1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00

Some (mostly minor rewording) NSEDoc updates

This commit is contained in:
fyodor
2011-09-29 22:06:23 +00:00
parent 11625b686d
commit 131dccc5d2
7 changed files with 17 additions and 23 deletions

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
This script uses the Microsoft LLTD protocol to discover hosts on a local network. Uses the Microsoft LLTD protocol to discover hosts on a local network.
For more information on the LLTD protocol please refer to For more information on the LLTD protocol please refer to
http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
@@ -9,7 +9,7 @@ http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
-- @usage -- @usage
-- nmap -e <interface> --script lltd-discovery -- nmap -e <interface> --script lltd-discovery
-- --
-- @arg interface, a string specifying which interface to do lltd discovery on -- @arg interface, a string specifying which interface to do lltd discovery on. If not specified, all ethernet interfaces are tried.
-- --
-- @output -- @output
-- | lltd-discovery: -- | lltd-discovery:

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support. The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon (CVE-2011-1764). Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support (CVE-2011-1764). The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon.
Reference: Reference:
* http://bugs.exim.org/show_bug.cgi?id=1106 * http://bugs.exim.org/show_bug.cgi?id=1106

View File

@@ -1,6 +1,5 @@
description = [[ description = [[
Matches SSL certificate hash against Google Certificate Catalog. It Queries Google's Certificate Catalog for the SSL certificates retrieved from target hosts. The Certificate Catalog provides information about how recently and for how long Google has seen the given certificate. If a certificate doesn't appear in the database, despite being correctly signed by a well-known CA and having a matching domain name, it may be suspicious. It uses the certificate gotten from ssl-cert.nse script, so that script must be run as well.
uses the certificate gotten from ssl-cert.nse script.
]] ]]
--- ---

View File

@@ -1,10 +1,7 @@
description = [[ description = [[
Multicast echo ping. Sends an ICMPv6 echo request packet to the all-nodes link-local
multicast address (<code>ff02::1</code>) to discover responsive hosts
This script works by sending an ICMPv6 Echo Request packet to the all-nodes on a LAN without needing to individually ping each IPv6 address.
link-local multicast address, <code>ff02::1</code>. It can discover all hosts
responding to echo on an interface, without needing to individually ping each
address.
]] ]]
--- ---
@@ -13,7 +10,7 @@ address.
-- @args newtargets If true, add discovered targets to the scan queue. -- @args newtargets If true, add discovered targets to the scan queue.
-- @args targets-ipv6-multicast-echo.interface The interface to use for host discovery. -- @args targets-ipv6-multicast-echo.interface The interface to use for host discovery.
author = "David and Weilin" author = "David Fifield, Xu Weilin"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,11 +1,9 @@
description = [[ description = [[
Multicast invalid packet host discovery. Sends an ICMPv6 packet with an invalid extension header to the
all-nodes link-local multicast address (<code>ff02::1</code>) to
This script works by sending an ICMPv6 packet with an invalid extension header discover (some) available hosts on the LAN. This works because some
to the all-nodes link-local multicast address, <code>ff02::1</code>. Some hosts hosts will respond to this probe with an ICMPv6 Parameter Problem
will respond to this probe with an ICMPv6 Parameter Problem packet. This script packet.
can discover hosts reachable on an interface without needing to individually
ping each address.
]] ]]
--- ---
@@ -14,7 +12,7 @@ ping each address.
-- @args newtargets If true, add discovered targets to the scan queue. -- @args newtargets If true, add discovered targets to the scan queue.
-- @args targets-ipv6-multicast-invalid-dst.interface The interface to use for host discovery. -- @args targets-ipv6-multicast-invalid-dst.interface The interface to use for host discovery.
author = "David and Weilin" author = "David Fifield, Xu Weilin"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Does IPv6 host discovery by triggering stateless address auto-configuration Performs IPv6 host discovery by triggering stateless address auto-configuration
(SLAAC). (SLAAC).
This script works by sending an ICMPv6 Router Advertisement with a random This script works by sending an ICMPv6 Router Advertisement with a random
@@ -23,7 +23,7 @@ See also:
-- ./nmap -6 --script=slaac_host_discovery.nse --script-args 'newtargets,interface=eth0' -sP -- ./nmap -6 --script=slaac_host_discovery.nse --script-args 'newtargets,interface=eth0' -sP
-- @args targets-ipv6-multicast-slaac.interface The interface to use for host discovery. -- @args targets-ipv6-multicast-slaac.interface The interface to use for host discovery.
author = "David and Weilin" author = "David Fifield, Xu Weilin"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password auditing against XMPP (Jabber) servers. Performs brute force password auditing against XMPP (Jabber) instant messaging servers.
]] ]]
--- ---