Compare: (<)U:\dev\nmap\svn\nsedoc\src\log2.txt (868150 bytes) with: (>)U:\dev\nmap\svn\nsedoc\src\log.txt (900855 bytes) 447,448c447,450 < INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><< --- > INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com>;<< 1086,1087c1088,1091 < INFO NSE_ESCAPE for html and non-html for >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<< < INFO NSE_ESCAPE RETURNS >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<< --- > INFO string is now >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<< > INFO NSE_ESCAPE RETURNS >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<< 1363,1364c1367,1370 < INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><< < INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><< --- > INFO string is now >>Ron Bowes INFO string is now >>Ron Bowes <ron@skullsecurity.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net>;<< > INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net>;<< 1785,1786c1791,1794 < INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><< < INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><< --- > INFO string is now >>Ron Bowes INFO string is now >>Ron Bowes <ron@skullsecurity.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net>;<< > INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net>;<< 1862,1863c1870,1873 < INFO NSE_ESCAPE for html and non-html for >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<< < INFO NSE_ESCAPE RETURNS >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<< --- > INFO string is now >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<< > INFO NSE_ESCAPE RETURNS >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<< 2449,2450c2459,2462 < INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com><< --- > INFO string is now >>Marek Majkowski INFO string is now >>Marek Majkowski <majek04+nse@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com>;<< 2990,2991c3002,3005 < INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><< < INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><< --- > INFO string is now >>Ron Bowes INFO string is now >>Ron Bowes <ron@skullsecurity.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net>;<< > INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net>;<< 3176,3178c3190,3194 < INFO NSE_ESCAPE for html and non-html for >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined. \n \n Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:\n 1) The name the user provided, if present\n 2) The name pulled from NetBIOS (udp/137), if possible\n 3) The generic name "*SMBSERVER"\n 4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")\n \n This whole sequence is a little hackish, but it's the standard way of doing it. << < INFO string is now >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.

Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")

This whole sequence is a little hackish, but it's the standard way of doing it. << (\n replaced by
) < INFO NSE_ESCAPE RETURNS >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.

Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")

This whole sequence is a little hackish, but it's the standard way of doing it. << --- > INFO string is now >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined. \n \n Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:\n 1) The name the user provided, if present\n 2) The name pulled from NetBIOS (udp/137), if possible\n 3) The generic name "*SMBSERVER"\n 4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")\n \n This whole sequence is a little hackish, but it's the standard way of doing it. << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined. \n \n Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:\n 1) The name the user provided, if present\n 2) The name pulled from NetBIOS (udp/137), if possible\n 3) The generic name "*SMBSERVER"\n 4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")\n \n This whole sequence is a little hackish, but it's the standard way of doing it. << > INFO string is now >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.

Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and ">"scanme.insecure.org")

This whole sequence is a little hackish, but it's the standard way of doing it. << (\n replaced by
) > INFO NSE_ESCAPE RETURNS >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.

Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and ">"scanme.insecure.org")

This whole sequence is a little hackish, but it's the standard way of doing it. << 3848,3849c3864,3867 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 3990c4008 < INFO NSE_ESCAPE for html and non-html for >> --- > INFO string is now >> 3994c4012 < queries a third-party service provided by Team Cymru (team-cymru.org) using an --- > queries a third-party service provided by Team Cymru INFO string is now >> > Maps IP addresses to autonomous system (AS) numbers. > \n\n > The script works by sending DNS TXT queries to a DNS server which in turn > queries a third-party service provided by Team Cymru (team-cymru.org) using an > in-addr.arpa style zone set-up especially for use by Nmap. > \n\n > The responses to these queries contain both Origin and Peer ASNs and their > descriptions, displayed along with the BG Prefix and Country Code. > \n\n 4022c4040 <

--- > \n\n 4027,4037c4045,4055 < << (\n replaced by
) < INFO NSE_ESCAPE RETURNS >> < Maps IP addresses to autonomous system (AS) numbers. <

< The script works by sending DNS TXT queries to a DNS server which in turn < queries a third-party service provided by Team Cymru (team-cymru.org) using an < in-addr.arpa style zone set-up especially for use by Nmap. <

< The responses to these queries contain both Origin and Peer ASNs and their < descriptions, displayed along with the BG Prefix and Country Code. <

--- > << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >> > Maps IP addresses to autonomous system (AS) numbers. > \n\n > The script works by sending DNS TXT queries to a DNS server which in turn > queries a third-party service provided by Team Cymru (team-cymru.org) using an > in-addr.arpa style zone set-up especially for use by Nmap. > \n\n > The responses to these queries contain both Origin and Peer ASNs and their > descriptions, displayed along with the BG Prefix and Country Code. > \n\n 4041c4059 <

--- > \n\n 4047a4065,4102 > INFO string is now >> > Maps IP addresses to autonomous system (AS) numbers. >

> The script works by sending DNS TXT queries to a DNS server which in turn > queries a third-party service provided by Team Cymru (team-cymru.org) using an > in-addr.arpa style zone set-up especially for use by Nmap. >

> The responses to these queries contain both Origin and Peer ASNs and their > descriptions, displayed along with the BG Prefix and Country Code. >

> The script caches results to reduce the number of queries and should perform a > single query for all scanned targets in a BG Prefix present in Team Cymru's > database. >

> Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and Team Cymru. In addition > your IP address will be sent along with the ASN to a DNS server (your default > DNS server, or whichever you specified with the dns script argument). > << (\n replaced by
) > INFO NSE_ESCAPE RETURNS >> > Maps IP addresses to autonomous system (AS) numbers. >

> The script works by sending DNS TXT queries to a DNS server which in turn > queries a third-party service provided by Team Cymru (team-cymru.org) using an > in-addr.arpa style zone set-up especially for use by Nmap. >

> The responses to these queries contain both Origin and Peer ASNs and their > descriptions, displayed along with the BG Prefix and Country Code. >

> The script caches results to reduce the number of queries and should perform a > single query for all scanned targets in a BG Prefix present in Team Cymru's > database. >

> Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and Team Cymru. In addition > your IP address will be sent along with the ASN to a DNS server (your default > DNS server, or whichever you specified with the dns script argument). > << 4170,4172c4226,4230 < INFO NSE_ESCAPE for html and non-html for >>Team Cymru zones for rDNS like queries. The zones are as follows: \n nmap.asn.cymru.com for IPv4 to Origin AS lookup. \n peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. \n nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< < INFO string is now >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< (\n replaced by
) < INFO NSE_ESCAPE RETURNS >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< --- > INFO string is now >>Team Cymru zones for rDNS like queries. The zones are as follows: \n nmap.asn.cymru.com for IPv4 to Origin AS lookup. \n peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. \n nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Team Cymru zones for rDNS like queries. The zones are as follows: \n nmap.asn.cymru.com for IPv4 to Origin AS lookup. \n peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. \n nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< > INFO string is now >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< (\n replaced by
) > INFO NSE_ESCAPE RETURNS >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< 4190,4191c4248,4251 < INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< < INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< --- > INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< > INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< 4206,4209c4266,4269 < INFO NSE_ESCAPE for html and non-html for >> < Checks if an HTTP proxy is open. < \n\n < The script attempts to connect to www.google.com through the proxy and checks --- > INFO string is now >> > Checks if an HTTP proxy is open. > \n\n > The script attempts to connect to << (([%s(<[])([^%s%z]*%.com%S-)(%p?%s) replaced by %1www.google.com through the proxy and checks > for a 'Server: gws' header field in the response. > \n\n > If the target is an open proxy, this script will cause the target to retrieve a > web page from www.google.com. > << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >> > Checks if an HTTP proxy is open. > \n\n > The script attempts to connect to www.google.com through the proxy and checks > for a 'Server: gws' header field in the response. > \n\n > If the target is an open proxy, this script will cause the target to retrieve a > web page from www.google.com. 4218c4296 < The script attempts to connect to www.google.com through the proxy and checks --- > The script attempts to connect to www.google.com through the proxy and checks 4222c4300 < web page from www.google.com. --- > web page from www.google.com. 4227c4305 < The script attempts to connect to www.google.com through the proxy and checks --- > The script attempts to connect to www.google.com through the proxy and checks 4231c4309 < web page from www.google.com. --- > web page from www.google.com. 4235,4236c4313,4316 < INFO NSE_ESCAPE for html and non-html for >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><< < INFO NSE_ESCAPE RETURNS >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><< --- > INFO string is now >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar>;<< > INFO NSE_ESCAPE RETURNS >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar>;<< 4270,4271c4350,4353 < INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><< --- > INFO string is now >>Kris Katterjohn INFO string is now >>Kris Katterjohn <katterjohn@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com>;<< 4333,4334c4415,4418 < INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><< --- > INFO string is now >>Kris Katterjohn INFO string is now >>Kris Katterjohn <katterjohn@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com>;<< 4372,4373c4456,4459 < INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< < INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< --- > INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< > INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< 4416,4417c4502,4505 < INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><< --- > INFO string is now >>Kris Katterjohn INFO string is now >>Kris Katterjohn <katterjohn@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com>;<< 4479,4480c4567,4570 < INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< < INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< --- > INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< > INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< 4533,4534c4623,4626 < INFO NSE_ESCAPE for html and non-html for >>Jason DePriest <jrdepriest@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Jason DePriest <jrdepriest@gmail.com><< --- > INFO string is now >>Jason DePriest INFO string is now >>Jason DePriest <jrdepriest@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Jason DePriest <jrdepriest@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Jason DePriest <jrdepriest@gmail.com>;<< 4551,4552c4643,4646 < INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><< --- > INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com>;<< 4572,4573c4666,4669 < INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< < INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< --- > INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< > INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< 4664,4665c4760,4763 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 4787,4788c4885,4888 < INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< < INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< --- > INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< > INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net>;<< 4813,4814c4913,4916 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 4834,4835c4936,4939 < INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><< --- > INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com>;<< 4852,4853c4956,4959 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 4889,4890c4995,4998 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 4907,4908c5015,5018 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 4925,4935d5035 < INFO NSE_ESCAPE for html and non-html for >> < Checks a DNS server for the predictable-port recursion vulnerability. < Predictable source ports can make a DNS server vulnerable to cache poisoning < attacks (CVE-2008-1447). < \n\n < The script works by querying porttest.dns-oarc.net. < Be aware that any targets against which this script is run will be sent to and < potentially recorded by one or more DNS servers and the porttest server. In < addition your IP address will be sent along with the porttest query to the DNS < server running on the target. < << 4940,4941c5039,5040 <

< The script works by querying porttest.dns-oarc.net. --- > \n\n > The script works by querying INFO string is now >> 4951,4952c5050,5051 <

< The script works by querying porttest.dns-oarc.net. --- > \n\n > The script works by querying
porttest.dns-oarc.net. 4957,4988c5056,5065 < << < INFO NSE_ESCAPE for html for >>Script: Brandon Enright \n<< < INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<< (2 replacements) < INFO NSE_ESCAPE for html and non-html for >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<< < INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<< (\n replaced by
) < INFO NSE_ESCAPE RETURNS >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<< < INFO NSE_ESCAPE for html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< < INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< (%z replaced by empty string) < INFO NSE_ESCAPE for html and non-html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< < INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<< (\n replaced by
) < INFO NSE_ESCAPE RETURNS >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<< < INFO NSE_ESCAPE for html for >> < Checks a DNS server for the predictable-TXID DNS recursion < vulnerability. Predictable TXID values can make a DNS server vulnerable to < cache poisoning attacks (CVE-2008-1447). < \n\n < The script works by querying txidtest.dns-oarc.net. < Be aware that any targets against which this script is run will be sent to and < potentially recorded by one or more DNS servers and the txidtest server. In < addition your IP address will be sent along with the txidtest query to the DNS < server running on the target. < << < INFO NSE_ESCAPE for html and non-html for >> < Checks a DNS server for the predictable-TXID DNS recursion < vulnerability. Predictable TXID values can make a DNS server vulnerable to < cache poisoning attacks (CVE-2008-1447). < \n\n < The script works by querying txidtest.dns-oarc.net. < Be aware that any targets against which this script is run will be sent to and < potentially recorded by one or more DNS servers and the txidtest server. In < addition your IP address will be sent along with the txidtest query to the DNS --- > << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >> > Checks a DNS server for the predictable-port recursion vulnerability. > Predictable source ports can make a DNS server vulnerable to cache poisoning > attacks (CVE-2008-1447). > \n\n > The script works by querying porttest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the porttest server. In > addition your IP address will be sent along with the porttest query to the DNS 4992,4999c5069,5076 < Checks a DNS server for the predictable-TXID DNS recursion < vulnerability. Predictable TXID values can make a DNS server vulnerable to < cache poisoning attacks (CVE-2008-1447). <

< The script works by querying txidtest.dns-oarc.net. < Be aware that any targets against which this script is run will be sent to and < potentially recorded by one or more DNS servers and the txidtest server. In < addition your IP address will be sent along with the txidtest query to the DNS --- > Checks a DNS server for the predictable-port recursion vulnerability. > Predictable source ports can make a DNS server vulnerable to cache poisoning > attacks (CVE-2008-1447). >

> The script works by querying porttest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the porttest server. In > addition your IP address will be sent along with the porttest query to the DNS 5003,5010c5080,5087 < Checks a DNS server for the predictable-TXID DNS recursion < vulnerability. Predictable TXID values can make a DNS server vulnerable to < cache poisoning attacks (CVE-2008-1447). <

< The script works by querying txidtest.dns-oarc.net. < Be aware that any targets against which this script is run will be sent to and < potentially recorded by one or more DNS servers and the txidtest server. In < addition your IP address will be sent along with the txidtest query to the DNS --- > Checks a DNS server for the predictable-port recursion vulnerability. > Predictable source ports can make a DNS server vulnerable to cache poisoning > attacks (CVE-2008-1447). >

> The script works by querying porttest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the porttest server. In > addition your IP address will be sent along with the porttest query to the DNS 5025a5102,5178 > Checks a DNS server for the predictable-TXID DNS recursion > vulnerability. Predictable TXID values can make a DNS server vulnerable to > cache poisoning attacks (CVE-2008-1447). > \n\n > The script works by querying txidtest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the txidtest server. In > addition your IP address will be sent along with the txidtest query to the DNS > server running on the target. > << > INFO string is now >> > Checks a DNS server for the predictable-TXID DNS recursion > vulnerability. Predictable TXID values can make a DNS server vulnerable to > cache poisoning attacks (CVE-2008-1447). > \n\n > The script works by querying INFO string is now >> > Checks a DNS server for the predictable-TXID DNS recursion > vulnerability. Predictable TXID values can make a DNS server vulnerable to > cache poisoning attacks (CVE-2008-1447). > \n\n > The script works by querying txidtest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the txidtest server. In > addition your IP address will be sent along with the txidtest query to the DNS > server running on the target. > << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >> > Checks a DNS server for the predictable-TXID DNS recursion > vulnerability. Predictable TXID values can make a DNS server vulnerable to > cache poisoning attacks (CVE-2008-1447). > \n\n > The script works by querying txidtest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the txidtest server. In > addition your IP address will be sent along with the txidtest query to the DNS > server running on the target. > << > INFO string is now >> > Checks a DNS server for the predictable-TXID DNS recursion > vulnerability. Predictable TXID values can make a DNS server vulnerable to > cache poisoning attacks (CVE-2008-1447). >

> The script works by querying txidtest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the txidtest server. In > addition your IP address will be sent along with the txidtest query to the DNS > server running on the target. > << (\n replaced by
) > INFO NSE_ESCAPE RETURNS >> > Checks a DNS server for the predictable-TXID DNS recursion > vulnerability. Predictable TXID values can make a DNS server vulnerable to > cache poisoning attacks (CVE-2008-1447). >

> The script works by querying txidtest.dns-oarc.net. > Be aware that any targets against which this script is run will be sent to and > potentially recorded by one or more DNS servers and the txidtest server. In > addition your IP address will be sent along with the txidtest query to the DNS > server running on the target. > << > INFO NSE_ESCAPE for html for >>Script: Brandon Enright \n<< > INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<< (2 replacements) > INFO NSE_ESCAPE for html and non-html for >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<< > INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<< (\n replaced by
) > INFO NSE_ESCAPE RETURNS >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<< > INFO NSE_ESCAPE for html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< > INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< > INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<< (\n replaced by
) > INFO NSE_ESCAPE RETURNS >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<< > INFO NSE_ESCAPE for html for >> 5046,5047c5200,5203 < INFO NSE_ESCAPE for html and non-html for >>Felix Groebert <felix@groebert.org><< < INFO NSE_ESCAPE RETURNS >>Felix Groebert <felix@groebert.org><< --- > INFO string is now >>Felix Groebert INFO string is now >>Felix Groebert <felix@groebert.org>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Felix Groebert <felix@groebert.org>;<< > INFO NSE_ESCAPE RETURNS >>Felix Groebert <felix@groebert.org>;<< 5079,5080c5235,5238 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5097,5098c5255,5258 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 5115,5116c5275,5278 < INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04<at>gmail.com><< < INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04<at>gmail.com><< --- > INFO string is now >>Marek Majkowski <majek04<at>gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04<at>gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04<at>gmail.com>;<< 5212,5213c5374,5377 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5283,5284c5447,5450 < INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><< --- > INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com>;<< 5328,5329c5494,5497 < INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com><< --- > INFO string is now >>Marek Majkowski INFO string is now >>Marek Majkowski <majek04+nse@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com>;<< 5342,5348d5510 < INFO NSE_ESCAPE for html and non-html for >> < Connects to the RIPE database and displays the role: entry for the target's IP < address. < \n\n < This script uses an external database. Your IP address and the IP address of < the target will be sent to whois.ripe.net. < << 5352,5356c5513,5531 <

< This script uses an external database. Your IP address and the IP address of < the target will be sent to whois.ripe.net. < << (\n replaced by
) < INFO NSE_ESCAPE RETURNS >> --- > \n\n > This script uses an external database. Your IP address and the IP address of > the target will be sent to INFO string is now >> > Connects to the RIPE database and displays the role: entry for the target's IP > address. > \n\n > This script uses an external database. Your IP address and the IP address of > the target will be sent to whois.ripe.net. > << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >> > Connects to the RIPE database and displays the role: entry for the target's IP > address. > \n\n > This script uses an external database. Your IP address and the IP address of > the target will be sent to whois.ripe.net. > << > INFO string is now >> 5361c5536,5543 < the target will be sent to whois.ripe.net. --- > the target will be sent to whois.ripe.net. > << (\n replaced by
) > INFO NSE_ESCAPE RETURNS >> > Connects to the RIPE database and displays the role: entry for the target's IP > address. >

> This script uses an external database. Your IP address and the IP address of > the target will be sent to whois.ripe.net. 5365,5366c5547,5550 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5397,5398c5581,5584 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 5471,5472c5657,5660 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5504,5505c5692,5695 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5537,5538c5727,5730 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5558,5559c5750,5753 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 5590,5591c5784,5787 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 6310,6311c6506,6509 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 6348,6378d6546 < INFO NSE_ESCAPE for html and non-html for >> < Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address < Assignment which contains the Target IP Address. < \n\n < The fields displayed contain information about the assignment and the organisation responsible for managing the address < space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will < be displayed. < \n\n < To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA. < The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically < to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence < of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is < found; or until the sequence is exhausted without finding either a referral or the desired record. < \n\n < The script will recognise a referral to another Whois service if that service is defined in the script and will continue by < sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. < \n\n < To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be < applied to any targets within the range of addresses represented in the record. < \n\n < In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments < applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important < to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb" < should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a < cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution < due to the potential to send large numbers of whois queries and possibly be banned from using the services. < \n\n < In using this script your IP address will be sent to iana.org. Additionally < your address and the address of the target of the scan will be sent to one of < the RIRs. < << 6382c6549 <

--- > \n\n 6386c6553 <

--- > \n\n 6392,6398c6559,6565 <

< The script will recognise a referral to another Whois service if that service is defined in the script and will continue by < sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. <

< To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be < applied to any targets within the range of addresses represented in the record. <

--- > \n\n > The script will recognise a referral to another Whois service if that service is defined in the script and will continue by > sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. > \n\n > To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be > applied to any targets within the range of addresses represented in the record. > \n\n 6405,6413c6572,6580 <

< In using this script your IP address will be sent to iana.org. Additionally < your address and the address of the target of the scan will be sent to one of < the RIRs. < << (\n replaced by
) < INFO NSE_ESCAPE RETURNS >> < Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address < Assignment which contains the Target IP Address. <

--- > \n\n > In using this script your IP address will be sent to INFO string is now >> > Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address > Assignment which contains the Target IP Address. > \n\n 6417c6584 <

--- > \n\n 6423,6429c6590,6596 <

< The script will recognise a referral to another Whois service if that service is defined in the script and will continue by < sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. <

< To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be < applied to any targets within the range of addresses represented in the record. <

--- > \n\n > The script will recognise a referral to another Whois service if that service is defined in the script and will continue by > sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. > \n\n > To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be > applied to any targets within the range of addresses represented in the record. > \n\n 6436,6437c6603,6635 <

< In using this script your IP address will be sent to iana.org. Additionally --- > \n\n > In using this script your IP address will be sent to
iana.org. Additionally > your address and the address of the target of the scan will be sent to one of > the RIRs. > << (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >> > Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address > Assignment which contains the Target IP Address. > \n\n > The fields displayed contain information about the assignment and the organisation responsible for managing the address > space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will > be displayed. > \n\n > To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA. > The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically > to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence > of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is > found; or until the sequence is exhausted without finding either a referral or the desired record. > \n\n > The script will recognise a referral to another Whois service if that service is defined in the script and will continue by > sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. > \n\n > To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be > applied to any targets within the range of addresses represented in the record. > \n\n > In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments > applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important > to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb" > should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a > cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution > due to the potential to send large numbers of whois queries and possibly be banned from using the services. > \n\n > In using this script your IP address will be sent to iana.org. Additionally 6441a6639,6700 > INFO string is now >> > Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address > Assignment which contains the Target IP Address. >

> The fields displayed contain information about the assignment and the organisation responsible for managing the address > space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will > be displayed. >

> To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA. > The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically > to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence > of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is > found; or until the sequence is exhausted without finding either a referral or the desired record. >

> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by > sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. >

> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be > applied to any targets within the range of addresses represented in the record. >

> In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments > applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important > to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb" > should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a > cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution > due to the potential to send large numbers of whois queries and possibly be banned from using the services. >

> In using this script your IP address will be sent to iana.org. Additionally > your address and the address of the target of the scan will be sent to one of > the RIRs. > << (\n replaced by
) > INFO NSE_ESCAPE RETURNS >> > Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address > Assignment which contains the Target IP Address. >

> The fields displayed contain information about the assignment and the organisation responsible for managing the address > space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will > be displayed. >

> To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA. > The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically > to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence > of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is > found; or until the sequence is exhausted without finding either a referral or the desired record. >

> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by > sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral. >

> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be > applied to any targets within the range of addresses represented in the record. >

> In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments > applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important > to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb" > should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a > cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution > due to the potential to send large numbers of whois queries and possibly be banned from using the services. >

> In using this script your IP address will be sent to iana.org. Additionally > your address and the address of the target of the scan will be sent to one of > the RIRs. > << 6454,6455c6714,6717 < INFO NSE_ESCAPE for html and non-html for >>jah <jah at zadkiel.plus.com><< < INFO NSE_ESCAPE RETURNS >>jah <jah at zadkiel.plus.com><< --- > INFO string is now >>jah <jah at INFO string is now >>jah <jah at zadkiel.plus.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>jah <jah at zadkiel.plus.com>;<< > INFO NSE_ESCAPE RETURNS >>jah <jah at zadkiel.plus.com>;<< 6760,6761c7022,7025 < INFO NSE_ESCAPE for html and non-html for >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<< < INFO NSE_ESCAPE RETURNS >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<< --- > INFO string is now >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<< > INFO NSE_ESCAPE RETURNS >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<< 6938,6939c7202,7205 < INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><< --- > INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com>;<< 7055,7056c7321,7324 < INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><< < INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><< --- > INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com>;<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com>;<< > INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com>;<< 7097,7098c7365,7368 < INFO NSE_ESCAPE for html and non-html for >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<< < INFO NSE_ESCAPE RETURNS >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<< --- > INFO string is now >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<< (%z replaced by empty string) > INFO NSE_ESCAPE for html and non-html for >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<< > INFO NSE_ESCAPE RETURNS >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<<