unofficial mirror of guix-patches@gnu.org 
 help / color / mirror / code / Atom feed
blob 461b0820562a827f74b62253f730faaf73661ea8 12448 bytes (raw)
name: gnu/packages/patches/ncrack-fix-spelling-errors.patch 	 # note: path name is non-authoritative(*)

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
 
From: Sophie Brun <sophie@freexian.com>
Date: Wed, 28 Aug 2019 11:47:34 +0200
Subject: Fix spelling error

Last-Update: 2019-08-28

Last-Update: 2019-08-28
---
 docs/ncrack.1         | 16 ++++++++--------
 docs/ncrack.usage.txt |  2 +-
 ncrack.cc             |  4 ++--
 ncrack_input.cc       |  2 +-
 4 files changed, 12 insertions(+), 12 deletions(-)

diff --git a/docs/ncrack.1 b/docs/ncrack.1
index 2f12990..a8907b8 100644
--- a/docs/ncrack.1
+++ b/docs/ncrack.1
@@ -116,7 +116,7 @@ SERVICE SPECIFICATION:
     domain <name>: used in modules like WinRM to specify the domain
 TIMING AND PERFORMANCE:
   Options which take <time> are in seconds, unless you append \'ms\'
-  (miliseconds), \'m\' (minutes), or \'h\' (hours) to the value (e\&.g\&. 30m)\&.
+  (milliseconds), \'m\' (minutes), or \'h\' (hours) to the value (e\&.g\&. 30m)\&.
   Service\-specific options:
     cl (min connection limit): minimum number of concurrent parallel connections
     CL (max connection limit): maximum number of concurrent parallel connections
@@ -237,7 +237,7 @@ rather than on the command line\&.
 .SH "SERVICE SPECIFICATION"
 .\" service specification
 .PP
-No cracking session can be carried out without targetting a certain service to attack\&. Service specification is one of the most flexible subsystems of Ncrack and collaborates with target\-specification in a way that allows different option combinations to be applied\&. For Ncrack to start running, you will have to specify at least one target host and one associated service to attack\&. Ncrack provides ways to specify a service by its default port number, by its name (as extracted from the
+No cracking session can be carried out without targeting a certain service to attack\&. Service specification is one of the most flexible subsystems of Ncrack and collaborates with target\-specification in a way that allows different option combinations to be applied\&. For Ncrack to start running, you will have to specify at least one target host and one associated service to attack\&. Ncrack provides ways to specify a service by its default port number, by its name (as extracted from the
 ncrack\-services
 file) or both\&. Normally, you need to define both name and port number only in the special case where you know that a particular service is listening on a non\-default port\&.
 .PP
@@ -317,7 +317,7 @@ option (see below for explanation)\&.
 .SH "SERVICE OPTIONS"
 .\" service options
 .PP
-Apart from general service specification, Ncrack allows you to provide a multitude of options that apply to each or a subset of your targets\&. Options include timing and performance optimizations (which are thoroughly analyzed in a seperate section), SSL enabling/disabling and other module\-specific parameters like the relative URL path for the HTTP module\&. Options can be defined in a variety of ways which include: per\-host options, per\-module options and global options\&. Since a combination of these options may be used, there is a strict hierarchy of precedence which will be discussed later\&.
+Apart from general service specification, Ncrack allows you to provide a multitude of options that apply to each or a subset of your targets\&. Options include timing and performance optimizations (which are thoroughly analyzed in a separate section), SSL enabling/disabling and other module\-specific parameters like the relative URL path for the HTTP module\&. Options can be defined in a variety of ways which include: per\-host options, per\-module options and global options\&. Since a combination of these options may be used, there is a strict hierarchy of precedence which will be discussed later\&.
 .PP
 \fBPer\-host Options\fR
 .PP
@@ -555,7 +555,7 @@ all do the same thing\&.
 
 \fBConnection Limit\fR
 .sp
-These options control the total number of connections that may be outstanding for any service at the same time\&. Normally, Ncrack tries to dynamically adjust the number of connections for each individual target by counting how many drops or connection failures happen\&. If a strange network condition occurs, that signifies that something may be going wrong, like the host dropping any new connection attempts, then Ncrack will immediately lower the total number of connections hitting the service\&. However, the caps number of the minimum or maximum connections that will take place can be overriden using these two options\&. By properly adjusting them, you can essentially optimize performance, if you can handle the tricky part of knowing or discovering your target\'s own limits\&. The convention here is that
+These options control the total number of connections that may be outstanding for any service at the same time\&. Normally, Ncrack tries to dynamically adjust the number of connections for each individual target by counting how many drops or connection failures happen\&. If a strange network condition occurs, that signifies that something may be going wrong, like the host dropping any new connection attempts, then Ncrack will immediately lower the total number of connections hitting the service\&. However, the caps number of the minimum or maximum connections that will take place can be overridden using these two options\&. By properly adjusting them, you can essentially optimize performance, if you can handle the tricky part of knowing or discovering your target\'s own limits\&. The convention here is that
 \fBcl\fR
 with lowercase letters is referring to the minimum connection limit, while
 \fBCL \fR
@@ -699,7 +699,7 @@ iteration, very common passwords might not even be tried out for certain usernam
 .PP
 \fB\-\-pairwise\fR (Choose usernames and passwords in pairs)
 .RS 4
-Enabling this option will make Ncrack iterate the username and password list by choosing them in pairs\&. For example, given the username list of "root, guest, admin" and the password list of "test, 12345, q1w2e3r4" Ncrack will go over them like this: "root:test", "guest:12345", "admin:q1w2e3r4"\&. This is particulary useful when inside knowledge of the infrastructure tested is available and special username and password lists have been made\&.
+Enabling this option will make Ncrack iterate the username and password list by choosing them in pairs\&. For example, given the username list of "root, guest, admin" and the password list of "test, 12345, q1w2e3r4" Ncrack will go over them like this: "root:test", "guest:12345", "admin:q1w2e3r4"\&. This is particularly useful when inside knowledge of the infrastructure tested is available and special username and password lists have been made\&.
 .RE
 .SH "OUTPUT"
 .\" output formats
@@ -969,7 +969,7 @@ FTP authentication is quite fast, since there is very little protocol negotiatio
 \fBTelnet Module\fR
 .PP
 .RS 4
-Telnet daemons have been largely substituded by their safer \'counterpart\' of SSH\&. However, there are many boxes, mainly routers or printers, that still rely on Telnet for remote access\&. Usually these are also easier to crack, since default passwords for them are publicly known\&. The drawback is that telnet is a rather slow protocol, so you shouldn\'t be expecting really high rates against it\&.
+Telnet daemons have been largely substituted by their safer \'counterpart\' of SSH\&. However, there are many boxes, mainly routers or printers, that still rely on Telnet for remote access\&. Usually these are also easier to crack, since default passwords for them are publicly known\&. The drawback is that telnet is a rather slow protocol, so you shouldn\'t be expecting really high rates against it\&.
 .RE
 .PP
 \fBSSH Module\fR
@@ -998,7 +998,7 @@ The SMB module currently works over raw TCP\&. NetBIOS isn\'t supported yet\&. T
 \fBRDP Module \fR
 .PP
 .RS 4
-RDP (Remote Desktop Protocol) is a proprietary protocol developed by Microsoft for the purpose of providing remote terminal services by transfering graphics display information from the remote computer to the user and transporting input commands from the user to the remote computer\&. Fortunately, Microsoft recently decided to open the protocol\'s internal workings to the public and has provided official documentation, which can be found at
+RDP (Remote Desktop Protocol) is a proprietary protocol developed by Microsoft for the purpose of providing remote terminal services by transferring graphics display information from the remote computer to the user and transporting input commands from the user to the remote computer\&. Fortunately, Microsoft recently decided to open the protocol\'s internal workings to the public and has provided official documentation, which can be found at
 \m[blue]\fB\%http://msdn.microsoft.com/en-us/library/cc240445%28v=PROT.10%29.aspx\fR\m[]
 .sp
 RDP is one of the most complex protocols, requiring the exchange of many packets, even for just the authentication phase\&. For this reason, cracking it takes a lot of time and this is probably the slowest module\&. The connection phase is briefly described at
@@ -1103,7 +1103,7 @@ Retrieve Images: This step allows a client to retrieve DICOM images\&. The most
 \fBMQTT Module\fR
 .PP
 .RS 4
-The Message Queueing Telemetry Transport (MQTT) protocol is a publish / subscribe machine to machine protocol that allows IoT clients to publish to a broker\&. Each client device subscribes to a particular topic of interest and receives messages from publishers\&. Usually MQTT authentication is optional and when enabled can be brute\-forced very easily as it only requires a single MQTT CONNECT packet to be sent for each attemped credential pair\&.
+The Message Queueing Telemetry Transport (MQTT) protocol is a publish / subscribe machine to machine protocol that allows IoT clients to publish to a broker\&. Each client device subscribes to a particular topic of interest and receives messages from publishers\&. Usually MQTT authentication is optional and when enabled can be brute\-forced very easily as it only requires a single MQTT CONNECT packet to be sent for each attempted credential pair\&.
 .RE
 .PP
 \fBWordpress Module\fR
diff --git a/docs/ncrack.usage.txt b/docs/ncrack.usage.txt
index 9cfe591..7c12e6a 100644
--- a/docs/ncrack.usage.txt
+++ b/docs/ncrack.usage.txt
@@ -24,7 +24,7 @@ SERVICE SPECIFICATION:
     domain <name>: used in modules like WinRM to specify the domain
 TIMING AND PERFORMANCE:
   Options which take <time> are in seconds, unless you append 'ms'
-  (miliseconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
+  (milliseconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
   Service-specific options:
     cl (min connection limit): minimum number of concurrent parallel connections
     CL (max connection limit): maximum number of concurrent parallel connections
diff --git a/ncrack.cc b/ncrack.cc
index e8a4c19..ffc9702 100644
--- a/ncrack.cc
+++ b/ncrack.cc
@@ -254,7 +254,7 @@ print_usage(void)
       "    domain <name>: used in modules like WinRM to specify the domain\n"
       "TIMING AND PERFORMANCE:\n"
       "  Options which take <time> are in seconds, unless you append 'ms'\n"
-      "  (miliseconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m)."
+      "  (milliseconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m)."
       "\n"
       "  Service-specific options:\n"
       "    cl (min connection limit): minimum number of concurrent parallel "
@@ -2298,7 +2298,7 @@ ncrack_connect_handler(nsock_pool nsp, nsock_event nse, void *mydata)
     if (serv->failed_connections > serv->connection_retries) {
       SG->pushServiceToList(serv, &SG->services_finished);
       if (o.verbose)
-        log_write(LOG_STDOUT, "%s finished. Too many failed attemps. \n", hostinfo);
+        log_write(LOG_STDOUT, "%s finished. Too many failed attempts. \n", hostinfo);
     }
     /* Failure of connecting on first attempt means we should probably drop
      * the service for good. */
diff --git a/ncrack_input.cc b/ncrack_input.cc
index 5de1838..9d3f324 100644
--- a/ncrack_input.cc
+++ b/ncrack_input.cc
@@ -204,7 +204,7 @@ xml_input(FILE *inputfd, char *host_spec)
         if (!fgets(buf, 7, inputfd))
           fatal("-iX <address> section searching fgets failure!\n");
 
-        if (!strncmp(buf, "addres", 6)) {
+        if (!strncmp(buf, "address", 6)) {
           /* Now get the rest of the line which is in the following format:
            * <address addr="10.0.0.100" addrtype="ipv4" /> */
           unsigned int i = 0;

debug log:

solving 461b082056 ...
found 461b082056 in https://yhetil.org/guix-patches/WSgbTIT-0EVw00x79M1C4IoJnu497WH90q_x9HrwP736-BdOVcs0KaKNx9tcSaZu3u7jA6G8tnr7tsS9eUcIwrh3_DziU2imKAVbzDkx0Xo=@protonmail.com/

applying [1/1] https://yhetil.org/guix-patches/WSgbTIT-0EVw00x79M1C4IoJnu497WH90q_x9HrwP736-BdOVcs0KaKNx9tcSaZu3u7jA6G8tnr7tsS9eUcIwrh3_DziU2imKAVbzDkx0Xo=@protonmail.com/
diff --git a/gnu/packages/patches/ncrack-fix-spelling-errors.patch b/gnu/packages/patches/ncrack-fix-spelling-errors.patch
new file mode 100644
index 0000000000..461b082056

1:53: trailing whitespace.
 
1:139: trailing whitespace.
 
Checking patch gnu/packages/patches/ncrack-fix-spelling-errors.patch...
Applied patch gnu/packages/patches/ncrack-fix-spelling-errors.patch cleanly.
warning: 2 lines add whitespace errors.

index at:
100644 461b0820562a827f74b62253f730faaf73661ea8	gnu/packages/patches/ncrack-fix-spelling-errors.patch

(*) Git path names are given by the tree(s) the blob belongs to.
    Blobs themselves have no identifier aside from the hash of its contents.^

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).