mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Some (mostly minor rewording) NSEDoc updates
This commit is contained in:
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
This script uses the Microsoft LLTD protocol to discover hosts on a local network.
|
Uses the Microsoft LLTD protocol to discover hosts on a local network.
|
||||||
|
|
||||||
For more information on the LLTD protocol please refer to
|
For more information on the LLTD protocol please refer to
|
||||||
http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
|
http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
|
||||||
@@ -9,7 +9,7 @@ http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
|
|||||||
-- @usage
|
-- @usage
|
||||||
-- nmap -e <interface> --script lltd-discovery
|
-- nmap -e <interface> --script lltd-discovery
|
||||||
--
|
--
|
||||||
-- @arg interface, a string specifying which interface to do lltd discovery on
|
-- @arg interface, a string specifying which interface to do lltd discovery on. If not specified, all ethernet interfaces are tried.
|
||||||
--
|
--
|
||||||
-- @output
|
-- @output
|
||||||
-- | lltd-discovery:
|
-- | lltd-discovery:
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support. The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon (CVE-2011-1764).
|
Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support (CVE-2011-1764). The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon.
|
||||||
|
|
||||||
Reference:
|
Reference:
|
||||||
* http://bugs.exim.org/show_bug.cgi?id=1106
|
* http://bugs.exim.org/show_bug.cgi?id=1106
|
||||||
|
|||||||
@@ -1,6 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Matches SSL certificate hash against Google Certificate Catalog. It
|
Queries Google's Certificate Catalog for the SSL certificates retrieved from target hosts. The Certificate Catalog provides information about how recently and for how long Google has seen the given certificate. If a certificate doesn't appear in the database, despite being correctly signed by a well-known CA and having a matching domain name, it may be suspicious. It uses the certificate gotten from ssl-cert.nse script, so that script must be run as well.
|
||||||
uses the certificate gotten from ssl-cert.nse script.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,10 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Multicast echo ping.
|
Sends an ICMPv6 echo request packet to the all-nodes link-local
|
||||||
|
multicast address (<code>ff02::1</code>) to discover responsive hosts
|
||||||
This script works by sending an ICMPv6 Echo Request packet to the all-nodes
|
on a LAN without needing to individually ping each IPv6 address.
|
||||||
link-local multicast address, <code>ff02::1</code>. It can discover all hosts
|
|
||||||
responding to echo on an interface, without needing to individually ping each
|
|
||||||
address.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
@@ -13,7 +10,7 @@ address.
|
|||||||
-- @args newtargets If true, add discovered targets to the scan queue.
|
-- @args newtargets If true, add discovered targets to the scan queue.
|
||||||
-- @args targets-ipv6-multicast-echo.interface The interface to use for host discovery.
|
-- @args targets-ipv6-multicast-echo.interface The interface to use for host discovery.
|
||||||
|
|
||||||
author = "David and Weilin"
|
author = "David Fifield, Xu Weilin"
|
||||||
|
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
|
|
||||||
|
|||||||
@@ -1,11 +1,9 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Multicast invalid packet host discovery.
|
Sends an ICMPv6 packet with an invalid extension header to the
|
||||||
|
all-nodes link-local multicast address (<code>ff02::1</code>) to
|
||||||
This script works by sending an ICMPv6 packet with an invalid extension header
|
discover (some) available hosts on the LAN. This works because some
|
||||||
to the all-nodes link-local multicast address, <code>ff02::1</code>. Some hosts
|
hosts will respond to this probe with an ICMPv6 Parameter Problem
|
||||||
will respond to this probe with an ICMPv6 Parameter Problem packet. This script
|
packet.
|
||||||
can discover hosts reachable on an interface without needing to individually
|
|
||||||
ping each address.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
@@ -14,7 +12,7 @@ ping each address.
|
|||||||
-- @args newtargets If true, add discovered targets to the scan queue.
|
-- @args newtargets If true, add discovered targets to the scan queue.
|
||||||
-- @args targets-ipv6-multicast-invalid-dst.interface The interface to use for host discovery.
|
-- @args targets-ipv6-multicast-invalid-dst.interface The interface to use for host discovery.
|
||||||
|
|
||||||
author = "David and Weilin"
|
author = "David Fifield, Xu Weilin"
|
||||||
|
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Does IPv6 host discovery by triggering stateless address auto-configuration
|
Performs IPv6 host discovery by triggering stateless address auto-configuration
|
||||||
(SLAAC).
|
(SLAAC).
|
||||||
|
|
||||||
This script works by sending an ICMPv6 Router Advertisement with a random
|
This script works by sending an ICMPv6 Router Advertisement with a random
|
||||||
@@ -23,7 +23,7 @@ See also:
|
|||||||
-- ./nmap -6 --script=slaac_host_discovery.nse --script-args 'newtargets,interface=eth0' -sP
|
-- ./nmap -6 --script=slaac_host_discovery.nse --script-args 'newtargets,interface=eth0' -sP
|
||||||
-- @args targets-ipv6-multicast-slaac.interface The interface to use for host discovery.
|
-- @args targets-ipv6-multicast-slaac.interface The interface to use for host discovery.
|
||||||
|
|
||||||
author = "David and Weilin"
|
author = "David Fifield, Xu Weilin"
|
||||||
|
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs brute force password auditing against XMPP (Jabber) servers.
|
Performs brute force password auditing against XMPP (Jabber) instant messaging servers.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
Reference in New Issue
Block a user