1
0
mirror of https://github.com/nmap/nmap.git synced 2026-02-01 19:19:09 +00:00

Separate the first paragraph from the rest of the description with a blank

line, not "\n\n", in the SMB and MSRPC scripts and modules. There are newer
versions of these files pending review, so this is just a quick measure to let
me use first paragraphs as summaries rather than first sentences.
This commit is contained in:
david
2008-11-03 16:17:07 +00:00
parent 4175c0a930
commit 2cceb5184c
8 changed files with 8 additions and 8 deletions

View File

@@ -1,5 +1,5 @@
--- Call various MSRPC functions.
-- \n\n
--
-- By making heavy use of the smb library, this library will call various MSRPC
-- functions. The functions used here can be accessed over TCP ports 445 and 139,
-- with an established session. A NULL session (the default) will work for some

View File

@@ -1,5 +1,5 @@
--- A library for SMB (Server Message Block) (aka CIFS) traffic.
-- \n\n
--
-- This traffic is normally
-- sent to/from ports 139 or 445 of Windows systems, although it's also implemented by
-- others (the most notable one being Samba). \n

View File

@@ -1,7 +1,7 @@
id = "NBSTAT"
description = [[
Attempt's to get the target's NetBIOS names and MAC address.
\n\n
By default, the script displays the name of the computer and the logged-in
user; if the verbosity is turned up, it displays all names the system thinks it
owns.

View File

@@ -2,7 +2,7 @@ id = "MSRPC: List of domains"
description = [[
Attempts to enumerate domains on a system, along with their policies. This will
likely only work without credentials against Windows 2000.
\n\n
After the initial bind() to SAMR, the sequence of calls is:\n
Connect4() -- get a connect_handle\n
EnumDomains() -- get a list of the domains (stop here if you just want the names)\n

View File

@@ -2,7 +2,7 @@ id = "MSRPC: NetShareEnumAll()"
description = [[
Attempts to list shares using the srvsvc.NetShareEnumAll() MSRPC function. This
will likely only work anonymously against Windows 2000.
\n\n
There isn't a whole lot to say about this one. The sequence of calls after
the initial bind() is:\n
NetShareEnumAll()

View File

@@ -3,7 +3,7 @@ description = [[
Attempts to enumerate the users on a remote Windows system, with as much
information as possible, through a variety of techniques (over SMB + MSRPC,
which uses port 445 or 139).
\n\n
Will first attempt to call the QueryDisplayInfo() MSRPC function. If NULL
sessions are enabled, this will succeed and pull back a detailed list of users.
Unfortunately, this likely won't succeed unless we're scanning Windows 2000.

View File

@@ -2,7 +2,7 @@ id = "OS from SMB"
description = [[
Attempts to determine the operating system over the SMB protocol (ports 445 and
139).
\n\n
See nselib/smb.lua for more information on this protocol.
]]

View File

@@ -1,7 +1,7 @@
id = "SMB Security"
description = [[
Returns information about the SMB security level determined by SMB.
\n\n
Here is how to interpret the output:
\n\n
User-level security: Each user has a separate username/password that is used