY5|+kSP!o2+%G^_{Iy19n5LtT*bpEY#^AjM}1Us0rseKXUEsoZGQFpMQc)G(8R zUJwhgI4(u);aXJ0U!o#D;k?2IKHD{)UfG9e-)>t{p1C!X4}ultwOyNx^C8MNRD6(T?YjhpBr|-?o=f z^F8S3?*B6yw4!32Y$_vA0VJTVR|C{m^gwMvUwi|zQ2h>~7IGTLVLm2dTV5V{_!fFF zwF}>r*c27O*e>M18ig4&gyIg=o*u)CcmcH~YnV*|?7$Gr!xs~x0?0>wsoX?8{{)qx zz^-~fFpW#>d9Ztff-K`~i zSQq15+QWJp^ER$Py$KV0an*4(4nuEBI;&CxZpLoC-B$Fm5k{cSL=0-Bi5QL5FaldR z`=C-h4jbT1tca(PSjd>S(>!ViO3U&W`qRz%3)ESzDemD~~?p*hI4l3YP_~QFNmqIuVdH6D(!$MeefW6-y zTu8kazJkAFb*%cPG3l6&P4ED6kxU@3!-m)kKgCrz5gQL;`+T@9*pm94!Q`KFVd@Mq zCKs1rGNui+Kd&cX8ueUkjn7aWTXAw);4;+8?qDSThC0jv!|hg;M!J}?sN1m+_1t=# zjt7Rb|3xV@8ez{s8`QO$kD729?!kNL!8IdoW_F_bl`QCoBcb%t)E`aO4g zM%m}$Q0)~)amO@39U5N4*O7B!yr@(D3v!i>-)Ljr!yc#r@1s`!7&Wm@nCeAPbq{KS zk{E&&Tze{pQhyz_#qGQlu2SfXKV!|YOo~zCY+%0Q?X@X}nm8M^@`b2Fv>Y|@M$|RS z#Yz~;UE_M0S5OlzM+LGH^?WWyqIWNa!W7P(b^oVR2&5q!qi{azJ+J{w;9=B+S5O1q#BjWe znVjb5$b~SOlkD^7QHSj|YQ_IxVV(=-^``*B*z$Btz|nfg&fx!{G(15C^5zuw1xH~T z9z$iK#8gf#sd@<&$d+uovfZddcNCR@i|CKnu?qf-T5Yyf_oo>=+pc&I zYT}?d#(acfs1$C-s<)8Pg#--4+8B#zu08-2_$1VGGf@5BN1dHdP^W!8*1!X( z!2Wob{HvhL{bJ=Y%@PJPS*UJC4CDo&w3exbd;PcWK#_Z<84dmL(o%TeuHa44R}TKMWBvcvrw zfd@&!x(|5o(>`d0{da;~RKLp@hu+^QRG?7eQ+rzLVm$RMtcbI)3~oaYUP5K;Hde*o zTzeef$;wnRD!^3KikqXhqARLjAJjNQki+XWlPLt#Fdvn|k5Pwc1L_{{aP4PY`**1K z!)@nNe4l#cXY}{s_XBFH@>W?7pvFCh>URkh(0vTk{eMV7kp`}|fs{f;nuzLH!&wj2 zu>}&j>44h04AhFJqFzjk+~@01zjpIbXC@!DumaS=9;2`Bf9M(;X*enqQK$(jx_Vvr zc~cCdy_Ku?K~0#23Um_o!`bMM1*q{Jq4vDc=Qe&e2Pf>vc z(O3v$u`ni}GE@meuomh%Hb%WE`#Zg;l`chPYAcq<(-?riuODw03%Qnk3|JC-8l<&-QL4}_#w8#F6-@h8&DZK;_4Sr8MwEe{OkTcp+S2TvcXPV z0n1RYhuXv5r~oHp4g3HV;3?EVw@?{)fO;-uqx~9A!WU-+wRIV&z$c(GKE+ExD}2ZK z0qVhZ7>N5&TX75(=w;_U)M@tpf-8#As7$U#1+*V4;Ww!Mf1v^n*kpgm#G$spyP1Ll z*oA(0+<6*xPtRcy{1LU1JE*Pr8#R&sXi$4`)XL&f&nKduOGafj1&d;H^k66C)_6?@ zh2k`fM?EkT8(|K9h~Huij@n}PejzG#A7c=%Mg_19)&DSRWoJ zs^{4MVHA{_ai|Q;NA2;V7Y~qn*M1hY;)|#)x`CSTAu82o8?R_yKuH)vwRNt&p6SR+ z&1lrwn2DosCFbh>m)veAK7~r%S^O6Bu^evOVfX$DYT)~*j6Fl8Hh8Cfg_py!)LWpo zVkl}0M&n4FfC}VSROWnkk^k8gic?TZmf{sWg2iz8Zhjf#I@HQ9qN-drW~?4H-eaO!oj z6t>3Fn1!52GY#8f^)HQSgVV7YUcyHh%gceJnuxEgC%+>9YVdx|?>9`@Z{L7_<7(=w z4)Egv(+=`}$Gi9o4m!l2-q_)=4J`SHwKnST{TsEFjj%elLM>Bw|l)FmANyRjki&Ua^MLYz!?0Vx)=Si`$@Z% zeVyLn6w>toj>8{u7QS)Hn9uPRDu6ks?V-Dh8t5)+r4L;FF=~&^8N2sE7(}%Msyz;M zXe*;uUKh!P*Q8Mhq@fq;`VByx+QFy?N1z6phK2Dx)FE1o%G~Fu=bvH+^!${?|NbQ@R*0@xk}F1h<~&o^qd?Uf|_KecwfXdSe|PQcBlh zHO&66{n@<>6;Pqe_HV|n*q!=z?24gWEoER3M&m?`Vt(^J1+8!!&c?4%r#da)e);sn zWz?r)QH=eTe+9)#sD6X6GmggsJdZkT2RNb1=nYhcf5IYI;Oc*&H;e|~tM=P267_;e zMWwho24fG5!hxuPvau1)$2oWzm5Dy2Wd!En7wCV@ZsB&+)*VKjos+0Q&R-+{Dtt$S z4#_Qy!2;Cb3jVy)I#4zWn?Mp zjkx?K`A?w`ddo)M7_~=x(1XWO5$9t(UUzkK+ddb7%1|UK<>gR;HpFmjff}bbYU_q$ zB))~pbdHyTQnLmX@kR{6J??>%sLWhLU%Z2Q?jDxG$5;GE9gT?>= delta 7747 zcmXZg33$!N8prWTh>%1UiPRwp31Vw(A(qyqYD-Z2a$^f6_N9#_YB^EGwF_;zr3>m> zTBTxXXi@u4tffWKTcK5Mi&Dk?{xZ|&@qA|H{AcE!cV_+I_6gX%xX)iY83r=a@JcI^vY`_h`m zYXbOS6%Bs45rc6n#`zet9}}qO*Rlgd*0zB~V}07IpeE>t({UKSihp2hte0r}O~q{L zvoHvw>KGG)RqA-DP-sPiA|HT}I0hTy98}~7Q5iXbTKOdm!yD+q2dF?o>KfAXBAk>}%HypM|ft9o{TU8v6wVl19PrSt*5fD!D^ z-}oX9z$y(mFE}4d<7KPYJfcv7hH&y-660|YzKrp>3a1w`<`}+31fBk2S8}46oyfPj z?O)oNfTiiz1S?<<496_g`0t_uT!+D&KeLB|QkRF(cmmRm;_zy3ac#lYdRz%{BB#orNK&_DR?cXJHY%jykos zP%Hnm+i*cnS<4^+R=sD86h?~CQAOyr;f*yp97l^#Y-eBSv322j6_EAS5T zjxh_`*weco1F2s|O>hhK-q0P>76qf)<4^%LKxMWgDzE{lfV>kZRHHB#6Mx>%n2E2uyRpaL9=Lopkb!KbKk3bp4ShB-^37UsdC7>|Lv|1~IR1uwY= znmF5{224e*EDiPCK-B3UhT5Vjs0rsdKXC19oHea-@PvG z{y(KbD+=gpQyGB@AP#lCnxeL%Cu$4&;XiR8s^7P$g&f69ynt1)Jui<5qRxz6b*o>jL9SbHz1#kiNrE(4R{9{yxil*9$ zqOcV8Dp&@aqB7dsOFi+jaosFTWGc*wk;SAKcv)$(lQ30>Sg75!L6e4KYjt%f67RF+O?fnkM zh17fFOZY#mg$YA=DPbRMiMx@DWQy`SY=*sYIj+PB*nAjoJs)lhwxymwocwbxOwtJ6 z0r(!)z~qtk=k<6@p}q;*;Zsz{ww#Ure2m1qsKZ?34ZBsPkS-<`bvv?A&#lF& zxcd$EKY&8BH|-f{hq_ktQ4=o3T>J$?a8-uQ%obF??N}7|qd%TNZP9tu8M=Y$_skhQ z+CCS9YL6ey9n%0wH2eb_Bj>_QMxFAXk*jQc#}E|uLd}!Keu$ zF%;undp!)J-WavT9lR92r_dFD#@geIxrv@k8<@{{du;+x6Hh~}JR5b0mZ1Xq40X*m zVHFJJu5rCgL)1jeP=PE*J--Pf(VI)bkHRU`1m{r`Tt^SyL1oCF6QolfiuybTHBc4Q zifW?zH$_eO8Y&Z=Q2lzKGBOx7-gxxY{ePQ6F&d^}X`GLG53IuyxED3ydDMW{FamGk zKu+^B!VFBo z1E@@dP2t;(R8>O-^2Kz!vaP5?w-1$pJS>8jF#&%PtYZ+$+3}H@_KtUZFp$1Au z4bTvt=gTd5y zV^utfZyzD&+oCQ6)r`!e}NgS*1W%(fb{(tZ zZ>~L>?_^~v0To~pYQ@Q@t>}*GmxdZ=7>4QoPoz+shIyzIE<+unwWxcX&dhn#!tS6J_9y!4{)ha>Mp^=uiBhNu;$6MI z`@98))859_(@+zpqXM0P{qbK|1n;26yN}v)-_UmH38MJ zC2E2`r~pQxCLV(dWQubJ>blLvZ*U2A#IEb?cxzD^+Ux44P#L(rj{NKXKB7T;6#SW; zxFW_t=q z`9A8w)mRL7ptfQ^D$uje+o;oQ)*CYuJg7{rLAE;D6!wS5BDsQqGZJT4SXK!Ss zCIfXgrsHV*1aox%OK!FkA4a9_I9|l_SOGU~v3q|GL#h9Q%Glqi)CO*~ukbjGqn?5~ zWW!NgkbxPPi3;RbROX(ecNT@9Z8jx~@dEX|7>G;1;!kE=javCtOu##+!&WBO2AqU{ zQE!Y2u;F$aKx!8UJq(8VcoT>0<$u3m$9*=ig#Fe!sKfUXYAavGTG$55;$+kUKEe>p@lxnQVJ|Ax z9-^3v9gyuc=dc~lK4|}X{T^FT?|aDZ^%_*>j^cE@jyjZs58D7n;}6s)VG&F{Vz;ud z(>szvnjXMRyn-{a+fnu%ub~2%dCVTVi>QI}Q7gUc>VKm4_!;_Pz;U~kp{Vv~)S<0{ zT6ujW6JFDbLNOY8p|0OR)TtecdT=Qc8U0V% zA1WO%jd~Wg!)w@A_rKODo6<#imJcrB`?w*Gd&+%oahjjn)OVaQ1wU5n@{m%x8f)S^ z=j_k!EvSHe&)dHlyJJu4n=lnaxLV4<5G;e^u{86W_b6zE8*vtXgF4l%zO!FG{css| zF9u-LMc!Um3Ds{1cEfRa7f+%N+b&M1GI|x2;Tu>K@3{Iy^oG-*zd&Ol0`-DOLZvtv zi(?Ngje}7Gy@Snh9?r(Is7$1hmNzjQ*JI(!b_+M5wr&sV>>NS`a`H0ySK&JvbV#mY zG~PiSuD~lckZ@GJBF3;K30MQ$T(wU8(FXSUHTyrYwxTkVe%%I;fm-NPR7Mt~-iS-D zlm9vtLT=c|o1yk-8;0NkRK(}89A0+yXQ=1=ezF;gK&3nm6=+k8z!cOteNbCB5+m^~ zRHn1N6qK4zQ4z1hP~7GoIE2c~_vni^QP17RSo{;?(DPqA;mfEk>fr2w9_jyzxLLlwhkSAZDpoDz8|{;m TR5{H*XK{@UU2|GaZ`kMm`$~h= diff --git a/zenmap/share/zenmap/locale/fr.po b/zenmap/share/zenmap/locale/fr.po index 60f5b5dbb..172ebff5a 100644 --- a/zenmap/share/zenmap/locale/fr.po +++ b/zenmap/share/zenmap/locale/fr.po @@ -702,7 +702,7 @@ msgid "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" msgstr "" "Comment rapporter un bug\n" @@ -724,7 +724,7 @@ msgstr "" "\n" "Les code correctifs pour réparer un bug sont encore meilleurs que les " "rapports de bug. Les instructions de base pour créer un correctif sont " -"disponibles sur http://nmap.org/data/HACKING. Les correctifs peuvent être " +"disponibles sur https://nmap.org/data/HACKING. Les correctifs peuvent être " "envoyés au nmap-dev (recommandé) ou à  Fyodor directement.\n" #: zenmapGUI/SearchGUI.py:325 diff --git a/zenmap/share/zenmap/locale/fr/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/fr/LC_MESSAGES/zenmap.mo index cdbe7f15e56f6c916f5357c409a8efa014e6df76..60260a1163c8349e29baedb1515af8fe12972fcd 100644 GIT binary patch delta 7751 zcmXZh2Yi%88prY36i7nICWHhCCIkWjX@LYH#X<~S2qlCTN~8spVu=JnvJ?R^^!AaX zC{>C_F%+pH1Pp>w6;5mv55YqPK|}@a_h;tr{CsC--rubf&<;=`*#;JeO=z!;nqVMK#Sxf}xA8e_l4AS4 ziF2tJVkpKoGA0gdH}VLJSy^QcnI&HBH#6d9pC`!^AfCzXHhBr z11n$@`|}Uh!@*d)sWBaK4#wbjR-d^?p&Sk6$#)di#G&{UCgNJ0>Tk^FIF<;yJ#ANV zqNSb4zm@G@*;yZB=$D4ou@6S#MAY~TQ2}nmFwUPjL_w)Ljj{MWDiilnDKFdF?sYUW zzp3R+LhX4fs(%YqzmBNP^mXmSP$?gc3Zwu_;XJi7zgbK{1FS$jun8yQK|F=6+t|IV z*w*e@9BSeO)Qal4_H@)ZZJk-DKn7qCjzsm#cTPlKAPt2S)NwAV!*bL$+<@w^%YA+b z72ruMk5}C1_b{5ee>-FRFa|YlENYwt)R{_l^>p`n*LLJz6ZdotgHdPUMO1qM_P|0c zg_lvM_Bv|izqyODqbAJ4ir5F$?=@7vLe%?WB`Oo!PyrnFQP4_1Lrr|n`7MS} zzl!|mJhdZV%@}k-kPysbVWi}HP*br1ezBee;p)d;- z*=`KQW2kF%9yP%4sOuD(VNZEOEK5BNwUSP#40Lnt+0J38Tal02f@!ETG8b8(&n$2s zyo(xeJ?7$0)C#I}vMWu+1nSSC0v&=1FdtvUd8iCNK#dd7nFERCoYAO-#b6ND#4@`7 z4Jc>@Pr3)voEfMAvr#L19`)Q%)af6A+M-FQ31>Q&xc2qVZP<{{KSo{mo2Z4o+=W2Y z@D>HVAm(BiE=KL)I#k4aQ4t??o<^ne0R!~h z?OD`(H?!RRe?Ws)RHnO4WfUra1l09PM{Px4)D{fHUN{uh?;vU+$8ijv$J*G1m&YD_ z1HIU!C*PFV78O8#Px9Y@!kaWi;C9rWeu`)CG-^xMGMfU}j^VfmA5Dk~;5_O}68akDuqrj+X3T!xZN&f^VHE02#G+Q3h?TJc zMqvl%091;{U^>2qweUC+i@AeiF>@ea?f3;U74QE+#ymsANK}e8VGMqXJYz1Qu3ziH zHjs|El6rSk`#n_3%@C^>TTzWecFzpL(YOz%V53}q?%{5HbpHc}+Pw|OQhX5Yj76=u zy8FC7>d-WDrlD4xfx7?wP-kN}>I{uXe|!ry?hN<&d{n@z@zM8x5ry(J?7^mZ5(6+~ zn7!X#oJYMsHpg4o5bM8SOb+H?8~g;hNG6!qVN2|fD{wWA!`8#uJ`cAAJ5s+kg8XwX z%o8JxDZ)jVgzZP!pVwotJ@q2&gbz?1GdMXNa4BkK*DxA?LmlSQFWarEgmf|0P`6_q z>bVU#89#ZM{STqg>J@tiI-{=D9MptMaTop%y}0&Oo0%P`etR$okD#v83Dg#yL!F^3 zsD2Nf-aPwU6;yl8JnonVc!Gwfu?2E2j1P6nuOe63_`hb%Z0w5)@CIt-_fQk-gsC2c zs(VorRKReo>DrrM1oalEE$-^0aDhS({4b{DGbzT5v4Q!$Zm&%l)WlO!E1!otM9WYU ze}KAXMff;IaM!qAra5Y&WvD<_qMk3pX!Px-5J=$^YJzj92`*zL`~{VvAWo1@c?9b7 zDyV^KqgK=q)ju6IVJB23x}o~@L1p9x)OcgjPxpT^gE5o&;ysE+HMA3FEA&x=uecnl|a$PDV<51eiTT!%{e7F7EI4938>jah(R^kq_5 zO`!+=iJG``p*`(APaFJ4`@98fQV*MN|GZ8`Wg-g|z)m4gLmzOzoNDx>ODK2uQ7!L8oHq(8-q&KI@DerKpnCh7>NNZ z>`E%4wyXwf0liU~8jX)$EU2@z2$hLts0^(^Enq8pbpwkjXs^zq2KWy3;8oOn;CIwO zp?vAdf57M+;bEGaQS4%x@Y~2*f5xO3c%! zh%-=Ik%NIa1{F|&s~4hDIT!WZY8-`oQGwQ7Ycr67@zk534tp=uf(D^ad-{rNn2JlN zFF*y-;C-9o78pRi2L@sv)D{gut#~AA!11UR7orZ?YK+BVRK_l0Jl;iZb;Wh$KaoP! zb+%($RLAF0hiW1!#mmqiH=!o}5EamV=ONU}N^m!x!7QA$-i~tx6{y)@ueBF7Zo>`a zUx(;f8e}iji{&L$05hHIQD07nu>t;o`gV-iXjfJTbz53s0*=5sI2SeXK2!#dqt3uZ zEQLS&+yl3qo)7F{2}eDch7>Jr7w7s?chbFIL=uOwZcRU#TKZPbws7UA1aW6s5A5`md0uB^V!Y?sMEg~LvS;O z;cjF+pE*iF1AUEp;5w$_9prze?q+*7E?^M#+o;stN1gtFEp~zmSeAM{R3Ob!8B9lw z+YxiHC+f`Y!qU3`KTuFAe?n#8KGsGLZxu~c7nQ0M^kP#C$9AZJdt)sejO9EWI#i%5 zKC~I!fXYxY>I|L7Jp3KkGrt*HWG61S&325&%d}U)`slyi9>!$U^~yjEnCt4}P|q#E zI(P^b@UN(?x`VIaU#PP%Vu#&=Dd>BLh6NOovEEL$0dr8PZ2pn`gQOj5<&*JAoR7LC zCsEJcKz(`rje0JGJE#C+P=Usy+8d#^q$S2+#%}T-L17pTy7%Ky9hSKIW~@s61S-`x zF&_WHY8bo6p6V93oca*V#K67w50zfnnfm+q7ygMG@b`Vz<@?FM8rpr#Un6)M`ONG% z!0$iIqfzzd2l;pScn^QX#fNyWqp#QoHt4WDbfZvvpO0GU1WdrU@iE-wJcinepL`TL zQP6Bj&>8b_0xrZqQ7fADsqPA|P;7+*N^Az!VI1{iI32HJDa<=+0~v=0sK1G7Z}pk| zZs~wJ#J+wMI#L*gI+goSsZ2h`>laU94rU&=d%X<;jfz6!ldYraj$7As9<=A)ZE^?xE-G&+J0f zingFK)#<#Qs5h#<90%iiyn){T*f-;S)cp_t+GZ>YgQ!1_dP63ouPlXT6v|;+RI0Pl zi^H97U=`{!P|tmUnfNhI!N?2t{jnIwQa_Hnu+2AiJkPgw<>gQTR6?DNYTuH71&~BT zd3*|^u`4RVVW?ESj5-_B@D>*0FIey$Z#NwAz0KgjANU(Ub<|-Dx@gEsVNiCrm_5 zSRXy8|7dF#Q{hol)H!ar$Kx&9SEaPa6F>iO{I7nop7}ef9`P&j6cto^+t06!DGI4k a+n>pcQfuXu_PkoODCtsn7&G-`-~R*B@p_H` delta 7751 zcmXZg2Yk=RAII@af2+hwNk5M zE4BChYiYIADF1k~>{-Tl6I_qosAeSe7)$NY{R^P4@xJ3N;$6B3Nc zV~ly4XiNycz#t4xGA1uZp+1kpSS*VH*xcFP*&WrtzpIZ#^`D69Ki##@b?pn2jMoJ6 z!Acr(<0karHjMQ#<}jA0o|9|`h^%M>D~4~<9*>%!7f!)JSPvg#Q>>a|`(@x9>eDbE z7OiAVag49zr9$By8Wee7jKtws9cQ2-KZ?r88Pv)zV;J7VD13qnB&4!2X&8m2a3reV zV$=e&P~&Yv1+v}i3Wrb=pT}U#L4SPeK7WatIH-y>92Iae)RvS-4cN+k-VHTjKi578 zS-csA8h1Ui^TxZ?J+KQk;86_4OQ^_m@F4z)ihM^^JHU6S&yQjWynssS6D)|~?9abg z4*Oz!HO>pp!oqmP>NU?O7upTpTKc2@1jqF|)e8=utG1SDd zs1=oS?R8P(G;+2@1=14(a4@Rh2hLA%8m>ik*x^1ufC}&|hT~25 z`7?~9?%S9jj6#iD6g5sP>P#iOdR_N<>&E0?6L)Y8eNbm%0IGc)cED+v2XCNG?H$z0 z|8VWOn%G+tgnFMup`I^^<1qpAViqc(EvRu0HX;9t^cW3V`59FGva4T1P4qjyUSU&v z7NSrCC14a*M@`rk3t<;jzhS6;(@^h=WvEPKqXIbOrJ$7_M@@Xu`3nY8zk$o~9`cSc zvzyt|dl-YLUqMZ92ld|29n%(hQ0=j(fU2P~+XfX_UsOQeF%%Lg%tS@D6Z7E-)HS+< z8sHJ?It8_`r#uORsn=D80RqXt}q>9`HG zg5oXhN-JX=^*X3P`=SCIfdg?4DuXXjKy7Dp z)PS8)E9-%JE**9H2cfoTB5J}J&M#d18fP{p^Z8!Xb$@_b*!!&sL=96Z=mjwwJ-7h1 zhpSN$??y#@%y}M_%FD=N&2JckmD<<<+o1yNjLN_eOu-LP^Q?C58_}ynlubbseTSOp z6h`9@_yC`vI^Iro*A5k6uC{gy3LzK7q~IhRkDA!0ogFVX9-{6+ecN6@&G(?4yZbk~#?#1DUK7-ZuTB~Uqf)dU3*!;w8FL+V{TlSOfi%PA)Z3xj zpP^Fz%IWFHv($?ryJvdi2>cc&V@kR)jd3TwzW;vx?cRo99zKY07DcT%&V61Ub!bwY zwNWc>j=KNdP-kNx>I{uVKb(phce?w0E-K&^`1<>QGlg&(c40LeHXU#~}D6Y86>CB8s)Y|hDPh6_|S5$z%qgMV5HSsG~_vfUk?ma|c?+}cawXA14{Hdg$|nEzqaNE?{XD0^)JQ4>!_t$YsZ5G_Il@-^z3ZN_*E z<*sqPOm);mi%@|qLp{G4BhkB)LT(D@P!n84O>hIF@E$5d{+uA4@=(<0#Zd#rqgIrJ z>R%T%VGC3yQc?Z7pfd6lluAa51O( zCF(GJInD-Lg4bLG^%|(aT4P?G>x~L?!mQ&yx(mX{? z++w;t?d?!|cMDVSF(zV}8TNO<4p@=;SX2f#qCbYrv=bLZ)yrTsCSo~kiGetFCizdN zFqMW%cptUrB|ou&R7DL?6V=|(*$MTF#31xwCMr`4um~Haach2Kc0djd>cct0eY}KYR~$j4$Dwf zAQMojpNe{Zk#jw&-(L6mX;h#$P-o^Je7%5`Hp4~Gm-$T!h1^&LNr`z26>&4vR-|EW z9DxdGtgC0DQaKCt+;SX(yHJ6aU1c+nj4{-!pbmQn)Pj1US9|)tYxo!!QlEO z;+mL?dOOUGol#rV1GVBor~${IR-B1CWXrJ_9zbR68phxg)K*8XA^)W*M6aM1Tjze%%8uYJJdf>g##%eh4OE~nu>=NZ*>MxI$iEIzZ5m_; z)QjakQ~=YRt5IK02Qdk+qP`tNzP2liN8Og17>5Hf0cW8m-i^w@3Dg<*74zU7uY2Hu z^A+l_c-GkmOQJ9J3aAt(qqe3NYQUD5fqhUD=b$Fcx8D8*R0MT48e%C-!%6rtYAe0| z8*GPQREmo_V^AwBiTSW5YAc$eQr{I7NKe!m`T+fLvip3db1rH@pJ5=bM-T2m#`Bt^ z6g1F}s0VVe3O+{uZ^~}8XX7Ufp#BJzx_?lo-*=OpAOeG_C!hkUhDvoE)VNKt2ewC@ zx$Wq$`+t>!Qh6Jdfq$?pzCuk@mbZ&im5d=+6+^KRYT%Ce2KL7MJ{&q!pi4H}46Z?C z=m6>rUBqGd5Z5xl>6dLM4&7oqhT~1zi(v)y*=i4C66$(2Lk-y1)kmS8n~Mp!9~JOD z)K)#lq4*4S76xv!Taba?1vJd1P!SWh^N$LchDv3%9rh2BMyQof#J6w`>Xw{AJ$D!N z<@Gn}xd85<0w{zEv^c80B5F(OVqt8yi~NUCNT)&feiW+1=dQjUbze`TQhgs|@Hxg} zk=^!G*Tlut`(P^ieQW42@Muf*s06tnQ*9_ymLHxx*~iNShtjBe zwFB%Y{)M;jvxEGz3ywQv1M79z9=gG(y&sNR>3EF8|6oyE=RA(uirZcaEh)UjL~OyV zAK`fX6rZA2G~=l53a?OXfIW`c46MT9)Q@8(=3pKidfWyw3inZ;gleyM!hW|jK^ZdV?`UO}274uQQg*qdTP!pQd zwjPGmy(XGMAni%$hc!?W)Iz1G0jgs+)P(P$&d6}AgPEx3Phvehk6J*)8JpQHSe<&V zv-aN;YGE_#D==L-eL$fh4IR(%TMsV53~YFwA0OV?IFfqU1t!O7xEKFMy{LA4ZzsBs z3ZT{xTusct&UgpgVf~AC0bgJQ^=0VMo^Gd*7mwhlcn)>C`(3iXW@n;Sv;mc==0Dnr zI-=@}P!q1kdl>waeKY=py8oWbHe&@afO;9!8!`#K!4%%4kRKbOQr!tdaDa0(MpK`L zdM*o7aSu+$u%GSw<1-vh{RHmB2EW+xUZJ)w^ok9jAnI(yTp|AopgaxXSOX)m6)M7X zRH}xc&ce8m6& diff --git a/zenmap/share/zenmap/locale/hi.po b/zenmap/share/zenmap/locale/hi.po index a900eee74..7c40a4a2a 100644 --- a/zenmap/share/zenmap/locale/hi.po +++ b/zenmap/share/zenmap/locale/hi.po @@ -672,7 +672,7 @@ msgid "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" msgstr "" "बग रिपोर्ट कैसे करें\n" diff --git a/zenmap/share/zenmap/locale/hi/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/hi/LC_MESSAGES/zenmap.mo index 764fc99375b2c9b018d1d546742d434663840426..171170bc46e3ce243a294f2660dbe6f35cc7107d 100644 GIT binary patch delta 7752 zcmXZhc|cZG8prW-Sri3*-2eeu1OWjRR0L5n3B{${D$#Nycgd~EG)=vwX{Bf?Wm;A) zMT?Er;F40A<(6d@T3D8jON&%mmNqtx&iD78JAcgQoOACz%X6M{?~8qRG3fh?K`YAK znL)-poMB8IW6YnK#`y3$hGN4kW9nfv>Ut|o#0(6<{+>fTOHj{G^6Ilu&o4kdU*@%! zd+qD8jBDz1p@N2Bdf!!Z>n;!T)>6}ULim?Joc8Qj^; zuHi=of1UF+t^3QxoL7}V0SUio2#Q#tsZ%}0S zIszHrwD!zI?RgIB`R=Ia`k^8-!fT&|3i(XbMCM~1T%~r#H)|=VgAJ$~w%|hi06)i~ zUUn~=_qKZ$hZ;BuwW79Odm*Zy-kyU|6B&&mI2HBWEYC;K4W?l!1wFVD^}q|LWB5Ai zfnDD94^b2R44dJ3@A@^2pdQ%Am;j7M^&5-oCkd5P9lUy>cm4K0#9sps^%};Za^YT7 z`+OXNOR)}~LuG9(YUP)__Tawu)P$klC()?;lW{(_!FsqEHKFaOe)jbx{+j7WG-%~V zQT3Bv{S0cLU(mn8TWu~xqdIDXQP>qV;9zWy!%@#YfO>8z>V2^h6^U)A3G8<%Xr+fy z1J`(di}k6W!;N?mdB>QQx7qAHfT7e+p$4c$y*C`rn6}7=YEMEKL6sb?`gtIED4MS>7HSP%l8OWB@7xcY5u^JSU+}#VphoJci1V zmB<2J^OSetMO25c;RM`?T0#5(yV4v?qJ9f%qT^8$oQ3z|DpUloqxuONNJ3&0&j{4Q zqA>(hF;wS2i-J~=@7++~*&o&6Fx1NKLESeImHkstTeJW*;4;tWy!O{Tw_$s(??D~+ z-%ty?Zx9nv!{Ze6f>? zl@qb3m8M_}W??wq<~bS_;s>!1AIH}C2{IRR1?S)$WB9b=r^rye|Hm40GYwNwA=-k` zco4bAoJAeKqH%U2{ct1oVpRJzRLISEs}FlpjYD?NjK!JwE-u3C3H;o{-RM96K@;uX zHo`hwi13U>t+EAEdv|07YkF&ULZ^Dqz}NA+9gT`xyX_$Bmz|0^jp zqoE4(@G}g;`jhPW_Teh(qp&Mp#`f5*)R+=1!Ctr*IY_1+ufrZV3OC?O_z)INX8RmY z3-+UaVG8jlFHG)KV=8eqW@6uI_UH8+>`T282jF$ogZ;^z+i)FfWfw34e?=v8-TUlT zMIn!vMAYe6g}U!`T!?$`WB=<@==l$u0|QaVY6WV*b+`+EMjuw(ZzHn<^;{K(-~rTe zI*Qt&8dMIQM?H7L(>KH37msRBoxvGX2e~wK!|q647#Ef0KOjfh1U_KQlQ;r3!Cz1- zzlIuE8K!y&s_sJ#5Q&X2)obsJjj4A>ZSn0cg_9J9;P=>Z7K38+gLYy8v+c17MGd?d zwenS{Bzhh-@EfROR*7lYn6t+5GF?#vJ&&5mM%4Y47=i9?3c(aUM-5Pe8sHp8;YC!0 zLdYOxd1KV|cvMH}s1>zGJzt0#Z~!V2ccPvfj*3Vrs=qlHp!2_wLOmK5V>GTny$3d9 z6WoUyum;uPS!{;2m`^s}z-OuF&$B;dYOp)?KwfuA*aPQs-$aa~{vBJs7lR%)<_o=J z4^Y@-NVZ38@^oKdUoic!l=fdS7l)Cuxy+y(!>NC~#Qx=T1{0_UF0~VDg-xmFp^jlc zROnZE?VC^w+ld*BZw^z?im#$V?klsQN<*zY4;7&vsQdbR*C(J>Gz)LA!qv$3o7Kzh z0FB7lMCwV%Q8z`{3b$b-_kV@1F8sE_{`ov=rA>dEQP+Sxe41oV}BrQKp*w@P@(%2 zmDQ&)3+t`19d^M4>I+c!Z^C%2L}m9e498l`N6qpHxCyld2iFq+7z$t0pboBLGS(rZ zh@xqOYOnJA7-OlQMBR4{`(pfaHngSKhR8jM8u*=c)@p1){YM;y!OwFtaGXnFEQQ_p z5)a0|K!#G^_o99Cy}sVwICg{m8t%fDT#wyoKchF}Y3lQEHjW^ZzvNujU{NSv)7R}U zqAT0&8+Gaq`wtuMVIKFp*C^aVq2o@@D9*&Tcnk~Cd7E!G_QVWai(2`99Ev|-N9?i7 zX8nVhNWBadxvi*B@4v)ityKQ`yWbku`SU}s#53T3tDkEn@U_e`%M zcZggu&c?&K&>ovqsi;u*_Ufgmj+SCP zZt&XoVm9@&7>AMX+v_=)L%kUDaTzwo!@Vy}G#N1+Cc$97nNO19}3jLR_^ zpYrNkQ3G$sOsvIPjQ+r8fAEKP!Yxn}=zw834P$UFx{(ytP*BL<#Kw*>?_)gm>V5VV zdKrVLN9?x~iNOf!Em1F~&Zs@T1#|IUycIWLC%lAxF!_M}NKHdcOCoqNjZtRL@Z~(?0vHx%}1(g%~ zF&)oiQ}lgmw01DN~)hx{iS?n zf2#Gx4C-sJ1@2Qj5julm)ZNT#8;X1kq+yij7*q~SKn?sDX5o6&gP)^9cnUR9=a_A8 zj!md1qYpcyBG?<1bWdVO+-%!jbDDx?o^srVs05c%Uy43v8u^9Ih14%?=t@u%nt?jc z%TP(S2Nl69sFlXo*a7oV^`W>7AHZ8M@PsDF{ufbD2gRrel;M0_;lF{KzOu;|kIA&B zp#~a&5jYzM>3)o2ug;=!;_s7u3oz*$d;dUGj?BRyaR=tQtnkHe?Z7ps?APujZlnEY z9LS9u{%t$FjOsAzjP0-pRiBQ_@p-%p+nlxiEJkg?GsvRNE2ssy=j_(Kj4shNhbRog z7tY)7{$HqUP5+)>J2)8i-~}v3-w!ro<1vZ)I^5;(-oPB{b1v8_$GuHXZepZWcEcKPx0Iy;?2L0^+c$iGo){VwNOkfQ@OTG3N zyM>D`GCAFUiJx>_-+*1P$8T2mGW)NF-M@46@X8fR#plhrY+x|r~ zaL|AGnT4o)sGpt8Rdqi`Pf!DmnlJA;Zy%NsUQ<6H`JXjq4(7-<|s{_xKz zj!9#H;f~|~vwU%YV}hyY1UlwvuIC3i{!mw=-WT<_7|Znms6C%j$MOGinul7*a#Z_& z>N@^o9TMXBkFVRB!b~pQiY&%_fa+*ZJ;(o#&)?Q}%qz5S4R!o~!wm^@{41P>O=(}? z)mNhicnyPb7e?Y9jK>;G#6MBF6y1OYl7FTV{5F%Ta{h44|##AmQI9z+fJD`sO* zL&yJ~$U{B9A6MW>)mgw~ULI?xFKFbLyD^3@8__p2aS1-q#4#sy{!LTIJOW?gR304G z%<=yTc9>q$0*v`rguVVvbH}{PeIuhBGm`sSL_7Y!h98P?{C^F9gcGOJrdDp!uBIj%oT z&(V-U!yl-D6Ve_3JG&oh?@LiDDaV)Tcs=gNqBf2>gJJD#hZp&)AjtTfT>J1p1V$fqcE=HlQH^U@M$3QG{EpZ)&dVZW+pN@LI6!rW9w|$x0 zUf#xdOb{0;Xz<7PFa$Sal4HysY(@QiTiZcIJ3FyB>_~eWYJibAA17iS{)V?;Iw#4$iiQp(Y%M+LBhN4*R>; zhoA-=M_?TG@_v~@eaon9EV*n1uJmAuQ3PlQD$&QSG$r! zx7dMv^6m4{uB|Yd=elEa9E6Q=4yylWQ4?H;A>^O=n1VuAgK>Bg6^VaPA+OiV?sYga zzG>mw8nx#gP|tTmJ=X^nnZa)RI8?}|q9!s6>)=wgGrn0xK^?3?-S7_1#hqA#`2}__ zo7`&mEDkkr5^6;)-S(cSehOUgL``G_2IBpw=cc*NL61KTWfb(_64V1Pp^o8Os0X&X z*FQ#0@G}gNghEPZBDp+Pd|g?)3qM#9ss75CPohxwH^HYJdx<_lC}xwkQPEo`jlECsbr_M@?)rYC@jJC}dDr zgqm3u*24p+V{`=7!LO*}6x`Qlc^j-xy*p|peNhp(!)+hvIu3OzrlGcAJ}O6+APe-E zOD{s9gUjcG`tU&q9S+$)sJs~{$WGcaMZ%0Fc4EP zSm!^Jf>x00-q78(2-V?0)XIjV?i-8B{)wn9Dn$*r(Denk{Y}?OY|Hf>sN?<%YGDry zU?OUGl7e0kOE3giq4w|%)Qq>IX1vd}1{KO<$YRZRn27Cfw-YQzO>iJ80+TTdA4ZMy zhTFa#JxZcV3L5A`)IbL@0l&gu@EYpDb9cDM4mCl)JM9)kA_v4|;o~?PHLz1``}4=$ z)I(68wue#U{Zj0n{~I)DML{Jtlwqg|B%zL1Pt;ZnMs2}Jya&gkp4*99$R{`*k6=3X z=jE{-AHz`0x!ai5Sb&Z$u?Dpz6^y0{Y{Uk*4ZQ=RCU6Ax zp>i5^|DUJ`1rD?W#bPA&G>pNXsE7{rP|(0*un|s2J-7gs8>_JgCJf@J;RwvewYUS1 z;w)S>*cvg!`YbM_z0pu(=HY78n=pBpF^lmvd;mRJ!;RUb23(H=N4Q%t(#|jpl@qb3 zl_p~hW@0$r<~jlu;zuwKpTt!B1euGuijU&$_Zssb{1h3=V}eKV(MiMos1Ut_(O8Y# zV@{)vU;b!2kv_PVdNHc~Ix6HhT|>rjFZDQN_sqRG4d2Ikm^IdzLaajX`S%@X_cj#k za3S0^7PaDL?)6rvq{(vaj#_aM>iiEu<;H!e9GZ!~_#~>|1@84_s0qJ{-p~IH6vAlO zhMn*;^uxO2?fDMDWz>gaE?&X5*lGeVB^-tY_z`lDOdzkrTW~18g0JFZm_L!Xp2KOu zBI@VwC;sGx$)3bJ09Rlp7EZQbuV-Ly>Km{h-atKAMCSCta@5MsV+3ACC3Bqz?N&u1 zkC>*Y)3FqF-&;5rKYEb;52A3(LpBHcp^nuvr~%8d3V*^-ta#W)W)teUZ5W7qFaQss zwx|}BLuXOX{p%Vs#oiZ>YEPNM8B+(@G<3yoNM4xPs4PE+9A)D(l}X`X)C7MYS>t$_&ZvQ2L`~!s)cqSU0zFj}{3(2n8lV<6z!{9fi>L?% zkU`4w2B_=tsE*Q5D{6y!z9(wHzNkptfqHHbDk9@i{mnoho&U!v)TLn_M&mQ6_rN-A zgu74!)}lH*jbV5JyO7QQ;tSMsXW1_@wb-4y53jpsn1?gDZ!E@B|Bfx+iN16AfYUp6 z4~180C@;0i)9rElg6V@3Xupg(IFOXhVFt@Eoce(>`^)DPCQ|oVU?~U$U+;cRMg5lq9T-sy06H+J_fa-X?WA&_#)eHRxGvy zgp#pI)RT~-Zt}4?R$>$G{~A5I@XHeW^Lgk}n-t$;CO7f)Eug~+J8(bLgdf5JT!1Bb7&Y&9>6&2$58iO$KDuUZbLgBTN1g&sDZb?Xsy9m>ObHx^m~cl3OLF`VHAZb ze2oX=UpD4@>bq9kH{V-p?2Y%nVm}SHVpFciuC*VdUGZD$GjRqECX;J9m$ld{m`~Gn z_8ZaFP4BM_{d)GfZ5cGu?sH5hPWR);c@iwPzc{?U%`>60pqbXcE>oJjQ+R? zqj9-ge-}0IM$E(u_#;MrY_s2Qmz{77Y65Ms9!|m-d<;EJC_G0&AzzOT9exL30`;2R z_7!>s{iuiUu@i~L2H&Mqb{4@T5g{i2d`U%xv z^5^!eS|Mgoe-2}Dm)eQYDXd4`)A|b=id^)iVW{g!R1SzwI;~^=TlGz#i$4@z}fhW_XhUrs7=0j zRF0&g2I`9uI2{M*evD$TPNQ<-@8f(HVA41C{(h(&nStkV6XtkW;marNz_lmsr`<8! zNc&INpBvYlvK?MQbr^Ztc9@Tqg)JCh#1- zK>fl+yM<3&A}YH7GA|>puffikcf~sUSN2~GRlo6O!mC%wR=oXpzNzB#f3V-^`zI^K zmVc2a*#B?Bim(4;&-Z`+wb?%ymHp!}3TI*=u0$>D6e=Q#H*KUwc_=(eLpe^s2;&&? z$CP3k0}OH;@6YmiK92FH-oe)~E4ZHP=XgV1gL+>CaxsqUeNlTpv5w>Y<}?$vkVUBW zKLQ-@u?`4yyvNtmg2FT|^hOqAcA`4kQP=VQ@%ft|$Gk!NyTOk4H(W_Q$GgHw*qHWG zx4r^3z?WwfOHuV%pg#Y*Q3$7DJo=&s6~eigi7PP`t5E}9#`fqN z;&|T^9Z}Ek#wB=6brx_RFOOB!OB*<5AV%}aM)b{8EW;^{9P_o#|4j;|G<@CIF_U<3 zV3_0m3AUeJ(tM2hUxdAWJkl{AaNm$9#|-7Zm}tlQYxvO^$NOt|ACBdEc&y|7)5|Pe zPd$im?!;}ViO!67yx*ReVJpTrUs8xfp9IJIE{{Pa$w@52q(sN$GT;NKr221D$NRIo z8WpMRB*%=wLcE6Wp-$E7WNbaWhDI|iboCr|^uljV3nx3{5YdK63Wf?Mz2-ez}yOr(7r_Q0o6 zTloo+-R3)t#*hy7IHsYJx-)7^CU_`lz$Z{4T8fIq8`uI5VKako prijaviti grešku \n" @@ -671,7 +671,7 @@ msgstr "" "\n" "Popravci za kod koji ispravljaju greške su mnogo bolji nego izvješće o " "greškama. Osnovne upute kako napraviti datoteku s popravkom sa vašim " -"promjenama je raspoloživa na http://nmap.org/data/HACKING. Popravci mogu " +"promjenama je raspoloživa na https://nmap.org/data/HACKING. Popravci mogu " "biti poslani na nmap-dev (preporučeno) ili Fyodoru direktno.\n" #: zenmapGUI/SearchGUI.py:325 diff --git a/zenmap/share/zenmap/locale/hr/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/hr/LC_MESSAGES/zenmap.mo index 4fca70b675653763ae78a5b0c91f669c9c156c59..b07da24c0228ab091f925961accac33772570448 100644 GIT binary patch delta 6071 zcmYk=34Bdg0>|<5vTKtNwZtBYSP~%%N{B{C#1fGbVxNePpbJ`BH1o73bg`6YDPyl{ zYw1iq22H8a)~KzPvDGA$q8M5Xqgw6!{_h^2kNfe@_nf<&?cV!d;zpV4{BoDOqH4eb z!xru`rY_D5G3EuzzgE#+W46^WM#b&cefSvlGuQ_&VG*X*G^RT)N18BKFb8iTrSRaS-gT74(s>3Cy4%VR>_yje>9aszZpayad zWAQ5LyebWx0n|lZAB~~d%-RNPxY^N}LKqIjU@S(RI2P4WiFG<^Kyy$lvjTPAZhQP2 z)QnHr{S~P8t|2RLZrlC$P`5NNiuKn>Yf$iw5OqN_)cz!_jcHgF3or%8Ah*@5K<(dZ z-G@5A92?<1d;;q=bOxG)nm|WXf4v&A{wn0#1A|c=KZ}~#E2sgLqRyLT>+|jLrKk=* zLd|>!YNlVHZpmJ(jz{hOA5iUHNA+{Rq1##FAl6eCRJPVaH5h}spc(3dHmHXw19g6$ zJw6CEkYe=1S5eoyQRkQ1`h4pWRJ$v6LVpSyQ8NsTab^&TdL|-JuUiAu@i5qJ#a@gnNsiQoq7 zUPmLZv`It$nST6GJ5#K0qVD-3^urHOE4R)$?lzk#XaKuWBRY-rVJ@ONsub(&uZ@~% zV+_FNSPhdZsQ?8hO)9JnH-&sP_BV{X?)8{hJaBfw&0O;WE^Tt5GYm z0kwqNP&3_&n$a=Tb>~qt`vEn8Us1QDQWK}+Xw@ucl93R`%b9q9&_%XJ`;mw`)=3!6j=P?9ZCO9kE zHi7kjiXENVp_xrXjdTubKr2uKT!W#w!5-gk{n{QsZR_8mI=G2y?>=gUf?7E3grVxy zZN09Wf}Zk5c1LSe$7!gBGEn!t2kOFpI0T0vlQ(6k^Dm;>xr#dP7t~wj$1>;{sf8L) z15|tQs4p*f8w%>EH-_N=d%{RmL*r5J|0GlcZ=*U~gj$)UsO#2XW!!{nZ#U|F-;b5> z5bD`Fg?cz|BM+t9geE#8YJh4m4)wYvqka+Tiuw%S%7ah^529vJfjM{u3-QTh=b2cH z8bAeh$IHk!yGc%=%*cDAj<@BPfU0``J5dN{M_<$oi%|Fa1&qR1Q8QkKn#pQZ0~>68 z3u>i4M@?Xltsg=S^f*S~In)GhVMp|DM?ZT1Gbl{KT#Up0$b)L`Vl9kGbvjJLs?@V= zeE{;cVTPjyUW&SIF6z9UsC$0|HNcaoiB_Nnavj|bDf~u37ew*SX$C2%C2xmIac{dGZT2WNy4r~yQx8jQjy zY=*k9J9fgM7>g^ddoYUnf3OjTr5VFxW0FxTT7+tMHmaS4sP@;TvHm*XwFk;jOZ5%v z890HuhZpSr8>kuGLEY2etr6T%T^D1GL$#ZPTCsMh>w2QD>xa4p#cq3G5^71N+4?-| zQq>vgjB5Czt=~g^YliV@rq?bBb?;lD+D*0fZq{7X=Yu<+LJ@^$Q6oN#x+SMj z?{zuqUS2~jnJe8{>c>#$#iKe(M6FaC)Jk+hf6PYh?}<9UzpW2;beoYBG{fHR-VA&MQB zQ5S|}7}Er6qdLk!HIR>5q32LDnSffE$*5=L9n{0M40YWnsFnBrD)% zfAfHXmNu}n^N@sN4E0FV(sn>KoPqw>4>gd1s1Ams20qF<1+{XsP_OA))Qpd!Ixfd( zyn^mV6hgZ=2a-?&NkcV|g?dVdp>EMw)J#fIGhBdb_(RmK@S@H?f(`LJs=a_r=P#=; zRJ}QB;H@)Rf6b(WJ!vSK{fai&caeuhficV4b(?nA8YFgs2R4xKuky7nk>}7 z`=AD1g#I`&i}lxuli4AsVh@~-JPzh4w!ms#oiCHlIGFlu%)@K=l#3P1W{}iNy79*c z-aY|>3#;6&jT5~Xz z`X5ja*K?@Xb{gvZx%fD~kD>U9btmdP_kIdG@ib}x*D(n1qB?$H_Xp=VD^vwvV}A|Q zL-a0&Vi{_Q_o5%3LcPXkFc@#4&byDAKyWYLGvYS2Dd>a_r~_TB{ZRuMjd~czVK}~p z8t7uwb*oVwuS2~BpJEsuKn>(uTQ5hoa}D)62jptSxc_x2Xo-?hGwz7`+Ra98t$CX~ z+|=R2?M+*F5ra5U*Z!BN^DU%5;SDnn$fMiKRGN}^$yvSs^T}AEO-ma^cwT&)?&)Ik znNv0Quq`Pjy0#zD_B-KO_5CutTRYg2NFQH`2hpk-wWNHU{FA5+^R0fcO(1WO4P+v@ zPqgu^>ibpeD8`dG@)bEl4wL7Jwv9w9w~7oWt;sb~o3tTU$SdTL&22_dn@SFlzmQ#I zIeEA}#)$t)r6;*S^!jundx-Au>*Uc*5A&njFe+tay4|_dI>4uI{(Rq48A$YD^Q`Xx zzyINS5={ab#5lZ7-XhxekGWeL!e?oO%fc zkaY4jX+gA|Cigq!($f=Wh{(SfVY# z!Mut)$#~L$)Fu8z+cOU4Q+&>rV{jR{W9ttoq)<>XtrEx6u#2z8w;o<5TZxNf+A2Hve%9ybm!6!+IB#~X*@3PXJtyif z^mLCZ@ob7N_iT)r?aglVyvzGpY@o|?u<;0QdXuYu-julQex3)-Pk7EGJqw>7IiYam zGpSL<<2`rVuJTSu{ZajnNMG-%mNC)uRhQGA{h52btFpGcyoK50T%HTvUho!nU*qqs t((4U>&&Is7o&`_mc|!W^@I>~#@7);Pu{|B~=k~RPU delta 9687 zcma)<34B%6oyTv2Bp6oNTp(~kFf1W}JBT8(gAf!Hald)*Cb@6B@xJ#Gh}LISv{nJ_ zvo52fFz#b*)u_zSLM<;gPec(p;Ap2X7&^Q#2&l?dLa38xI z$%M^Nigv=Q;P+6GSa+ah^@8i+FnAACs=p(3gyPzDhMn#77f&|AJ1ZB`f*o*zG zDKtjIIZz8yP?oNQQglAlhN}&K1{KPiVQ=^ltc2Ul`zN40f7S49D8v2?@xl5Vl)hnX zTF}JtG_>KNP%oxJDVz)Ug7s#68B_!uC_@7n8VEIiwHaRnNw0N1><%A*DyL2G5cnkA z7nU7F{Pkl0gQ5wwPz$F+jI>UL17HElup*Qv>tO}F*Ki}0L0h2SKW_Rvpw_()W#Ct^ z0{+eP%WH_gCREi#8|@2a@pz~rnG6+yW1(_38xDf?X558ZpMWx;4Jx7+LCwFy@ERz+ z>!Ie~4mH1{Ktmh-7HYv$X2L5_p1%jn;Vviz-$BhU9~1TWG29nQaWz~H$3b~|A(R7` zLDkAysAGGhd0)7Lh7|r1YT{<7jkX#-2BqjJ^ZrGsjdqy#A3!Pm6w0G-p^9^_vC)P@ zpd1+smFlD6K5z*fuk+tPLq)X~D)%=-?iOnkR1G{2W%;*;72~2D4}^-$DA)tmz`fxl zsQFW&44DUI*jbPhX(eHJjKgvAzn+FX{smM7?uP^6Mpy-(fKvFf>Awdn>3;Pr4ad=Z`v zD<^Ub!e)39ycf=b6_fbV!G-W3z8!yoXVM>hFlQR(AycifhgjBOaE0MISWmwb9uEf< z4vj+90F{CyoDN%|BJmLH3%5d9{v4DiFGG3!rg{H~;dkbJFLu?sfl#R!1*LBSR79sh z=_wp*2IiT8dZ=72H~nU)ja#4;_&WAGiZYYHh!871yI2H~$+_D;}WrmLW;^9HCYe+a6&pN87-Z77AG!h!H>*g)>9_^~jEetJse z;YCnCSgwXz7fg+Q0sRO%^tZ!VZ~_I_gZ-_5#sYXQtcH)k_i^D}O`yO1*vOC0BM&<<{}{$!f-+#xY>bB^p(1w^8~``Mad10S&Fq9q>49@1gN~j<{1xIkW?%&z zNxuQg!_`nZy9!Fd2B`T@!S3)+umXMn6`9YVitKwh0`{33&7TD2=uD_oErg1QGne=) zL5I-TUVK=TIK+f?C&mUNnCwlz}5)B^(2Lz)8@C zQwlUR;Z!IE4x9n=a5UU#_&T)dcbgx56-Pnt9BV#Qh})qyxD86rJ+KG-of&@|Dl*TR z_wPXMTlj{Ca`<4wM1SP?2nbT7MDL`ZZ7n z+-%10g{&`Fo6Nu;44;QOUauQ|X;`^1Qalvu{X}>moCV8aGgM6^p$t36^e-^H1P*5W z3K)a8z)GF}%HyM4^@X}9214a{Bvc5Ggf^T3RRaxB8#Tcyn1%}FO4tn+%=kr6^Vgbw z(eNfH2kwG>bpE%{kY!Io9iMmMzVLg<-C_+|6nVZF>V9zG5LkfY;0;hAe#GzF1s5+N{<0{`fD9=>DfkKO2RA_F>VDW4J__aG z%TS6xhDyoTupb<7LUi$rg3>n!>VL#~)6YN|-Uj8!`33Xh5~z*VK`Fe|jBkZfydAEA zuR(2`I5AR`hf;K&>0b=B@#RpCT@4k<^-!t09mtPeY-732NdF!?)lF`tQSq zu*cHqVp<04=wAbQWp%;@aKB~L4U9o-v>t{x!~Q3c=Q1J)bM(JFncs=9X*sta`&;8r z;hzEqT*wE{x&=znn~kaRLnzspR-eXV(yatui_n?aS6F3I$H1CI>7DaXp z{4wKoP(^qz%=?dJVsX8ak$cc2X0 z3HO8F!#;5E8Ij?mVfg*8qoIuthx@=eP@bLwWk{pxdr*qnpzeh$q0aT4P!Zb#6@ka$ z{_q7z>ceLpfB%8V;FaMBQ79w+SI|*`DH2B_?;+11s&a+*7sy!TIAjsB6)8h&f1_C& zAC62%x;~TXbYsrLW>Ced=YR;-Fy6hZU2kXL669YI-@NR>%U5at9f=_+Gaf)iK+nq& ztUtkR$Vk&a8s33?XZou4((?(8dgMbh&?&EXn9fxAB=RCM4Y>uOhO9Vp4)PN6V`L*T z6wz}T!pX8eLiWe#Z{b|zdPK)r&uBzPwDi1AqY-%r(f$_KwRJC|+?Ad;XuOI10eK5K z1(|}Jhg^(Qu~`MY2FW08$frmG(Q_@*jyT8`q!07;^o4_v-_ri0_TLZ=^O=Obd7;YI zqk=quzMfX(R^(U6eG#-+vCes$aGVMX|YvcjsKx8>G44HsbBAbxXQ;wn6(Rm!{hoq6s$eqYC50h+yq!7XH-q&ocZBjz_Y{$!2U{Xd{;*7b1Foi3~-@A@BqZbb0zQJ_6ar z*Z`#P8h`T0qsVOJ2;>z+&tRlGlS|KSG#)|LAiqW?BF7@bnezoa7+H-Zk<3$QEE5 zRaMLIw9(gWnbuW}8``wEe%TMEOsyK7EtXYZP{`PB+VN7h6OWU;tnHDWFm_I=&R*)1 z3lCH5HrLJ*R<_26CO2oN6+16O2-A+due0Yj+N=D$ylz#dDT+Nc^D-#8(B`F5cxI;y zPLL!pErHkSBvcG>x7AH4idj2`!oYPD;W}$Z#?EJ&iAjpZ?#h@OrMsEP z#{wtY%;>3ZChfG;*~^-7DegHbpE6Q#vZ0x{kt4DN+_Kx6sT0{A_re^-9Qmrk36+Jh zZ+25Hn#;OIZ>5Z|m*yMNUM?3Ep}U7`m`w3uewG4?Z1WpKjTyHs%)hD3)E>1k$8}S7 zW8kv6Z@Y0t8zW5G84BFA->T5AvI%h}=QXar?f`E18W!_Fz|MtO8Bw|kWJNHMR8To+Fp(cEip;OAR7 zpX;LT$zvT6ER9idjrmlU zBT`qqWX#rCHWeJF=#>+PI?Dy2pF|**@=1;I?AY0`B=VVzVqoIgz^Q7&vP`_VYfN=< z-q`mGq(8$#9}74`=rBi?t7nn3iXv2uqszyQPt2`q3G2~s^issmce9zA94ovm882N` zv1Trxa2{C0|)ov~uuWD~|32RvLzM|LGOug0@bBPJtY--#OI^L;!pse4d36qYPF!@M((h*Y+J$%BX!;5!JT2q`cd3_=6cWz-5 zOmMk1JGbbn@F>N0J~g^DGSSx|sgF&V@Ye(iJN5PixOO+t#pYCgG;J9AjQ$4_h(`eRJ9w?X|ZCof{n4;@JB7)K+2B{9&tEXRi>(z2C;TLxdt_T-_5|}q;)CSa*s7TO87Gx-ID&r0P4X3B z?1tC%$1xevqVnl@(p8 zh=TQspU)p$Ncv5rnb17m-3R--spwNn6MAH;YJ`t8achj&A8QH^_&l!;bUYB;PUinA^HlE#!W2 z?E0k>oQ@}FT-L2;7yFCH&;F<~OqP=@9x`X?h>|t9lh3v&(0d$Lr>?kq&X%LFt(|L= z`q2JKa!B@xV7pUFiLSV866*t9Nj5*Zd{pyQ_pimZb9)vtd^qC`jxyBc z)(G#w&Mg#+u0Rxc6LBgFRiJ!ZxT(;W&9Qx5>9*tzbrD{d{1`M7qiZ(fv~bjvVg1^o zzO<>1=0FZ8g_<(S=hmW{sQlqYe_D@@hIwntkN%&RLf0#goawl7-Rh*Tpa{2^r0!>Fhs}CpI)q3^kCuS zu*jk?>^}Pq+%isPguM`RGIHl6zCC<0N|#QCFO1WQv9;m%qCT$MmUx!lvs-Jxv8T}U b;d#h-$x;mKtR?)Q3lDfE(ecQl8_WJ1?&XwO diff --git a/zenmap/share/zenmap/locale/it.po b/zenmap/share/zenmap/locale/it.po index 814f66840..8907e0573 100644 --- a/zenmap/share/zenmap/locale/it.po +++ b/zenmap/share/zenmap/locale/it.po @@ -703,7 +703,7 @@ msgid "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" msgstr "" "Come segnalare un errore\n" @@ -724,7 +724,7 @@ msgstr "" "\n" "Patches di codice per risolvere errori sono anche meglio delle segnalazioni. " "Semplici informazioni su come creare un file patch files con i vostri " -"cambiamenti sono disponibili su http://nmap.org/data/HACKING. Le patches " +"cambiamenti sono disponibili su https://nmap.org/data/HACKING. Le patches " "possono essere inviate direttamente a nmap-dev (raccomandato) o a Fyodor.\n" #: zenmapGUI/SearchGUI.py:325 diff --git a/zenmap/share/zenmap/locale/it/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/it/LC_MESSAGES/zenmap.mo index 8391223c5152d5b3a30839907a7b30c87d67ae6f..2c1b06eed937c60c39d7ff125e5ed5355c9672f5 100644 GIT binary patch delta 7751 zcmXZh2Xs|M9>?){351Y@1Og-wOh`hDp++Jd1VWcy0&WPsLnzXuKBZ(45@~{R7OBz^ z!BB$~DWOYMnt*`ff>c++DlF{x$BgH2J~MOgo%zpyX6}10-ag>_>jB?68Qw8@jQOy< zF@DCFXO)c!!Iv0_!BvdOj}fTrr7;%Eqd&HGc6RnaJwMRZ$Dy8|f_gr~wa<6$i>nx~ z3E;wN8uH>648|Q8>oFz=D^kCkU^@tZ%LW#OHE54V4bU6YF%6UOPka|^RJG4d!@1OF zVGu?p8WV-_iC$ygpwOHKMcxm?a17SMOjP7YQ5iXnn)y{Mguh^M%tZxK@NHwdVFZ@J zaj55(q9(Wj)!!CWAUnOTa2Pf4IV^y8F&{p2*I%Iq4ytA?iV8RiwIr2L9kz4VyP*c` z@7mLl$(!-0em5a2Z@k;x4ZBet9>s!q2^INWJcv(Gk?*Q*JJ^r9eiUQy0xG4s7>-3* zpBGpW`(k`eV_M-HjKJ$wulb8YC=Er(cTp^d1F$ZZ#nqVZYs@JePXrz7*_oVfWC!wX zY@aXTtb`Ff*8odnS1gPlq55Bd3UC7kv;WLN3QFBMjKmwLO#Ba(@&ZllT8AOyn>c4> z)S6dAJzpR7Tq{&&QeFE%RLaMo0-20{I8W`2Zx&Hd2g^}6Y{IE{0MBBRrgklhHM46L zg&MdNYDN`ZdlIUjX3kEiKzgA+4n;jT*7*^7^U^Sjf*zcUdSD6a7_LV>u*+RPhzjrw z7QtWK^}jHTx^Hu1d@uslZzQUpQm8%kma8YZ>+PG9e+}HlHS|U8g~6!y$=DfZp&#Bx z?b>^&nLl#vd0W_16NGx7M4;|3gOjlW=En`FfVQFfIn;vuE7D^$Xy&I;^{cLa6E)BS zd_BW=?OupLbyNY1V{O!cov;{oMLjnf_1rAf`(gzu6I)RM9QIPsOpl`mzUaJ$0n~5f z3VevXW6a!^cK7CBAoc600q&vR8y?P>mM8?(UJ4aZEmUSZpaScM3dlQ=LU{_Gpd!o0 zAUuIOMwd_>{0DWMf?C^Mo`40YH$cs#4Jrd2U3-diAnH_%MJ>TUQF~-AGC{BT)LmGL z>Tn(Q#~r8{lx$;XS`AB4Z-@%CA1c7HI2h-lGWZhJPoB1HNDOs`p(YlA{#XtJb^fbR z&zrFLf$RHF$NdRvVk6oSh#F>4 z&h}{4FZtW6pD^R9;0UYktLOe7n63Fc}qK3MvD`u_}&2jkDIZZ$_^+ z(N+o?Xg_M8Q&eKcD zYP=_%-1&b=gJu+%Y*Sej6+kJ}@k&B1MJj3udgFUI0QKAf)I?6=2Y3nNu^lgu-8d0L zutpa?DX|$UfU#Z3e-#STXefl+P-}Vw&*M4NlB{Ml1+WbZ;%_CxNjCwqlz$8>gyL%~U;Qknj<4_M~p!UWxY=F@ze86BYtcELbFJ8e(xTvc& zJk`1YGiWc|&6w%94D}`~+nuA1t8h4a6MHZ#HQ?8n($g(PFB@S|)Sie$&9p3*z$#c2 zTRMB8Qv3lX;S7w!lSnM)DUQbuz4>Uz?~$Q+|MxNG9U6wBQnU#p@Cb5`xrI7@P5RnE zTHy-n$*A_fP$@V4tRdK#Y80}1rVoz6Jvbc``}1`Vv+?!$&ojWTZ9(+oLYOlWHRICm zdL`7RNpvUYz~Kl{Q| zA8Je%F2u^%VwnAUJsw+7&%!qN67^tfc1}xNjGEb948zB$&75z9U8>^9BPJGgI_9D7 zTaQ!myAiB^0ENcy+da@0b*$!~23(B0@IHp%>X9}x+fmQ$Mt{sf9jDW%CAx^(L%*P& zd*uunW$!DAYA-j6Go}uz(@+oVBm2U5QM>#%i(#D z2x@?EEQsY?dkri^y*_G*+j}WorO+AgVAZh|!gt}f5 z)locZMhU3rlTZV;L1m&N>bb6{j0{5cHy(X-{-;vNPeVFJ;2hL@U;~EYA=H2uQ61jG zB6ttu+0CzzRWR|BY#__9F!gUxGtR-sc+p)y%4?99rMZHG^^UF1zh*S7bbH}GYIi@y z4%qNR8`wfDLaMf)0?y%Wq5;mJHr-9sOdp~$@d6XkKi$r_F6w#{)WkYsIAfUp6!d@> z)zK{U!_QGOUy2%Vy{m6UKkEBXsn5YKWa1Lmp`I|qW@;$v`WS41Gf@4U$4tD2-ewdA ze{5eITTy`o%rxdR3`1?QO;`chZ=JVbsf;iT(3GJtr*!Mz_r8YzL@b&rcOhEw*#RSYmb-d5DUqsC~7emp1nVo3~ z)C|g@PC*M)Mp97s4Mb&NA}WK^Q1@k`GPMLlbpF><&<)wB4i2IoJd0Y(%c$#rIG>|Z zo@co=0vA!Qf)DUG=Ea>Wta~w-`XSWB&ZAyXzheQN|Hl-xHZM`TGH|8c3t`S^XFRIo zMAQqY7AoL2$V^PCtEai^6HpVFgG%)})E?XK+K;0TTjd&tBo3<1E%31R0c0$9{d?~Tz^HKD$goAjz4T zX7VR0;*fRrS8oMWfbCGHWDx59#i;wYVi`P*G58cKVEB4_dK#hjNHXTbe$Js@cVUb( z9W~>HuD%9+sPDl1n2nmrA=C`cp!U!WEREea*gY~06~H{y@!f}-z*!uQ_fQ%1rfjqi z^h948hB-%~UYTQ21J6Qrv;egfYcL2mVgT+!t?41u3{Rj2IFHKIWz>C7Pt-E7|zo-OuNgkd!8 zRj@C%!=+lg9TYTh=WlG}DVR&W559>hS#~L=V*%=mFa*~)ccAV&g4%pfPyrO)YBLsv zY1HFTyMG}nQ(vL?Qwn=2l*bO+_{c>sYG%W>+n>u*un_evn1}~44F8L|FN8DaVdk-@ zz)J7511F;HtA|CflWQM@+7qL8l7DrOL4($KDXN2Su_T^EeK_4mZLYvw_P$Wmv8#;g zs0FUXUf2fxvh7#5WNbuzJzmF0xCFo7ZB6@@{4b>;Xb(FXH{uug-d_G3gU@gde!S2A ztd7`EP}D!iW7zjQyJVFQSZkp6OaoVMjx{jyC1&FQo&S8N?DzlSxRMLIa0aG+&u@Bm^&M2ljnCL)v_hllo9BjW4hd#$4v_Ntlj7SmBD@D>X46_4=rQnq49P0TkNPpfyg#FdT{g zI1{yL=A%-#692$;y3W!pzG_|dlO15wHSXp5HdLU^uiK2JqK@AH)TT|x$(VVa{3lQd zx?%rFR1fn|--d-S8!p@9Xv+`=JT^P6l1B!q5^M>%3y0$hI^tW`aUX?lTevi z;H97eSD+qTgF0rLQ5o5XO4SeOgEvqQ-a>Ws$eHh^opDLj^{S|)tB=L7C3;Z*?c(1e zDz`DKZPXBtCnRf6$$TD9^!&rok9;CM^S8(3_#E|QO^%)ERW$>(OaXs>R QMrJLnytfl{oF3Bk|JTEOA^-pY delta 7747 zcmXZh33QLg8prWTA`#g`5@HvU+ILY)Q9)2Uq4u31irOiEJGGQpTGgUxYH6*p#9CXd zMN^j)rB$xdQm%$WkL7-UX6`x8XJ+1aW}bOw=1tQ3-=jXaj`}Q`?-`xTm?`Cq@iWFe ztz=9nzQjNbu53&mj7B{#i7{9f{jsI9qq8Tff3mBOL-n7E>Oar5FLv!;R5l(Hz=Jdz zd~q9w;BJiZGA0u%P`_Kn4iHt<237>$ro9Ymf<8D4Q!oMl!S}FcHQR4Grc$4aL0GuD zF-5UVbq^H^O=(c%{V@thV{M#|iu@!hBj-^ozlz~_3#0J~Dv;0`#`M5wjKy)NeydOm z+=Lo$8!C`J9#=Synm7xC@h;}Zr|$VH)Wm`D)(BLBDqKEeDL!T!9!^4K5C z)Z)D0LM({atse7?LS7p3k?%;1!(^baU;=sFaUJ1u_Z!Fjei$Z&zoSm=J=DtocI~;E z+glTe`kq9i-YxD)WnyazhD6M-*GKIK)x|%Q44!| zGcl0*b<_m+P~Q#RF>O%@syzl3P%Ttu+o1yMj|#{$kwQ5N3s8~m#UMO`x<=Wk0Uo2S zQ(!B5$}3|q^#-Vwv_fT|y=(8{Oh(;`F{mw=g*qdPkOg|o68B&gYQPOR5Oq%{asX`{ZRpq!6BH6%HT`XI6iIohvCjh)WV|CALB4k_rDSat)Py3p@Fj{YQQe2 zmGwfsHxPCDQ&3wp6*b{}=L*-p!I_R#czy_V-5;SAHoPr?s9`n*eIOQL2rftM;d)fW z`%w{}a%Q1Yc@J$2;xawL=A%tApKw0>}k1)o>b4MosLMWXJQxm0Af(rt08JDx}mn94|c|ZsD4LK3ptD9FdNHa8$KTUaUzCd&G(I|h>55G#=KAd zD^r+GLpbh4?db`;h*_vDNnTQUh+qF1_7W^sx~}pw2{L)JkKq5LUuSe9ze%mEy6OfU~hQ zo<(9YIXD5^^)==lJcmr>F@gQ~(MiKlREjoZK|F!HV{W3ZU*rBZkQTU>dJ?Mr87k$k zogo8wmwFLo_e@_Lg9mUXRvTzcGu(@B?!Qm6-P=&~<3XgeFlxmm-SY~lLsQM!0JY+l zsQcd?bvA~e&d^8bgR@cN&U4QfqXJ%sZ+`yopb$aBKCFcoFc;<-WbbzfE~efC>)`*e z3RW1*M+tjkA|6IAlJVzr*a&;z8eE4Hv2hAtJuhwxwxoV{DEa4HnD`I)2H-NRgw2N8 zU$4hwbLu;=HNHf3Y{|)KfnT6jb{C`YA?h&ujj&r)0O?{%pl(Mh>b;FP9S@IS{{tvA z`p}+%)~IW>5H;Z!xEKGzP)r+XGqVfTZy)+&Cg#TTs4cpTIzzWm{a!gkM%nj@qT1s| zamO@3JPq}*K5{P1WYj6YgIs0fJ({4f8!Ev2sFgoMP5j!`b92&E4?#^3g<%-y+G}Ds z_4=qSZtJ0NjY3DfgH^{G^9M$cvw?Yyx7Q{BHStW;%2QE?=u1=}-=ePB4lILV+%>M3 zsg0WGOH?3hQ19=+DD>>5;7j30)C8AN6a0?R_yCom+?*ht@-Wo%qNst&pjK2F)xRNX z!d9qEv`6*pipt0!)Oh33Tlaq&g*-IO#DcgG^&QxRdGQ!(!po=uZ(;=A!?K*_S4j3v znMpQ~)tHa^cGQY9@ey8j&rk9hi=Z#PcYlr!n!}O=14wFy=eT;tiDQe{_ zQ4?-(^&RL({U9p!$MJnKaT)7UuQbPIDh2g?6gJ0MsByAz0bWB-QwoDVwjYiis6hPZ z8uJ-Opbpu0SRVIdS-gvdFyB1;i$^8wPQ49ki?*O9-i?~@6qdlBFb;Dt01M40|6ENI zH{brySb>`G2KwOx)POmt!}G!!MEE7C7e=MD0qVV0sI$`%{c)Ic9O_I=#Y(sggD`Ue z`B#KL(I9_8MSch0!Dpy};yWHb5GPKtPlXwe2!NvMY^7tsoY43!0)b z(i!#MKvV`MpfWfO_1-*GroO~b-Tw^~^g;$|fFr1m7f^edje7pb`5cvU?={u}_&N28 z_yA9#FYaDzJ%Az9kD?Zqh5A6NRQ}zcli%0V63W10``eRz~gBY1GevtEho;&=;Sh zp1(#76!wk%LKZ{4UmLaZ4p;<-Vqu(zZ{Y^?!ymsP|9T;t26cFXT2aV)+aV4$Q35J} z4yZsoqXHS=+EY-6Y6R}VNtl2&HrR2;qn?m_M8QPc`gqbA5gWhxu>-b2)x`xhC{WBfPU6&FOk zP!5&icwC0bsI7Q~3Z&2$J3%b!LsJ2@vIeNkbw+<2j2dqw2I6Gwh;vbyx{0}zJHM^= zPz0hf5QDWb4z-frsFe&tWnh?dDk^{_SQ@{WS3Znt7O22=kGLov;{3-w+m>hL{81rWZ|W~?v{r5=Ym z{Yz1q`W8J)DIB0s4%_acGfqOSZ0K(L=kgQ`r@j@d;}ML)r>OUWxpQ8uyf`Ybm<&5{ zRn&WRF#_AW_GHwV_%MU~Yk;{lXpdK-2H1zi@C@pQ)1Rorm1nPgFAR0jI`kpI;*1RUhI9NdH}vC|=b#l|PN2xot9|Ew-> zn9kHc#nagLh~2UZN3HRwGgIHy6ETK*8`OtxBx+%)7>(OK6q->ui}f+`nEkn*gk;xb zVLP02oGjrrOvC}1HWOR0IQ6r*5bvV`_~?WUXac5L;M2C0Du3T zu@6e24-cxN26`JcKmzI$orJo_Lr{A@787tGDxiy~1zbTs6{gl%`zPHWSc`fb`_>72 zVGGQ_WZi$?bN2WD4{#k1_TU`sdY(U_In}pO11J1wuhBYuKs`LmekWdIN9whIvJ<3Y zTk7|)FV?xpcHwGNpnm_cXCVj+Fuy5FArB_tRBVY6cmYe`ZQPE2muzM-unqNNt{!n& zE8$=v=he)?yqK76Kh<4OHKF0NW&ep8BW?lD-o#4Cce2#gZjtVsKhRs-4)b$&HIQgso%@j9yGZ>WJDIDK#06&FE0uY%gTdRPFPqZjIbd-?Y{m0OtJ zrf7バグレポートの送り方\n" @@ -700,7 +700,7 @@ msgstr "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" #: zenmapGUI/SearchGUI.py:325 diff --git a/zenmap/share/zenmap/locale/ja/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/ja/LC_MESSAGES/zenmap.mo index 5810f52c792b75e442a1b2687185bfcd87382169..9c5b1f17a032d646238c3594325509f01888e89d 100644 GIT binary patch delta 10373 zcmZA72YgQF-^cNjAxlIEv1btp5iw$=)J&`(c8%J5RD>exM$K9!Ra>p99mJ@uR;}7w zsnIG$Yxb|S^?bhfb>;c@dCu$g^Zs4exz0J)IOp8=otG>3yjEWKa^1}CJ=emQ)Z1}6$4Pvss9DBwvSK`D#y04W-B9}nU{M@`I`LfVQtKMj@#(gF5Ow@X)bW>W z{S8}x4+FTq^MoW54c=f7dPH#{W+NCQDVHy6PS6?Ev0hjilTjB~j}ve^*2e15j?)mw zqAq+2XW~T+#Gd6GrywR{ey;DNlBnk!QB$)YtKwzU39^?r7tVtkd2!5xWl$Z6$BvkY z#c>m=qnA+wyNf!{15^i|SpP~DSDvVO}6{L zKwa=lTmKbu4QDgzy!X%>f3y3aS782iLZ_m+$%0WmFM* zWf{zcjqxw+j@_|KC3Eu~#k`b5SvMJt*|AY&=07LN2UPUJAy@)$;sh^7Q^j#c(1WS5 zW+c8Wur5>$b%N&B9;g!!$71+7hTsm=`M*aUcNcY!y+O@ffUAz<=t;|knu&_2DX)v! zFab3Kovb}kYd!#Vf?=rR#-nC#wyj@^nz0S2j%-7n=eVsui#pzQ)i$_?pHT4{&*G@M zW-Xi6Gi%lgb>ViX5p}oqDX0^TwoXHJWIk#jD^bU#S$ClBk%P!_F6S7D4!DGxnmeci zo|*>E8`KE=;v6Rj=11+1#!#$=ysw-@)QMZ7&eINqv5zgM*!`cPI{cZt%=#}P(ONFI zJGNnK$_LR0^TnGPD2f_+7^?nV)KgOj^(IWT^&M~&r<^uQSH;vANQf| zkz*KuCvE-ZM$ErXc$JLm5osyXoq^dQcz1V8#TfO*cO+dX5uw! zB;GA~4P!7y;AGr|TQDnr*owj6Xw=N6VOiXb*|au~NwlVK@jM3b_R*5uM0MaX2IF&d zU$BkoKrrT_J};_$ISj#?s0+2k+}H*4VG3$S=U_Jc5?$FzHj(JSL#n_lSQFbY-1l%k z#^80_i`n0IoR9IWwMjcu{vM}N->^L&NO%SHChXXO`vY&_huE*9<7`#ABbQ4fN&Uc# zsCFmQ!^Wt4q9tmoJEBI=3v=Q)>wMG{Z^YWTA4{TlXUE}MP9%=NDflk>ba5O~rw-P@ zm0cKaZjyUc=%#v$T`@2J=d1IphSP0*bT>2Qm924Dm;J4f$#WLsP<)A+iGJN3 zr#?PIEn#dAv$XLp5?v_4+7dP5_LvEKpw_aVbvSCo6Hqtp7pQw<1?nE!ie9)Meee)! z{|VGR@&oD~c!)XB^_-*%iC<51m)F83l;dy~&cSLJ(aXG0dSD#oxyTLf+`>8-)0-O% zQ?P^wFCOIO=oIX0zMS^Mbjl|%3SIr&k1y*_q6@x89nhdZ-^*|=`rywPijPott=9mv zBsp;)<$|cEU^=SZO8f-(pk|~djkMN{P*Xn@o8VmBq1*jFNmeSBacg?xX4HY((GL%x zFP^|aJde6pZlR8QW6eCsw9AL8e+PAZd904H$YeSxsGIpNw&nWHTap>rHp%qx0czwg zQ5XKpmc0j?a%R*8LNFNLvGo-&8|7HkKoameHphDymFzgbVCWFjv47B|$HSLfRZ}w- zHS*~gg!51xS%rF>(l8ved}J7KTtE_JtUFQaBWQimBtjBgZ z5O-l-EcG$Jt{F)^R0oc_#+V)FQ6v2gwc|Bvgqg;gkI@j+iQ`aH-V`gB*6Q~iN!y0(s)|VX5CmQ7_ zjKhuC3}2xx*kFSB3D*X-6!|Bb&yW&WhH?kY&GntBB#~5nh5hk7YGgGh8Jk%evx%fj^>-uRt%gzb0y_>RQ`lB-eKalV~lL;&WVuI&k4s zQ@{v;&rI{HHv#pl_u}W~FBwf2m?>O{y5Kjqd=H~2doDCfQx0=c?tog7A*c(jL(SA_ z)J)t#4dmWJ=3i@FVv)J4V^C8ahnkTNsQukgQ=5$Wa2giJ)wX;ZvrvABYX2v`gZ_)n zOh%$QP}SPl+G#QKf0-SFsnFki8h&YdIADpniIPwq8i@sQ7W(5R)P;7T*7OAG0(USF zU!pqXxzv<{QO6ZP4I~T;;d?Hdbi({pjJ6FHS+`*c>QAFi@CTMeeH-zFaLk0IQ5`LZ z1u)*)!|or4!PI|h%L`CXfomy=dUOm^@D7Gx$K_@Tl2H4HTW8t&wWxNRQ8RG_uizzA zN77c9;|`-Pd=u5t-%-cCL4Vn`zJC)DS2)^(=G;iwZN zpdU8Fr}#elVhPpRCNi*kPg<7i3r~zL{WBxT|Z|#n- zjiy0;%u0P^B5`%`WGd{l=Qqn2(b2I3hPiProE ze&E6SY&Ja|lx_}4L5*+@mcVV;N9|EJYy1{-VXv)biG1-X^}$#hJ-3;G)U&oib)*Ms z=3Qe+YLF~IP04i(MxX7bhq-VZ%ImFu&#~=mrC@-?E zIM4j6Vy&&%jF~9!z#O;_b<nca~s%OuA&g0qsUjrQc=#^o~uiA@0S^7;uGeyB^%6 z_#x#n*Z3-q&yd^7Nx5#GuBtznzae$Un$+)ek;IaC+%SJasg4@KZq$qEBo@UNwm#QQ zGv#5Z`Z=hP?!;g4M-0I4el$~m4mHD3w^$yG!Gd&j5o$?YyKkH12x@B1SZ|{ae1=+r zKT&HRc*j^Ab>Zr$6Lq!a{+NaGEKJ5FI1h8)H8YTgnwe{OP|ttYpUkIR*w1DSfERK)u{*XtM zxxN!gq63?wrn)n#L&>O)Oha9GCThy(VnN)4f%pRk;RDohudoPadu%L^g(c{^f+C0@8NAnUX?rw zpJJkITMm6G*T+s+i_oS=bUk(75dXMq{`=3Dx@>E9OeF@}`rG(5<@x_@=jO&6cX$KGpq}#d!PIo zF0^%|?)UzelqZm{w)NA=caW#!Vqy%r-hSHV*fzZBon1D+r5)Nd?b@0Xe3rOB^;FJf z8!G?a=7-7o9C80=f|JyZBwU0(kV;}^LfcV;```Nf+mgsn)Uo^b;8L5r&XGj9o0@+r z!?}NzbJ~WJt=sIr;#R#{wN13vA=gXm6QT{#n#kB{ki1LG$*9oyn{wc{w&Dxa$LMb= z+Y{a-jU-|zXCk(fk0Ua+6C@p}KZ(1E>GrrKIGpk&qA`)NwV=LhMnUsm*B+p{P-3Vp zSF(-1v*pfM%;w`zuiA`l7G-_6%WwB*vpdo#PasB6o=5B>+Eex;hN_L$KYr+u-KnpLU)gq_;w;MD zi0VWq%2$Z~c0W~4xYqwF6=jI`RAaZw|7x_x*4@Ld)R(sV@>2ef-M167*!uJMobm?Z z1`$j-)b69`{>t6}$5Q8t<{uBc^E4(Ag^7>VlI;`nJ-C_ZK^{*mCw`{<5vCGhocu_W743zUpaj|jh< z$zyQ3N7T-$srmanN?+G^m{#K&WBsz+4k^xorZv`jC3-OD5O+gl;&*={WLPQQ4&N>KWmCmTHf2ib&*M*si- delta 11572 zcmZwM2Y6If{>JeeLJcL5(Cg5PbOfY}H0eb^Iu6M|BFPL+5+EQ9nb4~e5D^y;k=`^Q zRS*#nMJa+Ps30R%R9IJVU2ymN&N*5Am-{?FKBwG!`rJvvx=WE?UXKiX8F>Gw}9q}~z0T_ifYCFy|*a+ir26n?+m>(an<2XIB z4L*(Yu%zPzoO2}7ay!lsn3oE71IJ+uP68IhiC6%qqv{u86}YM}AsrsEceH`T7hZSS*Sf_biD80xuG)~}Fu15Sv99=wHm z;6Cc(m+NWsKrvK(In)elVR3A2>-%C!@z!qDcZ9R;- z{}gHqE~C!KEz|_>^kn^2@qmKD7}1N-V>D`J6R;pI#H#ojYM=*E13ZOe@iuA&2lh7Y z3`1TU&hu6;YGQuOj{#J>vz5>cme?DXTi2l)%tp;@FY3PcQK$bXY6cfk1HWed#g<3( zG4+M85%r}|XRRx0Vka;>kSiqeQE&^3;62nHI(^NEi=%F=Y^{S@u_j1gP8)RL0@MJv zp$3?ZT7i$S37$mtai{ZB$mQySG#b*zN-@h{g}a5!oUUO*1E zGarL^0oC!4{-(VV_#yc*sBhW215AHi!?Gp=NoYoKsHIFs4PY|re9t zebjSh2b#UCh7-v*#5%YU_v1N?#+P`R)W_AR37^7-+LNzI6vM)U%$`-k&&k(8ZOI>~ z0Tia!q8N)hJk?MGXo#h-CF=fu7>jOHM`>6ZgIEq%pjLD@2GsE(5;1rN_2Boaz~8Vv zP8{MmPvSmohX2BY*m$VpOu>6r-!PN^5$97rb~xV;_#5g?ICTV{Bz%P9aQ;ZT*`K2Q@d~Ql z?`{1Ls59~q^I@Q1g8970VhajtVQw6Sy>SdK#@*NoyCs?z%1nHY{2uIrWuE7U7Ib4r z+>LMIL!6AOc}>=c;3Jr1eiZAF9R6W7;Ji#Cn;Y(816=DhpXYPflzb(h8OQ+aN&YSD zfxn<;_9Q2%Bz8d^<`I}5$04^k>8MY~E!2GxFPI;2N@J9c`RgQf2G*lKRyVLW{(^h4 zgWoLmBh<vtshFSsorNUY;xZhAU!YET z+f?(S8G?(*??er-W15+HA5??S+WbhHAC2nRi$!s&EnkGi$S*@pWFrPHk=RD!I?m;& z-oO_on3)ZpXg)ThP#u4RQFse=i2i}vg2;69F^j_5u&+p#$&h}*-d9^fB|Skzu-uGh&~)P%`|)xr!l1)sDUKRFy$$z881YY zzlNIWTi67%QSIJ9E&W~83Pj8_OJ5ANf`M8jG_wY%8=9jU>Vlfd0Mts1!n~MP` zofTMyy~vlJZR*FOX6(myINO$ggwx2M!Yi23GgxESiW)<~5z0GsK4ETPYT=>?|4`lzLR0?T0s z)XYa>P4uG<uzG;1O>$x zb8zrmtcBCFXbiVvb-ayLu;>z20h^%qa2@KmKxQ*U5gsw`>2oM zHJh)p)s%O^nv^GD6I_B-@FUb2`2nkA!EI*1jZg!A0=4wLtRpa>hP)*7HTnwbkZiz$ zxY?HP#zN#zAZ%&k-MkUEqXv8e_54qmAMfEk{2dG6ogHR^_femkn73JfB}%?+ z_NpvukD6dKcE;Q|5OoHIqW08>YH&7c#TMKAHq_GY!6JAO_1rDgeUDIQrOZ3_RsRm_ z-;06{6ug9sQ8THUZ8~@w)nGr=j8jo7w#t?tx86bxxZqA>IqXdSG3*a6qG&aP zE4%JD4nyYX_%IHu9pL2^!T!%CQG$Yv@0oAGL#PgmA2ch|5VZyAs0LSH95dgB70JiE zZ^|2?2G|kx{BWC3$GYSfqskAV+Pf6av;U85L7Bt+yhcSU%!f&+cXcZ2!Fi||ug8aY z7AN7U56sVU-H!10BJzi@Z3J8JA=^rR{86L(n6bxk{tire^N;u$k^Y_PC-}%<{*U?M z!3W68%sKiA1EC@BNnRr4$5W|8miU=j>U8T&)XcN63~s>|cnn?WoH8@6j5?GZ@F|>& zfi)yPC9w_1oi;aAI%5Vf8WSmxK5JGc9kl|RkaOppM|C{!b90#1;ui8-QHOHKIa42R zoq|5fU%^?J_dNT*n#98M{2GQ0zThWcJc+Sb`-1t{w6S)ycDMFJeMbz&;y4mxFcr0R zvrsFt5-Z~#EQS{`67O7K{i8|Tr9hv1eI@BoRY#R~M4j&b=td9flpn{jcn(=4=gF_^ z@AVhWPe8*klkyFyC9ivlZNwDpj#rW0aq0)Y<_n0#BRs-h@A$_2X(aVBZ#T-XAqU;@ zUNK8w?>qB5;UKI+`8(Ji&tq#Wb=CX{rax)|XHhSlt5^l2LZ-YPYAXV5NT^~fY6VW? z4g3|O@SE?=mfXa=@}HmOPlYBKiKjY@HF{P2|ww2wtNfuwKlEu@EQ3?qA5|1SU_3$|9^Ck-e$U9CQeZK z0a1z2HJV6Pn%GM`LG&YA9{Uq1q;swgoC4$(-*LzDGvYJ zf`32%OTMJNZ@w|$?6#FPti|mObFG~y*IR2kF_;)cgKijOJsc3{x;S$tUmsoBe=n^jBHH!y` zBg7_RB(aNo-o&bet|apBC`{J*8|m3ZEb+K4OTeY%!|VStiOQsB5>1JTgs#z)H^Ys( zk!t~Fp@(QkxXFJ*cx^pJ;UCYxCEtK(uL7=_q+1X<*Jhizfq{4`>eYo|^BNI`C*AaTuB4xz3nv4^-s)FQ&I zCy+Q#vP!ssKNi>rJ|X`M>EbpYg~e?8S&Sq8Np!SjxA8fixk$_-eVnLHJRp`(_BAn= z^bSJTIwDS=|7a5L65B}^z?|!C65kW`Dc9w}wnQu96Y@2QVWj&JuM%o&0A-zt2E=2; z857!q zAYLPMWfJ?8uIfsOb9=p>c-J_eKQ-%e%{l?M*OlUN`{NQ^eosnTQfi9J=XJ#=`aN-} zK7XQztlyRBO-YRRxDr!qlAS=cJJmhPo#LtQ>XYQbx-^l*11`5K*^`>!i+7Dmcf}?6 zd?|_EF%;%Bm#)UbRi3!9s!C1h>B;F{jk?sT%Qr4HkwLgqsrR^QK4XSwN>ggO=-V~Q zGur3p(NwqJ+-2sFox9f8d9uH&x36VK*MvlGyl;Xl-IwNab8D(UJ=~+u6_@0rlLU7P zBhzxY{Apfqc%Y`KQSP|0WBk4}Z+updgbGrQ6YewQ8( zS9p`%<6JqNru#~!xhDA1lHy%SiDS9JXUC8|F>zL8J&)hdqrSMfG{2wDCnTurKWFP3 z=kbQy)R05^~6_pbx2BNn7tV(OXl;YCVJD@ zXu9g)_QrXVR6NGVhG{N7S06j)PVtGHo9w0&-iavMxL(7i^%^&JHEP_lDe30f4<=5F zh}fQ0?8n%#(=tNAU?^i*C}UA5V|yrbRw(m8D0nE8xjdZM8wxJIzV`JSJJ(!WwEbr0 zd!dZ=p^W9BX+cvM%Gh>o&Vo?JW}6Le3S}+}1$T!s*M~B*c{Y?u`=m2N!R=Y6ua>Eu zG4KEBBV%4pbBtqEC}aBdSN3L&oKreC9l5e!m~=mH)_3*X*(WmE4d{MjSMd9NGd1Gi z>`(@Y4dKzR~l>gF5s!)w9hd1OT>n5D61 z{d>Es(fn&$U%mGFe}}b+k(tH2K8?lWv0x}TH>amJak zgłosić błąd\n" diff --git a/zenmap/share/zenmap/locale/pl/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/pl/LC_MESSAGES/zenmap.mo index 7be38d413411c14e8a644f9cbf4a81bf4e7fc5db..5d0df209240edb75fe9117abd580fe2f71f9050e 100644 GIT binary patch delta 7682 zcmXZgdwkDjAII@)M?2Y(9cavKGffRSgvgoAVGa>BrNgo)O(bdhIn8n$i5w!Ww3WkT zO+{8A3FSr(9i~Lxw|Ru7qLSUO_pa*?kLPt=-|ux@pX+m7*LR!ODt$Io`Yc`K$@ev8 zVwy4j#+Zxg#)M%F2BUXtV*)W0^*k06u_*>%Pv-#VJ*fU;T>VK@|EZ|{GhKV3YhT*h zcuWuv*3jUG8!;3&VXBugJMlK^=i1l-BHG%(V)0JelTZ_k!Ff0id*LMsgS1rpTWm>>&y@D|q z#{S&E7MO!cos1cT3$PKMwtCD}3XwE~lJADt40Ev~rr-vg=VQ$0IGqRvce5+`qPLys zUsV5weXOb2h$3UMxU=tU{gI z^Qe_yaP76ITjQU}6~qRp_nYDin1X@05fxAwYMjbU@~;)|r9qiEf~ucDO>h>qvTLaO z9y-7dkbrU2(@_&;U@Q(n^?MxE&x7i>5|x2c)Wjd67FeklH1Q$lQ4FGf3XAb4t7wZIo`yT>f2paIw6INXF< zK~$Dq>8;qDdIwaX_n`uufD>>YDuXqsajqku3*$e;8iZO{CWJEkp{Omm7e`|@s^1RON72ti-Qy1}@IF29L4M z$3?W)dw{EkFQdMIjUF^+39iOGOdV@X1$tIfD5H?|kX=zND#E~r?H)#;R@w*~V-hyR z?#_{@6hDEzFdtL#6C@UM0jFcXM~vx;dypwOoyOd)wLVNCmU=NZ!d=Ka<|OL+bGK%-PCXLYJu?cY;=5RYspI%e<5tubUPnLW+Beq@803sVtvD9_ zFcGzvsm}JO7579P+F_`(F&1@(CZP}Jqd(4c&kIojuR>+G1RF5FDWlK{_n|M|#4PlA z+?bbeICjBbuni`TXEMA8`(Xugfy}?y8;4IY=5<_!&tvB&_zCF6ZNWj*tDdyKq^3C76XZsE$23IRkMiYGqXzjptFP`5z3x`jd>Ii-|_vj(Mo} z*5e$kz##1OH2LQcnBGs@J(-J|a4CL>KVlfJnQSxj4yt1rYNDN}RPIG>(IM0sI*sag z)#)?Ez88gRZ;a}nHii6mqtK29&V!kZI_2LXSJ+&`A{_dR4e%^#<-ejP{@vAYxVjG~ zP7?%UI5tMT*9s%B9cqjF;&(W}L*W++EuQ5^Erw3Bk^PCfHnphJI{i7j@_DF3vm>3Dn&O?r`(T|q~}qn zftsLJl#J@%5j9~i)QbC~`VB#4HcT)PmyiLAy|RK(SN4< zl?iWhq4Q8He`>Bx=~UE2g{TQ$K|L=jv z6#OymMf-ESEoy=aOu>Vgj=y0OY&M?*i`_93b5Z@vQDa2t>wDmNsN4+cRRQJIE%*G(hL7o0Qyd7tu zGQG_`|9Bz!*8m4;(4jl#Ui=v~P=iHw&*CwPdLrt*4yb`M-1GZzBlQPS z8hn%pVprJT{bsysCwv!g;k~1nh?lSxdLq`@KLomA0uAF)5iUffbQ5Z&doUP}V>>*w(@BV(fyxm3uYPW(5%OXSc*Cem8gOCp(Z%& z`~lyhUW3)R`ZfFB+zqzhBGegp2^Hu%Btd37DuDMfMEC!Tx&o&ZwZe0*ei;?<4OAdO zuiL=FQGukO2JVC!aIkwm7L~cFs6AecT39LS1GgRZ1w4d)%x}J;5Qbl)20o9P_?lio zzhXNRfY{}FZlF1q%xH|#BoK?RtE9$m986gWqwCn^KS zP>1CVDrNs5d&PeUxKoY#84-ug@D5DG5txkATzx(2EPaZa=Pah+|1bf=Hj;l0(0Zf& zKnz12wr9}~Uqns31U0}~*ItZuDMiLI+i?Wm`<6}d7Ssy&V=`8uGU`)ew=4pc!ITp6 zA5Wnh4JnxI9?U^)#ag@zx1v&g(LJxl1nM!Rw*Q@|Yd8{hcneS&T#LT=0S4f1)PnXq zk9#O6k{?kkx{m(n{k9z-5Svg>arQxeB`}Y==T)dL+TW;52EJp@N*XHlU6I9`F{nU% zH`%imh(6Rkajp>W9yG%M9<)K7?#`%=S*WeK$C-oms82<`{{rg0LR1D8VGtIhQojYY z&|Rnu9JkLs=0^&BX}E}QV%yDj?@nPL^-HLXTt}_678O|N7CUfrR3L3o6L!L2?2SWl z2x@DJQGp&sZRNM>BYL0mf6&9 zK^?x`sI&Do>KBh1T!90(+0_4p0nBfHp-_#Nu{nPGu3gzp45J>h-LB{s)Q2V&6+may z*%*U_C?x?*V zi;*}UHSi47Cv_R}Q8SxyFlK#V|G$4dD%I6^9D9Gr|9W8TPHTm8*e+wepJ9yFdB=n zH@=1K@uG*qQxux*v45p5!$H(z_S$=%g9E9bL8UBhpUqHzoJBnswI$W40RBMEvAK!L z;O5Wl8QOuN)c2#tKY`=X)0|~3r?3PIG4b=dzst=#sJ*L3U%ZBXcmw^>`+z-EfvEO| zsP`LVeN07dZ3on$?T0!mqfr4*L?7li&)I^R;a-@98fYbI;x}A-DfXhi8#STV7xp)$ zdbogk4)(<>n2sF}(uU(O8^6Sd@zz83FQmm-qWgcDLM{(pIm}-zUV77Z%=n7mQmB^U zSxh`){|CeOKlX3No;Z^BSvUnx<8T~wwC+DQ%Duh%MsQ9`>;PAL1iZPYdc{w5|dejQ8@mD{jj`%nqW2t;3DS=)Yhy=eaJSW zCyc@Y3gLJfgYg1J;vcAp1GpmnFdk=O4z|Hx@DYqXWj`$Ws0orz+W^|47I2rV_jC23 zsByDTlYgyz5)C?3^HGOoDQb_4@mDNGFScgoH@t_dzO~oyweRe`E5XRCQwgBJe24`1Ebu7@u-wccMpnCfviOhxE__MO{l>3y85^7c@1i%wXQv& myk(OZZ?CxW9tpMHUZ%W9^B7;Ru=3F@+5~t_E?QW^s8U5dpKs3j!|Q#{xvuM+-}#+$uKT`Y@lKybJAGzN_l)s1=Iv_6 z_#0zxrWg~B1sIH8HH-lZk?Q`SsW9r!$ zg3+~@1SZz<7!ya~B^nfYPmIRFSRZpxk?%oe20ntJcm<2$9e4d7)WCjqtYN5tV^B+yjOwtJyZ#Dlz}H=S zA7t`o7^>e~WaW)#gS%lfs>3}PfyYsiU%`EN8x{Gc=WPdDP}lch0{)0f>7N*bVXV(% zOv2unSkIWY_#wvPS*yp~r4UI&DETgl@z@XRU=l9E93Nx;i=&C4?F)7$2bVY|^W4H|Uz$SNnJ1W3KSOPD& z>vu7l`eXFQsFpV1XjDIOs6AE9)f>9&ty_|R4cx&s^gyj;7OH(DzJl54kNK!wdlfbF z>#n^Jb!z-tnWFbe6zcwR_&!#`KwORrXg#W*9j(Z}X1tdMW#TBRehM|fCDhFBqt1J1 zYuiD2EKU7c)IjN23frNc>xX*oebjTaQ5ncZ4g4Kyf;&7EH1J{PF$|)92AASxF@rSayBsXZDMP<2#Bo1+5jh6-pfRzuGO3W{tUhTu-r@i~I( z;5XDUdWzcJ6*KIBwNNv836+5su06xq9d-WzRO&~g_C_{pf|G5#$9zH|l!gV^7gwWZ z5ZTVov=K=D%Fn;Z=fvAavVgSaXGMI?II{zu|hFZ=v zREHU;nZ1mfX(npdzmA&02-JY%oikkf0%tC!a(xr(m|sIpEUSYJWDFLa|7;3jT$qkp z!_QF>Z$L%7-MJr?%A?36%{h$6${lThEl~kxpfb=4Yhqv23+Qv#z6_OtT=Zz5JPI0U zHT_z`!?9Xdjw&`l z1uy_>;K;5lOmPaUXwaH&#gn)nwIuTxO#!UJ2waav1EK;rg8DEyjk^C9DnpM^14X=Q zPf=McL%j|vqa9J>zUrY6N#QNjgQ{z@e2Qrpm1)e2*ct2KXSfr8#Bn&iyEW)F>lB<$ zyMGT(27Zcq1D5W|Cm+tmA(;F+*+b7<3L7Y7ykTclh>9@aO}mB>sF{|=GMI=Zv9Yr= zD#Zh_3686WUojOE2JjNXPS^rBBL~Pl#-`YDpfO8u4vxWkZ}A<$i}l8~)bj_~FR4}ECb&Er zKBSO>jRxDV)q}7V^_AET3s4WHv2)tsOw`QsF&eL;cJsd&fFbX2^sprAbWB3sw-6`d zW(>l*L&-mzz%&_Z*JL7Uz?rxOFJd^(8)h@}CF;TTsDZYiQn?qkM2As(=q&2FyH4-n z_P$6|do1ets>8|u3lwV7z#n5dj?D6WmJkDp?0}1J4x3gQ5}^< z&8Q;k`8ucpUqa2e1?stWsEoXZ>TeKwA5VV+p)~ zH}Ed%&6YpbK9@PpF5Pg{fV1#6E=Kh;lbgHYeC&hwu$|6-CjS)K8f=f7u@m}@w{N;` zSjd4MjGFn|**2vkPy^+l2KWqheFGLBjTP}BYEP7#YR7qI zD*4v{8)(q^J%gIzRaA#JT>BkV$4^juC48E#SH)t~8=`h~Qw+dN48knb?jMZL;&@c1 zH@NFNr;&ekaEJzNy5sJ~Yp9N*rrR}(!zk(rsQYT8I!<@jyWtAzJy8Ameq@&*#90b8 z(TZ3eTcaj2&_f}THOxUKXXeeY=egoc`<3YfjHi7ODuCUnSL!MJ9REPgY|1P?fP6VM zm_-CJv+Z}ku?y^gUtt{g9m5KE3!gzx#6tT+pb^H?&>t1yR8&e=qh`7XgYg8W;4i2> z68447R3a)f&$xPHR3_40dwUF}-V3#q?_h|||3q6bvrwC6A(q5k)Lz(u>S!NofFsUd za3%Euyoqxc+509gw$DvN?SYR`fi6H2WHzD#_y$9C{tp%v*rli$UUBu?sE8k-0tsAV z0}Dq5QVG>@T~vo{-SwWR%#A>;@pRP0a#1h1ji@)^Vf15s^CN|DJc;V~Dr(^Sx&eLp z+M@x2Q1v*}9;krY6ZMgkX);imI*Xe5Mbz=T>Dt4V*;5vc3NR5pI%f4Lu#Zd{Dg(z+ zo8FNtnducanoJ*L5zhgXxtswvEAZ3Mp zL3BWEws+AFC!+@b2-U%S*S-XcQi}9tHezS&veKq_Eoz4Qu@dH^GU}acmn;I6!AiO0 zzbu7DG$diByYK;ODduBCT!%{aO?SNzQPk!TIQm-(mo6M@?wI z^Mr?jBDsi~(F62HuPVz`7WWO|S#D zLoLk`RG`ODOL-oBbpCHqs7^xxYM}D#?TtyO4pT4;>th*giQ4VGv6L4_4~u5H!KQXC zYV&PJ?X8ojFCGOr8(V*6Q-2u)7~lL#;U?b3L_ELI&g=<>QxD!`XH*9D9!N$7P!F{? zx}zVCK`p@q9D+HhnLa>eBshB-|>Gg4zJVvP$rj%G7_-&7+1X(mA8fSW-bVh0+G~P@AhNCSgs~j9*0sJPf081~$bN zSQ~G8C=8|$zt{dsorP_wNAI)eJPX@Uzko_v)$eVFTHplgeNjtt0~NqMWFMO+s0^;z zZ}-sG7)E_Rs{d0s06i6$)~6Ic!pWF$py+qG`4Y8uH_#XFqaQv(fAl(NH&pYfC(6Y)13c7EzLsIi);;g!YLe} z5P@eg7_Va_-a|!Pj3d$l<8VA?VJiNLy)fpieX)!|4Ul-w29S!HKm%8A?&|GP{brsc z|C;#_8nmgVpf<}))EY0rTbPSpEY0lm+=p|1vd8a>pY6F`iQ3&w@~s_F8F&Mgfq^&{ zhhs7p-~cRrf&44t>gV0{0@O?kU3;;-D&=Cl fy~6X-;-7kZmCj2`jPdm{dEJsz1M;S&%--;SJ|b#$ diff --git a/zenmap/share/zenmap/locale/pt_BR.po b/zenmap/share/zenmap/locale/pt_BR.po index 5252a5f0c..d058cc574 100644 --- a/zenmap/share/zenmap/locale/pt_BR.po +++ b/zenmap/share/zenmap/locale/pt_BR.po @@ -622,7 +622,7 @@ msgid "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" msgstr "" diff --git a/zenmap/share/zenmap/locale/pt_BR/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/pt_BR/LC_MESSAGES/zenmap.mo index 521d1ea79106cebb5a527764231565942439b585..a823af0e4f3e9641561293d88e6d2a144ea8552a 100644 GIT binary patch delta 1837 zcmX}tTS!zv9LMo#HMh-6nx&PRnwiyV?ygqmB`$E&QYHf5SMX`rZEU zH+;hw7o(JXf;AbHQ5vqstr&^6!yCSn3=0olmfO#m5UN~|@wk$#iyw<4!$=c4D_!QfgNT{JYY zA63#9s7%IDna`kJ^cj`GJZeFIP~#R+74gu~{W#S4B-HpU)B+3a@1>~cR!38RO{nLF zGH*eiWzOLaY_kJuj(@Et0{Nz_(+!d(1;nwLy{mHBpLEv5)Hz8Z6|858h& zkOp&1Cu+sL)Tu=XpRZrLNNvId@KvkyLT7g<hZ(bp%dBa6}GmZLV{Ef;qntI92sNemlc_%Op&!959gWAeY)QcSCG*7rF;~~_% z5scLLKTbmvr%)xH#c+nGOcqh4jOOi{xDK_a>8OmnwqJ$0^pBu2zllnq1NGuQRDw@Y z3mn1(egC60_@fQqY(^a_WnH*MNv%R#p=`ZGDWUJXfY5>qiQ|O+^~@o3G%c}wEu+;! zC@~$eRb2Ljo2=Z)j7r>CZ+qHR)gxg0N1etfZ}VY#wf2rEvh4$?Pgci%;vjK|NGB*@ z_-NpoPxy%pqJ;1{lTj(zdug2{RL>KHHcquvoy&;|;+W%cr+D_!N+EVTd2Vl69<4?~ z$F3!oua&g)@&7-HZA1Ud?IdbK-R=}u=(We=aScNB5k!BxME=f78G>Q;f9Jga<(38rS8mLriq%y zHzp()6B{NZlSC!)k}NS+&^IJRiHK2R^o5By-}r)P3@^OIU}E(9Yacw>|9qb3^tt?> z|5>;5{b$!ye(YLw*l;~aTuc1WY)l2`TDfr@X)|Ui9>uHhJq%*adJ31&Ka1`79R~0x z?7&|zgnuDFrj! zS5S$*j_hsbF{o0Xv;$6KAN}*F6aR)Qu!UW!HDW{z7$3%yOF3s0gZoLi`0gsw-8yNR1BGiaYD zP~$hF#*d&9e8hh4wNrmB{FHrALY@41WH0kF-i$|Z0zW~G?`PF(Fp4UD3N?NwYJ+jx ze-zg?8S@0Hl2zV|4)_jg{0AZGuf{1JsPvzsD)B4oWdGWJ8)Z^ry{P9A?7?-Y4M&hY z%wE(hnZPK{pys`Ws=$ZH8O#~f_^(y}H8d7*8MZQtJxw<%<9=%rl~@|<8{pOSXRL?p z=Wn7mJb|jrXVx!KiGG7h`~vD#RsNu%OfI7)1ei@OrUSK5n41!cT9den{tncW-$%D%P?x8K~#yiV*Q;W1I;+<6?v#%&V#6m z9JhXCKmP(X?-E{zmr;p!Gg#~1h}tKL%k=%OPh(9ne zmrA;$-ZEypRp`~|)DdEs(D!~lp~P<^l!*Si>UU08Y_wthejoQch`oePct4RM5`?aF zwJETCqD zA_l7O2EzRtXz4$c>iPho7Z@W{?=8euV!ZluARJ863KK)sP+Mg97FxRrUAH#)|9&Se z{V}+5ZL|&j7hFr+RV%lJn_E+Pw^*zl3Wl29eSW#%Oc(seb9v9n6`ib~o60&R-i7jG|+a5=lxzR@9PM60(sEL0d9WI}x##YA|T6L#;JDWNc~05^8CcR!C_q z?NduzN?UtdwN}WWrVK;P*h;n2_V<7HWR~;k|9#K7>pAD1du8Upaj$g;y<8WAy_Xpk zFJo##O+RD$sb0mi)yxYsM%DQkgsW`37@wfM2ea`o4#t|{#&pCP$fe9NtbnJnGG4%n zcoY4NahZqq0I#aX)MbYs>clwI38}W-206iWL0z!7-9Er>ABH|`AB%xF33c2Y)D0J4 z8m_e4PvTqZ zjj<9owPqk=Hr+6Q`fR1dDa3{hu%cZP%-L)$L;=7)D5rN?Kd%n_9OJh z_$Qs?lTeTH8B|9z(WM^tqoNKBvO9(&|Cx#W1mj|Sg#!yw7mlc743lQEQTs<&r=!kW zjP!7v>%`q`ke{P2{1xiNQ>YUzqZZXI)Nw!C{XX@a4h5r* zkH+4Zg6i0-7=VjVZ_8V#fo()xZ=1_*_!M=*LDYqgp*nI7b>caA__p= zpgwA5l2MPOEovtEqF&oE7>6@aYhW|#QMvX~Vd0t*9&lw*`N1@(y1u^eWh zW}=7PKLFLCk*E&lB7HRrQ8#qk?O&h|?QhUq@BdjU8sP=hjj!4Eeblr64K-E1(as3N zQ8N^adWOxctx+B7fRUJu+`x>-P@ICgUOtw`*Ri7B|5a3U!40Sjx-kMjL7h;F`Z9ix zI?k(sV<75=HBcRoLYM%0PBP|tKP z>c%HgkLnWEz(?qdp$(m9Tod)|8=-ELj@sV|{V>~Z?~i)+L(!!jGpXptc{m$aqIwt+ z<8&krE6`4|rlCLWR;U|vK#ed9GqD#g!3~&%&0~#eha<2jy0H!V$1(p?sdQy&4#1<> z7-Qm{e?1@yq@=+IFjvDbgd*CM9{=l|(qgM5P+dhfvzKO~)$YHCy3ViYnHi>09STB?G#qt&ZLEy( zsOz|%qT)~GS=3Zzq88b3)Qxjd7s$tVy?AXfj&>^^tlsYtsMl*D24Nu<;SM~61Csen zV|0phy_u*RzlQuX;4;go=*BxyGjJ01>~3Hx{)n29I2w_dgqr&9s2dKp?Fp!n&q1BP z1VeER>bl!e=N&`6J*D`f-v38bbi%+U{FQ>E@hQw`YRuC(1NF@IqK><6+Ye9|jA-Wk zVUdWTv|qwOI34xKzC+FA&!`SoNOL~r!5FFcKb8vnOefTbCKm&7Ek@&3+dhlB!BvdH z$Ec}|Z0>YyDr);Y)cIR59QWWjJdK+Ab}gJgc)Fo0f(>J+Xe0|!BV23Uj3Kl?Le0q6 zsHv;il6At68sI?Mlb&@3P=YKE6V%oi7P?7CCew_;uDBi>;(gS0Yqewk)zhSQ&X=n- zR;Qhfu{a8K;0n|f7Na`46E)Jq*4wD-gtm7EP!IJbOhi4p4D`cMSQRJYlbGM0`PYVx zY|vubk2>)bhT%2Tjeo&f=-a_rgi)vtwnhEzI2N^k5ys#a)J&bjRd^ru=oWT#-mXHd zPkWDxigsKoZ9ZxT~r_wT@Jw2vTtH&>AL zYT`OOBOiqH$+)K34TmsR2O^Kr1axr@$VOdwHEKroSHslR7M^GL0 z?%|wQ8xv^v#)>!_HGsva*LFK<#CNa~hWB)4vL3oLrO8y9VLIv&OhI*E7XAz0!2m4i zayn$2tF#iXsg!Sd0S}et{ zaK>{iIPBWb8Nn@_OFO2&bK?6LOuNhT&KE8RHIPY|jB~I8?#58uhZ@isY>E$1GaWyG z`Pbs=%3mK^Y~xT=9~80|$HlF9TCRy(1|r#ZSIVYnL@M% zejplFYogU&i?E(OWhuXUY$~#Wj}p`9FVdg%P=m6Pl=syB`|~5!o8%i3 zO=gg>){##LA1crL>VucaUrAXxLFMnZ zF%gFoe{z;QLynR^5tY{+%wyb7B1jH#&E-dBxr66_j;Y#{d{26leMF@iSxB0ZYh*q7 zlKh4IfvEhMEb!F$_W|D_OGsn#3Ry)q5ta8f|0Ps%JxyaiuwKBnWD$9d#FKeMr3>jx zK2(G9ElD9ClUd|8Sxw5yC|iju+hEN{&)@$8sWc~($T;#A8A+;>P*RV4M=p|Jl0k-& znMCCPIYkbUKav1aRuZZFn`|UclXhedDMz*u&mx(w3T3o|=l3^$U$E_61-rxAyHAF1 z4s~CSYgx{n)u_bFy&&;LuPUhtNr?%`DUnG{S|p{$B__Ikk~ev|m!_VLc31A7=3RdC ViCG0%S=HU{ob%<~9fwRU_dDK`UXuU- delta 6643 zcmY+|33yFs9>?($v8I;Tx0ZuOtf@4FqN8J}rD|9Ea+6$giF>(8ETwKxrA6&JsHG?! zM$rhdMXRcGb8e@rs%b6NTBf^pTFiWZ=e%Y*=kd?yecyB5{k$i6Y(5e5#_5>Ixk|-X zT3p3rEbDG;U)r*UkscneQp-A7)v}a4g%$CP$zMZ<{4I>b_o`V|fBY2Fv3YgN>VZp< zCatqr5-(u|yoPsKR>ZnVq6`J4Yj_V-!usTEqAIpWRp?^!15wY9L^YUc%0s4nDwd#p zHkQZvsOO$TI<(ef8{F=eM=a|CiKP@=!8$mjrneGnQ5_ee8aRn+;52GrpCSLOi~P`l zZes$LuH`+Kgc?X&RQ-prEOs>xz-shw`AC$*saOi1G7mh9>S(QT3u-_+Q7d!=)!-NA z{&iG`H%$3WOd(&UHrtC2qMq-F+S1+_(Tqlu&>GEnzt7#E}JZNhu;2v)}Pr~%wS^%vWK{Z}Hcfp?=KYKC=8J_&Wd9co}5O?eMg zgM&~r9*>&gB-B<+M&3&+&y=r1b-dR25^9144Oo9I@oN;Q;#!3Plg&IgF)RqiFt;9Ig@y)}gxD53UM2bjguTCQez`BC8ZN)b9 z8f;`tHFidAQ9mq(X{eR(oBJWufSy1Na0Rkh)<#r^$4&W%SVHIjOA^JoaTztkYp9w0 zV)7*ty}ge|tyB%v3=>f+)DE?U-Hd%v0~(4pW}w=ii&gL$EQK2|mj116Bs9_;s0R0= z8a$45@m(y1*HK@{pHa_MYUEiL)nPN#z*AB6I-|Z18OThnnW%w0iF*ENyo>&=#mpgI_enqeCD#<92z_hT~l;LRJ2Gq5Xu z-jwwpNFt#b%Z1Z%I=+e{v3+yPx)0Z44}2S2VYMX7>WMv3Gg^&txCu4jov0N(fEv&# z)BxYZviK2d;un%we?54c0$HBk^k5xSz9FiER8+$qP%H2V>bZU|@{gki zFdNm*Jk&s!pxRj*Au)o)CSSg@S+`o-#rwsd`dhw|CBX^U~OzNR3G{y?p8r4u&boUswWJ6IeUoNWSXHoT6<4gSA z@B%g^-y_94_mfe_ZVg_jD$ zW2n9S6lucx3bit|TYKle9>$aJi0ZJv$@@_&Fd570{Ldz#5iUkGyaiS95bAingPHg> zs>8l*Eb9XtiS04v0e-dOMAR0(jC$@9lfQ&&uR>ez4-XsF-w;gG`45t)iBZ&&UPX=Y z23E&n?YtS)LdIaVLw$&{u{M3ujfYTz=e!xAi)&UHL$#??{B zu@Sl}g<9%PsAHXt{PktcG4~@|N$5NuK(@ttA2~@@?cUzZ`ysnvO)&ZW*hJ4^7rbTe zck1Icya=@-yNxGM@6K7&2j?bgWn=ofMy#47ctNdXyc;KAe|!cL@f>P}O7`<+SRb`T zDOds9qZ;gq`a>fF%j0}h$Iqco$9~kn&YAl^VZ6?NEWO2ZqY5Tt0%~aop_V=k)!;ni zD%8vOB5Em*qUxW=4)~+Vrws5uOr23L;WX5qZ$Lf?)+v?KzZE;sd$2KT=|`frWTo+C zY(f4_RY{x-m_co*hkL^GI0Lg#i1 zYQ|q;Su8o&n|WnpeQZs6GHMF~s3i{Lceo78;hZ7f%eNFOliz}BuMlhC8>sr{hOqux z>dO=a@drGFK0a5RAnTrCRK@_V#qz@~>jZAc%{XZUzwxjte=MxS3#f_A8pU>D5%PXo z50Cchufj^?@8@e&4ZHYQf9>sX3hu}8sN=LAtKf^M86Lz`JcISHBEO^cvZY{k9E4ih z5Nd|&%>8|+cjF9J#H*<9$t|pnH6rQWTi+73M14^eMw;@F$uBhb*Wm{4Z^u7lj||H? zj0;f{>F)R5^1-N;2%_5Ef!c~fY=!Tb`;lT}yow#LJ~w*d12_q_L_4r19z*TfSyY3U zP{;EJ)J$rP^=6ogdcGT~Jk2;0tCC-XTG`zg!~18gAfvs$bL}M2j%Z5!Yzi;ni-ZPt zAMrOrFWiTOu74AIiBE_hi5wz}(30!ob#Vuy|K!LdJxzsNqjdi7T!kc3h@S|ZQ?15B z#C1Z~B@gRmqxSiq#KR_k4L>t!!4Cc3)t}r!V$~l?yQu$(!~o)PLf`i9i9AC4+mp~Q zj$wqZmBfQ?%6l<)k^U>uiqL0TS3}}s;s()|&?!k_ah3=6G^756wV~dxOw{D zZ*GWJO}dG(4>~4Y-FOH&ZSMC#MQ;-N_~a6kiGL8f1`#8Ofy!{LA!6Os|9keSm`Y?58;A)+Eut!MFL9Ch zlBi5{CdLx83HL=hfgcek2|rPuxN{|wh>78QkAEV%5%Y**#2!MI-XUEf5BFy*bw-=~ zf#uVxc8mCecDCOaPS3Q%{_NbWoNPN3v@-%>e|kOVtb8q?6$Lm&3=A-^Q z-K$Yst=gf9IROUY%i+G?PVDau&nwMNwCUSU^N$IIshZ;pdrx_D$Uj{5l`13bDS=={ zXo@{8lxzEVDknV6?JQ)cXN71#)0fSlveTJ*I5!w{$LO_^=1U(xHXO8g`2nC{O~ z@z@Zn#6u+enAW;v1lX+nyrgk4@hQz)v~1qu0XsRhZOi25En4UQcHj1x_=IfRIqVcU z`<#O4Y}+YZZV$L85?x?B2c6x{LECx7c8-!ds(f^AGdnulD=)O8bL{9Wr@+}0UF<%# zha3Byf+XA7;I_BhITW4a9Ei?Rm1aB=UEu7YmprGCk^*&0mpr=Hc8)l^d4N6+(a7F5 zBns?AXT5VY`jk`X6lx4bRGXzyBr2z73QW!DJSrXHfy4QmlRs`adYOiQG`heYs=6p( z3=3@r$Bd$Rx}j_ljU91{+_4{YiZm1&r4{eVqtQ9hr|CnFM4zOb1Vb!x3YKr^RHJD@ zQk=6*b=-;B(YbC5-pm;1UTQKI_0%DM>fpA;mtP;2P)@V(26m8@UX)rRrfvSt;lIbm zEL(oHZQY2?TFy~bcEU|)T8yBc?W|+$`&covbnBfpHV+=s(jRq4y_cpBX%`u1VRSL; wT}YmlThAa_X^L55w@REljs0v$o<`^{y-hln1zoz5oCK diff --git a/zenmap/share/zenmap/locale/zh.po b/zenmap/share/zenmap/locale/zh.po index 4da3e3a88..100133453 100644 --- a/zenmap/share/zenmap/locale/zh.po +++ b/zenmap/share/zenmap/locale/zh.po @@ -1276,7 +1276,7 @@ msgid "" "\n" "Code patches to fix bugs are even better than bug reports. Basic " "instructions for creating patch files with your changes are available at " -"http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " +"https://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) " "or to Fyodor directly.\n" msgstr "" "如何报告Bug\n" @@ -1296,7 +1296,7 @@ msgstr "" "\n" "提供补丁比报告Bug更受欢迎," "" -"http://nmap.org/data/HACKING上有编写补丁的基本介绍。补丁请发送给nmap-dev(推荐)" +"https://nmap.org/data/HACKING上有编写补丁的基本介绍。补丁请发送给nmap-dev(推荐)" "或者直接发送给Fyodor.\n" #: zenmapGUI/ProfileEditor.py:112 diff --git a/zenmap/share/zenmap/locale/zh/LC_MESSAGES/zenmap.mo b/zenmap/share/zenmap/locale/zh/LC_MESSAGES/zenmap.mo index 43b6ed2ba5327fc6310bc36587a81c02a27dc9c0..61afa0d08edf6214d9588e68e04682f7d02dcc34 100644 GIT binary patch delta 7724 zcmXZhdtk^_AII@C8{05rHs-n}xi*H}Z(%az_Q*AI%O&?~Gg&`1VV)jDNmde(B$p6F zjZLhOP)g&eo+90(66KQT{c*ni^E&7Je&?L;`JQur+q8UP=!%7*OXdc%!vYwZoKy=AfsTyY+B zq@gJG#8TK7YlS#B5|gMeYTyUhhYBnoo8fWP1Q89Ln};#j0bjzdcn&pj?MBW$hsjtH z^ROx&ZxlFJnZhL+6nTmJoGXWwumv_m4KM*U@pRP6=U^Gk!U~v;3S=ifg1LAPR&DJ2 zrQn?fqQ>is3S@9#g|VoK(=ZAbVK}~Q&tFGPyv^K$3OFCNC8tmWUbW|;P5gu8@dz{wQUu?ea}2h=s}f$H#xJs*P#a0bR=mOWpE z<*0AKBAAOBHxD&V0qRVBZuN`y{8}pc*TlE1p?GJ%m!(ndcVjT|3<4>i$Jyt6{oS;$4L z>;zW8uTcSB$9N3s>ibnh^-D(e>x9b008{{D0}5K{B-F&S&8M+A^#!;Fmm%L2*W^Ke zddFc2>Y1ns7Nat-9<@a~ti1pg&{wEi@)v4BCAfXe_xD7=7L$rV%v{qiP0^@yYNd?fHzP9x_|i$#9Uv#7ZAFp3euWV@fO-_F-)PiArr=D>z&dyp_hKR+k!U=J_3#(ef-CnY z|H%|;_xIOfAZky?<0(u-ZAn*VQvd_8G!Df(6QTmh!16dB_5Q0^7B{0N%ENd(j+O8t zDx+b+KtFLwjG>__s$&Dx+31Mv@B_Rb!yo3HU@E?k0cK#ELEe34i@|Ic?Yr?A?8t8= z`Vt<&Mc8EsR~&;g6n3g%sB>G;4YRF4MYspGhk4e11hseW>V_rZVsy|SN zHgt?X8)Z;us2YZ15^CHA_PiPDjC963KmYqvh^1jDHpdwlhFehgdj~GXu*aNhi7#RU zJcUEC=vaQR;3(vxxXqY?VSEGfrZ!&>vDn~#B|gO4`DexhGp{CxL(5S8R-h(Yi{ZElwN*P%XXyZ{-&yl#)O$Cl zamVx^Y`PyH7TZv-f^4fBggWg9kt^%I#>LoTh7a%~)XGnz20Ul=^H%>EHU1SWjbWTb zy%&edP?dm!_PRb6;(d4lOQ-RZ4zHnB_SH;(eJ-LhGa}uud=ly~%|Zo|g}QD_ur^*o zZk&tf?rEMUP=U-ry&pVBp&W%3s9UfFHNj3)Y7bxqJc28!T>X+_bf z{)wmwlTa&ei0an@m623ryukIRP=tnI7>SQ!MVyH7n1wO81{Kgw)PVaj77H+iQ+*Eg zUbPHwW7LGHxEuSTG8N5duoG6rq58&-qOgUA!>ARe(bf#-piX%XDnsFONM|S=QJIRG z>jx~0T5&a0|9YqZn_?AgYwd$k3mj$j$r#1hF5Mo?N3HNVR7zh)4YU?@n%}ba-DWN- z<%ckl419q})UWfIQ~z4?e82jr_ExC&vDgo%U{Hs`hZN)$)PxE1c?oNxQo0o5a2;w( z_FDU=R{tJb(C!xa30k58Zg2G-sB!w5kD<=M>;>e%JB4Ry(7=VLj#n@oL$bV)sP-~u zRn&lWQKz{L7Q-I)yf3Q%2x}i_?Nd>QIlxGKDU1AT;I%YpfUT(dE=2GqE3M;-4k{&+@)Yea2>(3(O#!f==mX)C5OShw3~k z!fUA0AGOS{xH?8sZ-AAsC29-$S^F5PPeo-U6N$$y#FDtk%tjUxxD6Ea;=5QJ-$SLU z0ClZCvFB&aZ&3sNXkJ65JnVV@i_Fug37fs($8BYHK=tcl^?rBi?EfPal+tnbLON=N z^H2dTv3fQt&~+Gtn^667&0}VvJ^ul9%5S1FSaP`^_iijpJqe5G{Y1oO7NAy^jXEg`bj zZb1dI4>j=-RG_Er`B~I}KcE7+j8!pog+EKxQ0*PAu5BtU-s=&Q31_C^?wP~e?9iV98>^722*qcRz})-NCyJ5aBLTEGx-W0#Y6x8)fSnnrJ#yii=6l?E=`We%I zJ^9xQV`A>=XFrGp&4qz_GS+(qx(OIf(D+5iZC5DUKor^`HsP z#nu>)d8kYj;!}7Dm66H&{E9PB{SIIwEI`h!yNP;l!+ZYuPSjTHGY?^)j-OD_i=U&e z+jmyKj!JbnX;8=VsCptQ;0D+k+hQ-w!b(_(58ySNgl%&DcVRPXi*qpy^K;3+1}>mM zXW%3%kaMUBenbWMm$l!vdddClKka343+^{3AMo$rmB+uL&|VXjxmQr*Y(*_#7b=j$ zd4c~Qg-2*eq@jF1cORRhIxIqUcmWmQIxL4l{$f1P`Mo9A{3o_Hc w^&jWhZBMQGb$CdrWwmR(8sfHpSYv!d$h2jPGvl{+tKa^ikZIc&XU=c;f86I%+yDRo delta 7720 zcmXZh30ROt9>?(k6ckhhPec?oU9S}Kgk%=^yFfBrM`0#9of_^n>xw{)&Iy@WAg zjg0X(#;j^;OfbHOLAV=B<6+eEJgklRSPJhti=2O9Fzo?R_IVXl|43B-hORx@wZ}#o z&jj+IBMl`n9?M~WtnXvY2z-|MqG&t7QB+`g*cvaOCJ1=Wm^2K*4!9Qof!9$J*KcOb zGHi-vFc)j!g=U^H)hXPgL6HYGH>NUH!&r<)4UmYMcrt3`9)@5#hT%F?Ap7xE%)z=C z(ZcrYfW-?$jn^L)$Sa;Jj73eHf@N_L2H<-4d<$ygea<7Ofb&pWatSqHk$djj(oPtJ zY7aryXlkIw?St&R@m_W>3_%T;h~;qxYQ>B2Bxax@AKc0gFaq^F5o=*8Dy8eN3Le2H z_yvx{3+z`GYO{=!J|04lF1$IL?5F1 zA9r3tO>i5ZLDR{Y3Q!j{ehezWcr3^HGovXeMJX78b5NPsgi86xsJ+fcW#GK?OVpkh zp!(lJ_4@^t8K2I!y(}u_)lh-dMt^LncIG#66f{65)C+xZ4vxYv@D7&5PrKMX%R^0k z7PX=;TzesEoV(87QGxh(wF?PF^$T~_MNb1arJ#;2P#xN%u3;}!hr#aoXjFhxup*|r z=Nqsx^$*b(b5P^vqQ*IkI#XY{dZBy%Ygh8GiJ!QJ(%tM{2BX?*V*)lsf1Hmca4~A- zD_r|d)UDZv`kv&t_I!Mc`b8{_@!f4e15x9Q=}!I?=>!_I^2w;W=j!uN6D`By6{5~U z4r*l=F$`~@0{k7TqP{-r7l!KB6xFXYDiZ@x0gUx1Xr)Q0iKjbfVIcMSxEYrt-xSlL zhdsUHFo^nW)C7xB8Q6x}qAb^b78TI9s9W+IDzHHAq5|?FDKw(+94fL`u?$W`U85PO z0oI_d(>~NGzk+4)HfkjgQ5ksT+Mhbh_OkDXqqd+C>Ws8N7U-GQ?m-7E%Y&Xc8V8|P zb`rJH0<42SpaKnyw*iLZcMfFe=&~tYMvgb_I~IowF4+g6*jBcHt?^LjAN&?QiE>)!*I! z%`|95dr_%8f(qa)>UtHTw!-HnyTSk*NWBcI-zd~Vk}(x$U_&gzqZr9YBp9z_6TFLB zaQFc7A4Q@50DBz+E>^`0 z7>+9U&7CEF?Jh5w$Qsu;eZ;3l74)O#al7VMtB6ZhqzYXb2r)Q`85mQ6G;yGHIymcLx>7FSr>WyY>wu zZOXSgv#=A-^N`&$rAD!hI1K0ERqTeZj&}Ed2ZfR}>_<(M?aW23_%rwX5^686I&Y&6 z)dSR_^&Ml+MtRg3s)c^o7&UH`d)^9lM!I70&;JAp6=@iPF*pTFU?%E*XW?@68*9w- zxEiDJ5)Q=@<2VmE61ga54|YU9K8sthD^AC|SkH%_dWrT|u_Y78Kj*=GLm>;>B=M69 zf5z4rInmzhf!KojR*c62?1>FIK|L@PwZhX_8P8(~-o#Q^gmf`~p>9diB>P_4B=&y} z4I5}EPTA}BEHp-4uSC>@sdxlG!(f~}*=A@ts^1#aM4K@HKSFI)7V0dWK=u3D`4j5B zKPGd>^uTY59iRgKoqBa-Tg@QUX+McvS#txIV9Xmfz9J?&`N({U_A;53xM@ zaT4`jMO22WdlaKf51#%m8+V8vPPf!B|aKf~r za;W~1s0kaRRveA$7lX=37i2uoBvA0BVJMcy;aCkPU{y@VP~3zHXg_Me<5&^TVnT44%ptIU*PfpM;V5Nd%VTs;ZPGParO9?V0na0x1<>rex2LY?NFuKl3% z7%JtbuofBk3ZJF^h|iq**Gsego<+6CqT0t`0!~D)A%(LPt)Ibm2 z^FL6B%6EZ%ue>t?)xRNf&P=qc?{ywTjdKiZ;b~Mx3q4o(6SHZk@GhT6ynwwiZlV26 zXbCDqdr<*=h86HD9D{eTHuhb_PdN^03MOzSo-DP0miJq3Gd9_o=JYZs=#=h8P4GGD zP~AjDScE$LK`ZQvYh!8ZO)(r}P+QR7wU2W3WK>3GA@P`WEQ1T38OTCBvz>xo+>e2H z6qTwosB3k>Juh&6j~eJlXAvspzANo7GH;_MY`Myg8|!R`>etoP`xn>Q|5qp|rDNR- zQ&B6NiwbD5t7o7B-GZUG3)SzK^PKaVdtQh-<&RMr3|wu;t%Vh+H$q?C{}(9egVG+g z;;yJKRX@}O!?6TTLIsrK>a$RRq@h-pfjTqWQ5k%M3fQc%TN!|=M>wBBPZKn94KbKV zy)A0MJ*YskQ4{B*0=?{>7oY|#L?Cu6+oqU+P-+zbXZf26bHP zUO0s6co7xAO;m>msKfRG2Ht_1_$X@Nb2t^Rp)%O}J=>m)3g|6V|23%oTQMFFp#ty%HrN-+ zp&|=+)-#{&B2I_DxM+LqS3CJ_MDQMv1 zr~%KTK9T>%;rKf$^1&PJ1j(ogrlA6yh3db|)ivEtEqH?Z z{nPZ=WG6m>8t@eE!hfO$PTg!LUhCZE{KR=2Yw_NB)Sll*WinukT|g*ypdN-=z+mS% z^d{0Um4a4Wh?y9=)uucb)qWY(@hNI0WwzPpwNdRYumIbmu2;l%J8=^%e(r4V+T&3_ zV_w=${`JBb8nnl6xEIr1eHCiL9jHCcL0#7~?sct|9ao`Jx*3CU7dFIf z)cd!w1K!0nj5=UH)rYVi^;@Vj5p>Z0iPsZf)cs#bA%+LvU@}%Y#K#5GF$et)+rNtQ zQ13lJZkTC&#Qt#k7dD{&U(`euvh4>Z7F$yvit3kv&*PVOpgy zi_c?KJb}u@HJpWaQ5i}4)UJ3ss^4*JhG&p-YaXNC+kVVG&q8fQw(}Hv>Ue>IUc7?3 zZvS!hN2pYnBn|3V301F&3b-kD!#M1X^D!K+VP`DDiP+}2{VwcAZSgTIfw{-YzXm=- zgU-N3R3KlYCioE*;IFRzPgf5-!7r?|hu~h!aVF*3_iN1Z~zs^ z={(Q=kHUN!YSB>XB)@iHD^!Pts17So0dB#{nCa@Lu{`yQ&hN1%^#|^G=qbC92-JIx zP~)^gPQU5mQP2bfQ4@}JCcE~jsEo`