Compare: (<)U:\dev\nmap\svn\nsedoc\src\log2.txt (868150 bytes)
with: (>)U:\dev\nmap\svn\nsedoc\src\log.txt (900855 bytes)
447,448c447,450
< INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
---
> INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
1086,1087c1088,1091
< INFO NSE_ESCAPE for html and non-html for >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<<
< INFO NSE_ESCAPE RETURNS >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<<
---
> INFO string is now >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<<
> INFO NSE_ESCAPE RETURNS >>if ipOps.compare_ip( "2001::DEAD:0:0:0", "eq", "2001:0:0:0:DEAD::" ) then ...<<
1363,1364c1367,1370
< INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><<
< INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><<
---
> INFO string is now >>Ron Bowes INFO string is now >>Ron Bowes <ron@skullsecurity.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><<
> INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><<
1785,1786c1791,1794
< INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><<
< INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><<
---
> INFO string is now >>Ron Bowes INFO string is now >>Ron Bowes <ron@skullsecurity.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><<
> INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><<
1862,1863c1870,1873
< INFO NSE_ESCAPE for html and non-html for >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<<
< INFO NSE_ESCAPE RETURNS >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<<
---
> INFO string is now >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<<
> INFO NSE_ESCAPE RETURNS >>[optional] The scope to encode it with. I've never seen scopes used in the real world (eg, "insecure.org").<<
2449,2450c2459,2462
< INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com><<
---
> INFO string is now >>Marek Majkowski INFO string is now >>Marek Majkowski <majek04+nse@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com><<
2990,2991c3002,3005
< INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><<
< INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><<
---
> INFO string is now >>Ron Bowes INFO string is now >>Ron Bowes <ron@skullsecurity.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Ron Bowes <ron@skullsecurity.net><<
> INFO NSE_ESCAPE RETURNS >>Ron Bowes <ron@skullsecurity.net><<
3176,3178c3190,3194
< INFO NSE_ESCAPE for html and non-html for >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined. \n \n Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:\n 1) The name the user provided, if present\n 2) The name pulled from NetBIOS (udp/137), if possible\n 3) The generic name "*SMBSERVER"\n 4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")\n \n This whole sequence is a little hackish, but it's the standard way of doing it. <<
< INFO string is now >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.
Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")
This whole sequence is a little hackish, but it's the standard way of doing it. << (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.
Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")
This whole sequence is a little hackish, but it's the standard way of doing it. <<
---
> INFO string is now >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined. \n \n Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:\n 1) The name the user provided, if present\n 2) The name pulled from NetBIOS (udp/137), if possible\n 3) The generic name "*SMBSERVER"\n 4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")\n \n This whole sequence is a little hackish, but it's the standard way of doing it. << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined. \n \n Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:\n 1) The name the user provided, if present\n 2) The name pulled from NetBIOS (udp/137), if possible\n 3) The generic name "*SMBSERVER"\n 4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and "scanme.insecure.org")\n \n This whole sequence is a little hackish, but it's the standard way of doing it. <<
> INFO string is now >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.
Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and ">"scanme.insecure.org")
This whole sequence is a little hackish, but it's the standard way of doing it. << (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>Begins a SMB session over NetBIOS. This requires a NetBIOS Session Start message to be sent first, which in turn requires the NetBIOS name. The name can be provided as a parameter, or it can be automatically determined.
Automatically determining the name is interesting, to say the least. Here are the names it tries, and the order it tries them in:
1) The name the user provided, if present
2) The name pulled from NetBIOS (udp/137), if possible
3) The generic name "*SMBSERVER"
4) Each subset of the domain name (for example, scanme.insecure.org would attempt "scanme", "scanme.insecure", and ">"scanme.insecure.org")
This whole sequence is a little hackish, but it's the standard way of doing it. <<
3848,3849c3864,3867
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
3990c4008
< INFO NSE_ESCAPE for html and non-html for >>
---
> INFO string is now >>
3994c4012
< queries a third-party service provided by Team Cymru (team-cymru.org) using an
---
> queries a third-party service provided by Team Cymru INFO string is now >>
> Maps IP addresses to autonomous system (AS) numbers.
> \n\n
> The script works by sending DNS TXT queries to a DNS server which in turn
> queries a third-party service provided by Team Cymru (team-cymru.org) using an
> in-addr.arpa style zone set-up especially for use by Nmap.
> \n\n
> The responses to these queries contain both Origin and Peer ASNs and their
> descriptions, displayed along with the BG Prefix and Country Code.
> \n\n
4022c4040
<
---
> \n\n
4027,4037c4045,4055
< << (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>
< Maps IP addresses to autonomous system (AS) numbers.
<
< The script works by sending DNS TXT queries to a DNS server which in turn
< queries a third-party service provided by Team Cymru (team-cymru.org) using an
< in-addr.arpa style zone set-up especially for use by Nmap.
<
< The responses to these queries contain both Origin and Peer ASNs and their
< descriptions, displayed along with the BG Prefix and Country Code.
<
---
> << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>
> Maps IP addresses to autonomous system (AS) numbers.
> \n\n
> The script works by sending DNS TXT queries to a DNS server which in turn
> queries a third-party service provided by Team Cymru (team-cymru.org) using an
> in-addr.arpa style zone set-up especially for use by Nmap.
> \n\n
> The responses to these queries contain both Origin and Peer ASNs and their
> descriptions, displayed along with the BG Prefix and Country Code.
> \n\n
4041c4059
<
---
> \n\n
4047a4065,4102
> INFO string is now >>
> Maps IP addresses to autonomous system (AS) numbers.
>
> The script works by sending DNS TXT queries to a DNS server which in turn
> queries a third-party service provided by Team Cymru (team-cymru.org) using an
> in-addr.arpa style zone set-up especially for use by Nmap.
>
> The responses to these queries contain both Origin and Peer ASNs and their
> descriptions, displayed along with the BG Prefix and Country Code.
>
> The script caches results to reduce the number of queries and should perform a
> single query for all scanned targets in a BG Prefix present in Team Cymru's
> database.
>
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and Team Cymru. In addition
> your IP address will be sent along with the ASN to a DNS server (your default
> DNS server, or whichever you specified with the dns script argument).
> << (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>
> Maps IP addresses to autonomous system (AS) numbers.
>
> The script works by sending DNS TXT queries to a DNS server which in turn
> queries a third-party service provided by Team Cymru (team-cymru.org) using an
> in-addr.arpa style zone set-up especially for use by Nmap.
>
> The responses to these queries contain both Origin and Peer ASNs and their
> descriptions, displayed along with the BG Prefix and Country Code.
>
> The script caches results to reduce the number of queries and should perform a
> single query for all scanned targets in a BG Prefix present in Team Cymru's
> database.
>
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and Team Cymru. In addition
> your IP address will be sent along with the ASN to a DNS server (your default
> DNS server, or whichever you specified with the dns script argument).
> <<
4170,4172c4226,4230
< INFO NSE_ESCAPE for html and non-html for >>Team Cymru zones for rDNS like queries. The zones are as follows: \n nmap.asn.cymru.com for IPv4 to Origin AS lookup. \n peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. \n nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<<
< INFO string is now >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<<
---
> INFO string is now >>Team Cymru zones for rDNS like queries. The zones are as follows: \n nmap.asn.cymru.com for IPv4 to Origin AS lookup. \n peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. \n nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Team Cymru zones for rDNS like queries. The zones are as follows: \n nmap.asn.cymru.com for IPv4 to Origin AS lookup. \n peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. \n nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<<
> INFO string is now >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<< (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>Team Cymru zones for rDNS like queries. The zones are as follows:
nmap.asn.cymru.com for IPv4 to Origin AS lookup.
peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup.
nmap6.asn.cymru.com for IPv6 to Origin AS lookup.<<
4190,4191c4248,4251
< INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
< INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
---
> INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
> INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
4206,4209c4266,4269
< INFO NSE_ESCAPE for html and non-html for >>
< Checks if an HTTP proxy is open.
< \n\n
< The script attempts to connect to www.google.com through the proxy and checks
---
> INFO string is now >>
> Checks if an HTTP proxy is open.
> \n\n
> The script attempts to connect to << (([%s(<[])([^%s%z]*%.com%S-)(%p?%s) replaced by %1www.google.com through the proxy and checks
> for a 'Server: gws' header field in the response.
> \n\n
> If the target is an open proxy, this script will cause the target to retrieve a
> web page from www.google.com.
> << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>
> Checks if an HTTP proxy is open.
> \n\n
> The script attempts to connect to www.google.com through the proxy and checks
> for a 'Server: gws' header field in the response.
> \n\n
> If the target is an open proxy, this script will cause the target to retrieve a
> web page from www.google.com.
4218c4296
< The script attempts to connect to www.google.com through the proxy and checks
---
> The script attempts to connect to www.google.com through the proxy and checks
4222c4300
< web page from www.google.com.
---
> web page from www.google.com.
4227c4305
< The script attempts to connect to www.google.com through the proxy and checks
---
> The script attempts to connect to www.google.com through the proxy and checks
4231c4309
< web page from www.google.com.
---
> web page from www.google.com.
4235,4236c4313,4316
< INFO NSE_ESCAPE for html and non-html for >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><<
< INFO NSE_ESCAPE RETURNS >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><<
---
> INFO string is now >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><<
> INFO NSE_ESCAPE RETURNS >>Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar><<
4270,4271c4350,4353
< INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><<
---
> INFO string is now >>Kris Katterjohn INFO string is now >>Kris Katterjohn <katterjohn@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><<
4333,4334c4415,4418
< INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><<
---
> INFO string is now >>Kris Katterjohn INFO string is now >>Kris Katterjohn <katterjohn@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><<
4372,4373c4456,4459
< INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
< INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
---
> INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
> INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
4416,4417c4502,4505
< INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><<
---
> INFO string is now >>Kris Katterjohn INFO string is now >>Kris Katterjohn <katterjohn@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Kris Katterjohn <katterjohn@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Kris Katterjohn <katterjohn@gmail.com><<
4479,4480c4567,4570
< INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
< INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
---
> INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
> INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
4533,4534c4623,4626
< INFO NSE_ESCAPE for html and non-html for >>Jason DePriest <jrdepriest@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Jason DePriest <jrdepriest@gmail.com><<
---
> INFO string is now >>Jason DePriest INFO string is now >>Jason DePriest <jrdepriest@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Jason DePriest <jrdepriest@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Jason DePriest <jrdepriest@gmail.com><<
4551,4552c4643,4646
< INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
---
> INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
4572,4573c4666,4669
< INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
< INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
---
> INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
> INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
4664,4665c4760,4763
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
4787,4788c4885,4888
< INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
< INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
---
> INFO string is now >>Thomas Buchanan <tbuchanan@thecompassgrp.net><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
> INFO NSE_ESCAPE RETURNS >>Thomas Buchanan <tbuchanan@thecompassgrp.net><<
4813,4814c4913,4916
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
4834,4835c4936,4939
< INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
---
> INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
4852,4853c4956,4959
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
4889,4890c4995,4998
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
4907,4908c5015,5018
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
4925,4935d5035
< INFO NSE_ESCAPE for html and non-html for >>
< Checks a DNS server for the predictable-port recursion vulnerability.
< Predictable source ports can make a DNS server vulnerable to cache poisoning
< attacks (CVE-2008-1447).
< \n\n
< The script works by querying porttest.dns-oarc.net.
< Be aware that any targets against which this script is run will be sent to and
< potentially recorded by one or more DNS servers and the porttest server. In
< addition your IP address will be sent along with the porttest query to the DNS
< server running on the target.
< <<
4940,4941c5039,5040
<
< The script works by querying porttest.dns-oarc.net.
---
> \n\n
> The script works by querying INFO string is now >>
4951,4952c5050,5051
<
< The script works by querying porttest.dns-oarc.net.
---
> \n\n
> The script works by querying porttest.dns-oarc.net.
4957,4988c5056,5065
< <<
< INFO NSE_ESCAPE for html for >>Script: Brandon Enright \n<<
< INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<< (2 replacements)
< INFO NSE_ESCAPE for html and non-html for >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<<
< INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<< (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<<
< INFO NSE_ESCAPE for html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<<
< INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< (%z replaced by empty string)
< INFO NSE_ESCAPE for html and non-html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<<
< INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<< (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<<
< INFO NSE_ESCAPE for html for >>
< Checks a DNS server for the predictable-TXID DNS recursion
< vulnerability. Predictable TXID values can make a DNS server vulnerable to
< cache poisoning attacks (CVE-2008-1447).
< \n\n
< The script works by querying txidtest.dns-oarc.net.
< Be aware that any targets against which this script is run will be sent to and
< potentially recorded by one or more DNS servers and the txidtest server. In
< addition your IP address will be sent along with the txidtest query to the DNS
< server running on the target.
< <<
< INFO NSE_ESCAPE for html and non-html for >>
< Checks a DNS server for the predictable-TXID DNS recursion
< vulnerability. Predictable TXID values can make a DNS server vulnerable to
< cache poisoning attacks (CVE-2008-1447).
< \n\n
< The script works by querying txidtest.dns-oarc.net.
< Be aware that any targets against which this script is run will be sent to and
< potentially recorded by one or more DNS servers and the txidtest server. In
< addition your IP address will be sent along with the txidtest query to the DNS
---
> << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>
> Checks a DNS server for the predictable-port recursion vulnerability.
> Predictable source ports can make a DNS server vulnerable to cache poisoning
> attacks (CVE-2008-1447).
> \n\n
> The script works by querying porttest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the porttest server. In
> addition your IP address will be sent along with the porttest query to the DNS
4992,4999c5069,5076
< Checks a DNS server for the predictable-TXID DNS recursion
< vulnerability. Predictable TXID values can make a DNS server vulnerable to
< cache poisoning attacks (CVE-2008-1447).
<
< The script works by querying txidtest.dns-oarc.net.
< Be aware that any targets against which this script is run will be sent to and
< potentially recorded by one or more DNS servers and the txidtest server. In
< addition your IP address will be sent along with the txidtest query to the DNS
---
> Checks a DNS server for the predictable-port recursion vulnerability.
> Predictable source ports can make a DNS server vulnerable to cache poisoning
> attacks (CVE-2008-1447).
>
> The script works by querying porttest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the porttest server. In
> addition your IP address will be sent along with the porttest query to the DNS
5003,5010c5080,5087
< Checks a DNS server for the predictable-TXID DNS recursion
< vulnerability. Predictable TXID values can make a DNS server vulnerable to
< cache poisoning attacks (CVE-2008-1447).
<
< The script works by querying txidtest.dns-oarc.net.
< Be aware that any targets against which this script is run will be sent to and
< potentially recorded by one or more DNS servers and the txidtest server. In
< addition your IP address will be sent along with the txidtest query to the DNS
---
> Checks a DNS server for the predictable-port recursion vulnerability.
> Predictable source ports can make a DNS server vulnerable to cache poisoning
> attacks (CVE-2008-1447).
>
> The script works by querying porttest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the porttest server. In
> addition your IP address will be sent along with the porttest query to the DNS
5025a5102,5178
> Checks a DNS server for the predictable-TXID DNS recursion
> vulnerability. Predictable TXID values can make a DNS server vulnerable to
> cache poisoning attacks (CVE-2008-1447).
> \n\n
> The script works by querying txidtest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the txidtest server. In
> addition your IP address will be sent along with the txidtest query to the DNS
> server running on the target.
> <<
> INFO string is now >>
> Checks a DNS server for the predictable-TXID DNS recursion
> vulnerability. Predictable TXID values can make a DNS server vulnerable to
> cache poisoning attacks (CVE-2008-1447).
> \n\n
> The script works by querying INFO string is now >>
> Checks a DNS server for the predictable-TXID DNS recursion
> vulnerability. Predictable TXID values can make a DNS server vulnerable to
> cache poisoning attacks (CVE-2008-1447).
> \n\n
> The script works by querying txidtest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the txidtest server. In
> addition your IP address will be sent along with the txidtest query to the DNS
> server running on the target.
> << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>
> Checks a DNS server for the predictable-TXID DNS recursion
> vulnerability. Predictable TXID values can make a DNS server vulnerable to
> cache poisoning attacks (CVE-2008-1447).
> \n\n
> The script works by querying txidtest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the txidtest server. In
> addition your IP address will be sent along with the txidtest query to the DNS
> server running on the target.
> <<
> INFO string is now >>
> Checks a DNS server for the predictable-TXID DNS recursion
> vulnerability. Predictable TXID values can make a DNS server vulnerable to
> cache poisoning attacks (CVE-2008-1447).
>
> The script works by querying txidtest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the txidtest server. In
> addition your IP address will be sent along with the txidtest query to the DNS
> server running on the target.
> << (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>
> Checks a DNS server for the predictable-TXID DNS recursion
> vulnerability. Predictable TXID values can make a DNS server vulnerable to
> cache poisoning attacks (CVE-2008-1447).
>
> The script works by querying txidtest.dns-oarc.net.
> Be aware that any targets against which this script is run will be sent to and
> potentially recorded by one or more DNS servers and the txidtest server. In
> addition your IP address will be sent along with the txidtest query to the DNS
> server running on the target.
> <<
> INFO NSE_ESCAPE for html for >>Script: Brandon Enright \n<<
> INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<< (2 replacements)
> INFO NSE_ESCAPE for html and non-html for >>Script: Brandon Enright <bmenrigh@ucsd.edu>\n<<
> INFO string is now >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<< (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>Script: Brandon Enright <bmenrigh@ucsd.edu>
<<
> INFO NSE_ESCAPE for html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<<
> INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html\n<<
> INFO string is now >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<< (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>Script: Same as Nmap--See http://nmap.org/book/man-legal.html
<<
> INFO NSE_ESCAPE for html for >>
5046,5047c5200,5203
< INFO NSE_ESCAPE for html and non-html for >>Felix Groebert <felix@groebert.org><<
< INFO NSE_ESCAPE RETURNS >>Felix Groebert <felix@groebert.org><<
---
> INFO string is now >>Felix Groebert INFO string is now >>Felix Groebert <felix@groebert.org><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Felix Groebert <felix@groebert.org><<
> INFO NSE_ESCAPE RETURNS >>Felix Groebert <felix@groebert.org><<
5079,5080c5235,5238
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5097,5098c5255,5258
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
5115,5116c5275,5278
< INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04<at>gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04<at>gmail.com><<
---
> INFO string is now >>Marek Majkowski <majek04<at>gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04<at>gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04<at>gmail.com><<
5212,5213c5374,5377
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5283,5284c5447,5450
< INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
---
> INFO string is now >>Philip Pickering INFO string is now >>Philip Pickering <pgpickering@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Philip Pickering <pgpickering@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Philip Pickering <pgpickering@gmail.com><<
5328,5329c5494,5497
< INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com><<
---
> INFO string is now >>Marek Majkowski INFO string is now >>Marek Majkowski <majek04+nse@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Marek Majkowski <majek04+nse@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Marek Majkowski <majek04+nse@gmail.com><<
5342,5348d5510
< INFO NSE_ESCAPE for html and non-html for >>
< Connects to the RIPE database and displays the role: entry for the target's IP
< address.
< \n\n
< This script uses an external database. Your IP address and the IP address of
< the target will be sent to whois.ripe.net.
< <<
5352,5356c5513,5531
<
< This script uses an external database. Your IP address and the IP address of
< the target will be sent to whois.ripe.net.
< << (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>
---
> \n\n
> This script uses an external database. Your IP address and the IP address of
> the target will be sent to INFO string is now >>
> Connects to the RIPE database and displays the role: entry for the target's IP
> address.
> \n\n
> This script uses an external database. Your IP address and the IP address of
> the target will be sent to whois.ripe.net.
> << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>
> Connects to the RIPE database and displays the role: entry for the target's IP
> address.
> \n\n
> This script uses an external database. Your IP address and the IP address of
> the target will be sent to whois.ripe.net.
> <<
> INFO string is now >>
5361c5536,5543
< the target will be sent to whois.ripe.net.
---
> the target will be sent to whois.ripe.net.
> << (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>
> Connects to the RIPE database and displays the role: entry for the target's IP
> address.
>
> This script uses an external database. Your IP address and the IP address of
> the target will be sent to whois.ripe.net.
5365,5366c5547,5550
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5397,5398c5581,5584
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
5471,5472c5657,5660
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5504,5505c5692,5695
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5537,5538c5727,5730
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5558,5559c5750,5753
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
5590,5591c5784,5787
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
6310,6311c6506,6509
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
6348,6378d6546
< INFO NSE_ESCAPE for html and non-html for >>
< Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address
< Assignment which contains the Target IP Address.
< \n\n
< The fields displayed contain information about the assignment and the organisation responsible for managing the address
< space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will
< be displayed.
< \n\n
< To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA.
< The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically
< to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence
< of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is
< found; or until the sequence is exhausted without finding either a referral or the desired record.
< \n\n
< The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
< sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
< \n\n
< To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
< applied to any targets within the range of addresses represented in the record.
< \n\n
< In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments
< applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important
< to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb"
< should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a
< cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution
< due to the potential to send large numbers of whois queries and possibly be banned from using the services.
< \n\n
< In using this script your IP address will be sent to iana.org. Additionally
< your address and the address of the target of the scan will be sent to one of
< the RIRs.
< <<
6382c6549
<
---
> \n\n
6386c6553
<
---
> \n\n
6392,6398c6559,6565
<
< The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
< sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
<
< To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
< applied to any targets within the range of addresses represented in the record.
<
---
> \n\n
> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
> sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
> \n\n
> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
> applied to any targets within the range of addresses represented in the record.
> \n\n
6405,6413c6572,6580
<
< In using this script your IP address will be sent to iana.org. Additionally
< your address and the address of the target of the scan will be sent to one of
< the RIRs.
< << (\n replaced by
)
< INFO NSE_ESCAPE RETURNS >>
< Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address
< Assignment which contains the Target IP Address.
<
---
> \n\n
> In using this script your IP address will be sent to INFO string is now >>
> Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address
> Assignment which contains the Target IP Address.
> \n\n
6417c6584
<
---
> \n\n
6423,6429c6590,6596
<
< The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
< sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
<
< To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
< applied to any targets within the range of addresses represented in the record.
<
---
> \n\n
> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
> sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
> \n\n
> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
> applied to any targets within the range of addresses represented in the record.
> \n\n
6436,6437c6603,6635
<
< In using this script your IP address will be sent to iana.org. Additionally
---
> \n\n
> In using this script your IP address will be sent to iana.org. Additionally
> your address and the address of the target of the scan will be sent to one of
> the RIRs.
> << (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>
> Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address
> Assignment which contains the Target IP Address.
> \n\n
> The fields displayed contain information about the assignment and the organisation responsible for managing the address
> space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will
> be displayed.
> \n\n
> To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA.
> The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically
> to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence
> of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is
> found; or until the sequence is exhausted without finding either a referral or the desired record.
> \n\n
> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
> sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
> \n\n
> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
> applied to any targets within the range of addresses represented in the record.
> \n\n
> In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments
> applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important
> to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb"
> should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a
> cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution
> due to the potential to send large numbers of whois queries and possibly be banned from using the services.
> \n\n
> In using this script your IP address will be sent to iana.org. Additionally
6441a6639,6700
> INFO string is now >>
> Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address
> Assignment which contains the Target IP Address.
>
> The fields displayed contain information about the assignment and the organisation responsible for managing the address
> space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will
> be displayed.
>
> To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA.
> The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically
> to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence
> of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is
> found; or until the sequence is exhausted without finding either a referral or the desired record.
>
> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
> sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
>
> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
> applied to any targets within the range of addresses represented in the record.
>
> In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments
> applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important
> to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb"
> should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a
> cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution
> due to the potential to send large numbers of whois queries and possibly be banned from using the services.
>
> In using this script your IP address will be sent to iana.org. Additionally
> your address and the address of the target of the scan will be sent to one of
> the RIRs.
> << (\n replaced by
)
> INFO NSE_ESCAPE RETURNS >>
> Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address
> Assignment which contains the Target IP Address.
>
> The fields displayed contain information about the assignment and the organisation responsible for managing the address
> space. When output verbosity is requested on the Nmap command line (-v) extra information about the assignment will
> be displayed.
>
> To determine which of the RIRs to query for a given Target IP Address this script utilises Assignments Data hosted by IANA.
> The data is cached locally and then parsed for use as a lookup table. The locally cached files are refreshed periodically
> to help ensure the data is current. If, for any reason, these files are not available to the script then a default sequence
> of Whois services are queried in turn until: the desired record is found; or a referral to another (defined) Whois service is
> found; or until the sequence is exhausted without finding either a referral or the desired record.
>
> The script will recognise a referral to another Whois service if that service is defined in the script and will continue by
> sending a query to the referred service. A record is assumed to be the desired one if it does not contain a referral.
>
> To reduce the number unecessary queries sent to Whois services a record cache is employed and the entries in the cache can be
> applied to any targets within the range of addresses represented in the record.
>
> In certain circumstances, the ability to cache responses prevents the discovery of other, smaller IP address assignments
> applicable to the target because a cached response is accepted in preference to sending a Whois query. When it is important
> to ensure that the most accurate information about the IP address assignment is retrieved the script argument "whodb"
> should be used with a value of "nocache" (see script arguments below). This reduces the range of addresses that may use a
> cached record to a size that helps ensure that smaller assignments will be discovered. This option should be used with caution
> due to the potential to send large numbers of whois queries and possibly be banned from using the services.
>
> In using this script your IP address will be sent to iana.org. Additionally
> your address and the address of the target of the scan will be sent to one of
> the RIRs.
> <<
6454,6455c6714,6717
< INFO NSE_ESCAPE for html and non-html for >>jah <jah at zadkiel.plus.com><<
< INFO NSE_ESCAPE RETURNS >>jah <jah at zadkiel.plus.com><<
---
> INFO string is now >>jah <jah at INFO string is now >>jah <jah at zadkiel.plus.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>jah <jah at zadkiel.plus.com><<
> INFO NSE_ESCAPE RETURNS >>jah <jah at zadkiel.plus.com><<
6760,6761c7022,7025
< INFO NSE_ESCAPE for html and non-html for >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<<
< INFO NSE_ESCAPE RETURNS >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<<
---
> INFO string is now >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<<
> INFO NSE_ESCAPE RETURNS >>Table of strings. Each is the id of a whois service queried for the Target (tracking.completed).<<
6938,6939c7202,7205
< INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
---
> INFO string is now >>Diman Todorov INFO string is now >>Diman Todorov <diman.todorov@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Diman Todorov <diman.todorov@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Diman Todorov <diman.todorov@gmail.com><<
7055,7056c7321,7324
< INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
< INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
---
> INFO string is now >>Eddie Bell INFO string is now >>Eddie Bell <ejlbell@gmail.com><< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Eddie Bell <ejlbell@gmail.com><<
> INFO NSE_ESCAPE RETURNS >>Eddie Bell <ejlbell@gmail.com><<
7097,7098c7365,7368
< INFO NSE_ESCAPE for html and non-html for >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<<
< INFO NSE_ESCAPE RETURNS >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<<
---
> INFO string is now >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<< (%z replaced by empty string)
> INFO NSE_ESCAPE for html and non-html for >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<<
> INFO NSE_ESCAPE RETURNS >>Build RFC 1035 root domain name from the name of the DNS server (e.g ns1.website.com.ar -> \007website\003com\002ar\000).<<