Closed cyberfreaq closed 2 years ago
I would consider changing the portrule to portrule = shortport.http. This will run the script against the following ports and services (according to https://github.com/nmap/nmap/blob/master/nselib/shortport.lua):
portrule = shortport.http
LIKELY_HTTP_PORTS = { 80, 443, 631, 7080, 8080, 8443, 8088, 5800, 3872, 8180, 8000 }
LIKELY_HTTP_SERVICES = { "http", "https", "ipp", "http-alt", "https-alt", "vnc-http", "oem-agent", "soap", "http-proxy", "caldav", "carddav", "webdav", }
I would consider changing the portrule to
portrule = shortport.http
. This will run the script against the following ports and services (according to https://github.com/nmap/nmap/blob/master/nselib/shortport.lua):LIKELY_HTTP_PORTS = { 80, 443, 631, 7080, 8080, 8443, 8088, 5800, 3872, 8180, 8000 }
LIKELY_HTTP_SERVICES = { "http", "https", "ipp", "http-alt", "https-alt", "vnc-http", "oem-agent", "soap", "http-proxy", "caldav", "carddav", "webdav", }