1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 21:21:31 +00:00

Fixed a small typo (--script-arg ) in 5 scripts.

This commit is contained in:
kroosec
2012-05-20 16:05:55 +00:00
parent 855bdbd289
commit fd98061754
5 changed files with 6 additions and 6 deletions

View File

@@ -27,7 +27,7 @@ PROXY) or to a specific service name. ]]
-- | bl.spamcop.net - SPAM -- | bl.spamcop.net - SPAM
-- |_ spam.dnsbl.sorbs.net - SPAM -- |_ spam.dnsbl.sorbs.net - SPAM
-- --
-- Supported blacklist list mode (--script-arg dns-blacklist.list): -- Supported blacklist list mode (--script-args dns-blacklist.list):
-- | dns-blacklist: -- | dns-blacklist:
-- | PROXY -- | PROXY
-- | dnsbl.ahbl.org -- | dnsbl.ahbl.org

View File

@@ -12,7 +12,7 @@ For more information,see:
--- ---
-- @usage -- @usage
-- nmap --script=http-drupal-enum-users --script-arg http-drupal-enum-users.root="/path/" <targets> -- nmap --script=http-drupal-enum-users --script-args http-drupal-enum-users.root="/path/" <targets>
-- --
-- @output -- @output
-- PORT STATE SERVICE REASON -- PORT STATE SERVICE REASON

View File

@@ -15,7 +15,7 @@ By default, the script checks for the top 100 modules (by downloads), given the
-- find the path or default to <code>sites/all/modules/</code> -- find the path or default to <code>sites/all/modules/</code>
-- --
-- @usage -- @usage
-- nmap --script=http-drupal-modules --script-arg http-drupal-modules.root="/path/",http-drupal-modules.number=1000 <targets> -- nmap --script=http-drupal-modules --script-args http-drupal-modules.root="/path/",http-drupal-modules.number=1000 <targets>
-- --
--@output --@output
-- Interesting ports on my.woot.blog (123.123.123.123): -- Interesting ports on my.woot.blog (123.123.123.123):

View File

@@ -17,7 +17,7 @@ For more information see:
-- @args http-vuln-cve2009-3960.readfile target file to be read. Defaults to "/etc/passwd" -- @args http-vuln-cve2009-3960.readfile target file to be read. Defaults to "/etc/passwd"
-- --
-- @usage -- @usage
-- nmap --script=http-vuln-cve2009-3960 --script-arg http-http-vuln-cve2009-3960.root="/root/" <target> -- nmap --script=http-vuln-cve2009-3960 --script-args http-http-vuln-cve2009-3960.root="/root/" <target>
-- --
--@output --@output
-- PORT STATE SERVICE -- PORT STATE SERVICE

View File

@@ -18,7 +18,7 @@ check the first 100 ones. Users can tweak this with an option (see below).
-- Use this option with a number or "all" as an argument for a more comprehensive brute force. -- Use this option with a number or "all" as an argument for a more comprehensive brute force.
-- --
-- @usage -- @usage
-- nmap --script=http-wordpress-plugins --script-arg http-wordpress-plugins.root="/blog/",http-wordpress-plugins.search=500 <targets> -- nmap --script=http-wordpress-plugins --script-args http-wordpress-plugins.root="/blog/",http-wordpress-plugins.search=500 <targets>
-- --
--@output --@output
-- Interesting ports on my.woot.blog (123.123.123.123): -- Interesting ports on my.woot.blog (123.123.123.123):
@@ -157,7 +157,7 @@ action = function(host, port)
result.name = "search amongst the " .. plugin_count .. " most popular plugins" result.name = "search amongst the " .. plugin_count .. " most popular plugins"
return stdnse.format_output(true, result) return stdnse.format_output(true, result)
else else
return "nothing found amongst the " .. plugin_count .. " most popular plugins, use --script-arg http-wordpress-plugins.search=<number|all> for deeper analysis)\n" return "nothing found amongst the " .. plugin_count .. " most popular plugins, use --script-args http-wordpress-plugins.search=<number|all> for deeper analysis)\n"
end end
end end