Nmap Development mailing list archives

Re: [RFC] Default NSE Scripts


From: Kris Katterjohn <katterjohn () gmail com>
Date: Thu, 15 May 2008 00:10:37 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

jah wrote:
On 14/05/2008 17:06, Kris Katterjohn wrote:
I've committed the patch for this and added to Default.  Aside from
SMTPcommands being changed (which can wait and be moved over later), are
there any other outstanding issues with the current list below?

What about dns-test-open-recusion as Jah mentioned?
I did a little test and from 5000 hosts, 7 had udp 53 open and of those,
3 resulted in "Recursion seems enabled".  So, er, that's conclusive then.
Of course, this means I got 4997 "Recursion not enabled" which gives a
very poor signal to noise ratio!
Perhaps it would be best to leave this one out.


Unless there is any objection, I'm going to remove the "Recursion not
enabled" from the script because it does add unnecessary clutter to the
output (even completely aside from the Default-worthiness of it).

3/7 isn't bad, so I think it is still OK for Default with the above
removed.  What do you guys think?

jah


Thanks,
Kris Katterjohn

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=exVR
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: