mirror of
https://github.com/nmap/nmap.git
synced 2026-02-01 19:19:09 +00:00
Separate the first paragraph from the rest of the description with a blank
line, not "\n\n", in the SMB and MSRPC scripts and modules. There are newer versions of these files pending review, so this is just a quick measure to let me use first paragraphs as summaries rather than first sentences.
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
--- Call various MSRPC functions.
|
||||
-- \n\n
|
||||
--
|
||||
-- By making heavy use of the smb library, this library will call various MSRPC
|
||||
-- functions. The functions used here can be accessed over TCP ports 445 and 139,
|
||||
-- with an established session. A NULL session (the default) will work for some
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
--- A library for SMB (Server Message Block) (aka CIFS) traffic.
|
||||
-- \n\n
|
||||
--
|
||||
-- This traffic is normally
|
||||
-- sent to/from ports 139 or 445 of Windows systems, although it's also implemented by
|
||||
-- others (the most notable one being Samba). \n
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
id = "NBSTAT"
|
||||
description = [[
|
||||
Attempt's to get the target's NetBIOS names and MAC address.
|
||||
\n\n
|
||||
|
||||
By default, the script displays the name of the computer and the logged-in
|
||||
user; if the verbosity is turned up, it displays all names the system thinks it
|
||||
owns.
|
||||
|
||||
@@ -2,7 +2,7 @@ id = "MSRPC: List of domains"
|
||||
description = [[
|
||||
Attempts to enumerate domains on a system, along with their policies. This will
|
||||
likely only work without credentials against Windows 2000.
|
||||
\n\n
|
||||
|
||||
After the initial bind() to SAMR, the sequence of calls is:\n
|
||||
Connect4() -- get a connect_handle\n
|
||||
EnumDomains() -- get a list of the domains (stop here if you just want the names)\n
|
||||
|
||||
@@ -2,7 +2,7 @@ id = "MSRPC: NetShareEnumAll()"
|
||||
description = [[
|
||||
Attempts to list shares using the srvsvc.NetShareEnumAll() MSRPC function. This
|
||||
will likely only work anonymously against Windows 2000.
|
||||
\n\n
|
||||
|
||||
There isn't a whole lot to say about this one. The sequence of calls after
|
||||
the initial bind() is:\n
|
||||
NetShareEnumAll()
|
||||
|
||||
@@ -3,7 +3,7 @@ description = [[
|
||||
Attempts to enumerate the users on a remote Windows system, with as much
|
||||
information as possible, through a variety of techniques (over SMB + MSRPC,
|
||||
which uses port 445 or 139).
|
||||
\n\n
|
||||
|
||||
Will first attempt to call the QueryDisplayInfo() MSRPC function. If NULL
|
||||
sessions are enabled, this will succeed and pull back a detailed list of users.
|
||||
Unfortunately, this likely won't succeed unless we're scanning Windows 2000.
|
||||
|
||||
@@ -2,7 +2,7 @@ id = "OS from SMB"
|
||||
description = [[
|
||||
Attempts to determine the operating system over the SMB protocol (ports 445 and
|
||||
139).
|
||||
\n\n
|
||||
|
||||
See nselib/smb.lua for more information on this protocol.
|
||||
]]
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
id = "SMB Security"
|
||||
description = [[
|
||||
Returns information about the SMB security level determined by SMB.
|
||||
\n\n
|
||||
|
||||
Here is how to interpret the output:
|
||||
\n\n
|
||||
User-level security: Each user has a separate username/password that is used
|
||||
|
||||
Reference in New Issue
Block a user