From fd98061754ee6a95916a660cd073d19b0b4eefee Mon Sep 17 00:00:00 2001 From: kroosec Date: Sun, 20 May 2012 16:05:55 +0000 Subject: [PATCH] Fixed a small typo (--script-arg ) in 5 scripts. --- scripts/dns-blacklist.nse | 2 +- scripts/http-drupal-enum-users.nse | 2 +- scripts/http-drupal-modules.nse | 2 +- scripts/http-vuln-cve2009-3960.nse | 2 +- scripts/http-wordpress-plugins.nse | 4 ++-- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/scripts/dns-blacklist.nse b/scripts/dns-blacklist.nse index e12392ba0..ce8ab9195 100644 --- a/scripts/dns-blacklist.nse +++ b/scripts/dns-blacklist.nse @@ -27,7 +27,7 @@ PROXY) or to a specific service name. ]] -- | bl.spamcop.net - SPAM -- |_ spam.dnsbl.sorbs.net - SPAM -- --- Supported blacklist list mode (--script-arg dns-blacklist.list): +-- Supported blacklist list mode (--script-args dns-blacklist.list): -- | dns-blacklist: -- | PROXY -- | dnsbl.ahbl.org diff --git a/scripts/http-drupal-enum-users.nse b/scripts/http-drupal-enum-users.nse index ed3a7d5c4..7c2b83391 100644 --- a/scripts/http-drupal-enum-users.nse +++ b/scripts/http-drupal-enum-users.nse @@ -12,7 +12,7 @@ For more information,see: --- -- @usage --- nmap --script=http-drupal-enum-users --script-arg http-drupal-enum-users.root="/path/" +-- nmap --script=http-drupal-enum-users --script-args http-drupal-enum-users.root="/path/" -- -- @output -- PORT STATE SERVICE REASON diff --git a/scripts/http-drupal-modules.nse b/scripts/http-drupal-modules.nse index f18d5aea4..73c8ca6df 100644 --- a/scripts/http-drupal-modules.nse +++ b/scripts/http-drupal-modules.nse @@ -15,7 +15,7 @@ By default, the script checks for the top 100 modules (by downloads), given the -- find the path or default to sites/all/modules/ -- -- @usage --- nmap --script=http-drupal-modules --script-arg http-drupal-modules.root="/path/",http-drupal-modules.number=1000 +-- nmap --script=http-drupal-modules --script-args http-drupal-modules.root="/path/",http-drupal-modules.number=1000 -- --@output -- Interesting ports on my.woot.blog (123.123.123.123): diff --git a/scripts/http-vuln-cve2009-3960.nse b/scripts/http-vuln-cve2009-3960.nse index bfba84f24..ea89feaef 100644 --- a/scripts/http-vuln-cve2009-3960.nse +++ b/scripts/http-vuln-cve2009-3960.nse @@ -17,7 +17,7 @@ For more information see: -- @args http-vuln-cve2009-3960.readfile target file to be read. Defaults to "/etc/passwd" -- -- @usage --- nmap --script=http-vuln-cve2009-3960 --script-arg http-http-vuln-cve2009-3960.root="/root/" +-- nmap --script=http-vuln-cve2009-3960 --script-args http-http-vuln-cve2009-3960.root="/root/" -- --@output -- PORT STATE SERVICE diff --git a/scripts/http-wordpress-plugins.nse b/scripts/http-wordpress-plugins.nse index 1843ac7a2..e8aa144db 100644 --- a/scripts/http-wordpress-plugins.nse +++ b/scripts/http-wordpress-plugins.nse @@ -18,7 +18,7 @@ check the first 100 ones. Users can tweak this with an option (see below). -- Use this option with a number or "all" as an argument for a more comprehensive brute force. -- -- @usage --- nmap --script=http-wordpress-plugins --script-arg http-wordpress-plugins.root="/blog/",http-wordpress-plugins.search=500 +-- nmap --script=http-wordpress-plugins --script-args http-wordpress-plugins.root="/blog/",http-wordpress-plugins.search=500 -- --@output -- Interesting ports on my.woot.blog (123.123.123.123): @@ -157,7 +157,7 @@ action = function(host, port) result.name = "search amongst the " .. plugin_count .. " most popular plugins" return stdnse.format_output(true, result) else - return "nothing found amongst the " .. plugin_count .. " most popular plugins, use --script-arg http-wordpress-plugins.search= for deeper analysis)\n" + return "nothing found amongst the " .. plugin_count .. " most popular plugins, use --script-args http-wordpress-plugins.search= for deeper analysis)\n" end end