mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 21:21:31 +00:00
Fixed a small typo (--script-arg ) in 5 scripts.
This commit is contained in:
@@ -27,7 +27,7 @@ PROXY) or to a specific service name. ]]
|
|||||||
-- | bl.spamcop.net - SPAM
|
-- | bl.spamcop.net - SPAM
|
||||||
-- |_ spam.dnsbl.sorbs.net - SPAM
|
-- |_ spam.dnsbl.sorbs.net - SPAM
|
||||||
--
|
--
|
||||||
-- Supported blacklist list mode (--script-arg dns-blacklist.list):
|
-- Supported blacklist list mode (--script-args dns-blacklist.list):
|
||||||
-- | dns-blacklist:
|
-- | dns-blacklist:
|
||||||
-- | PROXY
|
-- | PROXY
|
||||||
-- | dnsbl.ahbl.org
|
-- | dnsbl.ahbl.org
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ For more information,see:
|
|||||||
|
|
||||||
---
|
---
|
||||||
-- @usage
|
-- @usage
|
||||||
-- nmap --script=http-drupal-enum-users --script-arg http-drupal-enum-users.root="/path/" <targets>
|
-- nmap --script=http-drupal-enum-users --script-args http-drupal-enum-users.root="/path/" <targets>
|
||||||
--
|
--
|
||||||
-- @output
|
-- @output
|
||||||
-- PORT STATE SERVICE REASON
|
-- PORT STATE SERVICE REASON
|
||||||
|
|||||||
@@ -15,7 +15,7 @@ By default, the script checks for the top 100 modules (by downloads), given the
|
|||||||
-- find the path or default to <code>sites/all/modules/</code>
|
-- find the path or default to <code>sites/all/modules/</code>
|
||||||
--
|
--
|
||||||
-- @usage
|
-- @usage
|
||||||
-- nmap --script=http-drupal-modules --script-arg http-drupal-modules.root="/path/",http-drupal-modules.number=1000 <targets>
|
-- nmap --script=http-drupal-modules --script-args http-drupal-modules.root="/path/",http-drupal-modules.number=1000 <targets>
|
||||||
--
|
--
|
||||||
--@output
|
--@output
|
||||||
-- Interesting ports on my.woot.blog (123.123.123.123):
|
-- Interesting ports on my.woot.blog (123.123.123.123):
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ For more information see:
|
|||||||
-- @args http-vuln-cve2009-3960.readfile target file to be read. Defaults to "/etc/passwd"
|
-- @args http-vuln-cve2009-3960.readfile target file to be read. Defaults to "/etc/passwd"
|
||||||
--
|
--
|
||||||
-- @usage
|
-- @usage
|
||||||
-- nmap --script=http-vuln-cve2009-3960 --script-arg http-http-vuln-cve2009-3960.root="/root/" <target>
|
-- nmap --script=http-vuln-cve2009-3960 --script-args http-http-vuln-cve2009-3960.root="/root/" <target>
|
||||||
--
|
--
|
||||||
--@output
|
--@output
|
||||||
-- PORT STATE SERVICE
|
-- PORT STATE SERVICE
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ check the first 100 ones. Users can tweak this with an option (see below).
|
|||||||
-- Use this option with a number or "all" as an argument for a more comprehensive brute force.
|
-- Use this option with a number or "all" as an argument for a more comprehensive brute force.
|
||||||
--
|
--
|
||||||
-- @usage
|
-- @usage
|
||||||
-- nmap --script=http-wordpress-plugins --script-arg http-wordpress-plugins.root="/blog/",http-wordpress-plugins.search=500 <targets>
|
-- nmap --script=http-wordpress-plugins --script-args http-wordpress-plugins.root="/blog/",http-wordpress-plugins.search=500 <targets>
|
||||||
--
|
--
|
||||||
--@output
|
--@output
|
||||||
-- Interesting ports on my.woot.blog (123.123.123.123):
|
-- Interesting ports on my.woot.blog (123.123.123.123):
|
||||||
@@ -157,7 +157,7 @@ action = function(host, port)
|
|||||||
result.name = "search amongst the " .. plugin_count .. " most popular plugins"
|
result.name = "search amongst the " .. plugin_count .. " most popular plugins"
|
||||||
return stdnse.format_output(true, result)
|
return stdnse.format_output(true, result)
|
||||||
else
|
else
|
||||||
return "nothing found amongst the " .. plugin_count .. " most popular plugins, use --script-arg http-wordpress-plugins.search=<number|all> for deeper analysis)\n"
|
return "nothing found amongst the " .. plugin_count .. " most popular plugins, use --script-args http-wordpress-plugins.search=<number|all> for deeper analysis)\n"
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|||||||
Reference in New Issue
Block a user