From 0a9d569e4248b0a4d924b98a8932b9c3cea3386d Mon Sep 17 00:00:00 2001 From: fyodor Date: Fri, 16 Nov 2012 00:51:50 +0000 Subject: [PATCH] Some more minor script description updates --- scripts/http-icloud-findmyiphone.nse | 2 +- scripts/metasploit-info.nse | 2 +- scripts/pcanywhere-brute.nse | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/scripts/http-icloud-findmyiphone.nse b/scripts/http-icloud-findmyiphone.nse index 6822198b1..99ce907c9 100644 --- a/scripts/http-icloud-findmyiphone.nse +++ b/scripts/http-icloud-findmyiphone.nse @@ -5,7 +5,7 @@ local tab = require "tab" description = [[ Retrieves the locations of all "Find my iPhone" enabled iOS devices by querying -the MobileMe web service. +the MobileMe web service (authentication required). ]] --- diff --git a/scripts/metasploit-info.nse b/scripts/metasploit-info.nse index 0c0802b89..224db52da 100644 --- a/scripts/metasploit-info.nse +++ b/scripts/metasploit-info.nse @@ -6,7 +6,7 @@ local http = require "http" local bin = require "bin" description = [[ - Script gathers info from the Metasploit rpc service. +Gathers info from the Metasploit rpc service. It requires a valid login pair. After authentication it tries to determine Metasploit version and deduce the OS type. Then it creates a new console and executes few commands diff --git a/scripts/pcanywhere-brute.nse b/scripts/pcanywhere-brute.nse index 555528aec..ca43e6b63 100644 --- a/scripts/pcanywhere-brute.nse +++ b/scripts/pcanywhere-brute.nse @@ -8,7 +8,7 @@ local bit = require "bit" local bin = require "bin" local table = require "table" description = [[ -Performs password guessing against pcAnywhere. +Performs brute force password auditing against the pcAnywhere remote access protocol. Due to certain limitations of the protocol, bruteforcing is limited to single thread at a time.