1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 05:01:29 +00:00

Some (mostly minor rewording) NSEDoc updates

This commit is contained in:
fyodor
2011-09-29 22:06:23 +00:00
parent 11625b686d
commit 131dccc5d2
7 changed files with 17 additions and 23 deletions

View File

@@ -1,5 +1,5 @@
description = [[
This script uses the Microsoft LLTD protocol to discover hosts on a local network.
Uses the Microsoft LLTD protocol to discover hosts on a local network.
For more information on the LLTD protocol please refer to
http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
@@ -9,7 +9,7 @@ http://www.microsoft.com/whdc/connect/Rally/LLTD-spec.mspx
-- @usage
-- nmap -e <interface> --script lltd-discovery
--
-- @arg interface, a string specifying which interface to do lltd discovery on
-- @arg interface, a string specifying which interface to do lltd discovery on. If not specified, all ethernet interfaces are tried.
--
-- @output
-- | lltd-discovery:

View File

@@ -1,5 +1,5 @@
description = [[
Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support. The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon (CVE-2011-1764).
Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support (CVE-2011-1764). The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon.
Reference:
* http://bugs.exim.org/show_bug.cgi?id=1106

View File

@@ -1,6 +1,5 @@
description = [[
Matches SSL certificate hash against Google Certificate Catalog. It
uses the certificate gotten from ssl-cert.nse script.
Queries Google's Certificate Catalog for the SSL certificates retrieved from target hosts. The Certificate Catalog provides information about how recently and for how long Google has seen the given certificate. If a certificate doesn't appear in the database, despite being correctly signed by a well-known CA and having a matching domain name, it may be suspicious. It uses the certificate gotten from ssl-cert.nse script, so that script must be run as well.
]]
---

View File

@@ -1,10 +1,7 @@
description = [[
Multicast echo ping.
This script works by sending an ICMPv6 Echo Request packet to the all-nodes
link-local multicast address, <code>ff02::1</code>. It can discover all hosts
responding to echo on an interface, without needing to individually ping each
address.
Sends an ICMPv6 echo request packet to the all-nodes link-local
multicast address (<code>ff02::1</code>) to discover responsive hosts
on a LAN without needing to individually ping each IPv6 address.
]]
---
@@ -13,7 +10,7 @@ address.
-- @args newtargets If true, add discovered targets to the scan queue.
-- @args targets-ipv6-multicast-echo.interface The interface to use for host discovery.
author = "David and Weilin"
author = "David Fifield, Xu Weilin"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,11 +1,9 @@
description = [[
Multicast invalid packet host discovery.
This script works by sending an ICMPv6 packet with an invalid extension header
to the all-nodes link-local multicast address, <code>ff02::1</code>. Some hosts
will respond to this probe with an ICMPv6 Parameter Problem packet. This script
can discover hosts reachable on an interface without needing to individually
ping each address.
Sends an ICMPv6 packet with an invalid extension header to the
all-nodes link-local multicast address (<code>ff02::1</code>) to
discover (some) available hosts on the LAN. This works because some
hosts will respond to this probe with an ICMPv6 Parameter Problem
packet.
]]
---
@@ -14,7 +12,7 @@ ping each address.
-- @args newtargets If true, add discovered targets to the scan queue.
-- @args targets-ipv6-multicast-invalid-dst.interface The interface to use for host discovery.
author = "David and Weilin"
author = "David Fifield, Xu Weilin"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,5 +1,5 @@
description = [[
Does IPv6 host discovery by triggering stateless address auto-configuration
Performs IPv6 host discovery by triggering stateless address auto-configuration
(SLAAC).
This script works by sending an ICMPv6 Router Advertisement with a random
@@ -23,7 +23,7 @@ See also:
-- ./nmap -6 --script=slaac_host_discovery.nse --script-args 'newtargets,interface=eth0' -sP
-- @args targets-ipv6-multicast-slaac.interface The interface to use for host discovery.
author = "David and Weilin"
author = "David Fifield, Xu Weilin"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,5 +1,5 @@
description = [[
Performs brute force password auditing against XMPP (Jabber) servers.
Performs brute force password auditing against XMPP (Jabber) instant messaging servers.
]]
---