diff --git a/nselib/msrpc.lua b/nselib/msrpc.lua index e9afd81af..8cd9e4de0 100644 --- a/nselib/msrpc.lua +++ b/nselib/msrpc.lua @@ -1,5 +1,5 @@ --- Call various MSRPC functions. --- \n\n +-- -- By making heavy use of the smb library, this library will call various MSRPC -- functions. The functions used here can be accessed over TCP ports 445 and 139, -- with an established session. A NULL session (the default) will work for some diff --git a/nselib/smb.lua b/nselib/smb.lua index 82a491677..212fab7a8 100644 --- a/nselib/smb.lua +++ b/nselib/smb.lua @@ -1,5 +1,5 @@ --- A library for SMB (Server Message Block) (aka CIFS) traffic. --- \n\n +-- -- This traffic is normally -- sent to/from ports 139 or 445 of Windows systems, although it's also implemented by -- others (the most notable one being Samba). \n diff --git a/scripts/nbstat.nse b/scripts/nbstat.nse index b57060a0f..0941dea68 100644 --- a/scripts/nbstat.nse +++ b/scripts/nbstat.nse @@ -1,7 +1,7 @@ id = "NBSTAT" description = [[ Attempt's to get the target's NetBIOS names and MAC address. -\n\n + By default, the script displays the name of the computer and the logged-in user; if the verbosity is turned up, it displays all names the system thinks it owns. diff --git a/scripts/smb-enumdomains.nse b/scripts/smb-enumdomains.nse index 5982c4137..249cf4a85 100644 --- a/scripts/smb-enumdomains.nse +++ b/scripts/smb-enumdomains.nse @@ -2,7 +2,7 @@ id = "MSRPC: List of domains" description = [[ Attempts to enumerate domains on a system, along with their policies. This will likely only work without credentials against Windows 2000. -\n\n + After the initial bind() to SAMR, the sequence of calls is:\n Connect4() -- get a connect_handle\n EnumDomains() -- get a list of the domains (stop here if you just want the names)\n diff --git a/scripts/smb-enumshares.nse b/scripts/smb-enumshares.nse index 877d46a1f..403d7c512 100644 --- a/scripts/smb-enumshares.nse +++ b/scripts/smb-enumshares.nse @@ -2,7 +2,7 @@ id = "MSRPC: NetShareEnumAll()" description = [[ Attempts to list shares using the srvsvc.NetShareEnumAll() MSRPC function. This will likely only work anonymously against Windows 2000. -\n\n + There isn't a whole lot to say about this one. The sequence of calls after the initial bind() is:\n NetShareEnumAll() diff --git a/scripts/smb-enumusers.nse b/scripts/smb-enumusers.nse index ded234f0a..f3484c911 100644 --- a/scripts/smb-enumusers.nse +++ b/scripts/smb-enumusers.nse @@ -3,7 +3,7 @@ description = [[ Attempts to enumerate the users on a remote Windows system, with as much information as possible, through a variety of techniques (over SMB + MSRPC, which uses port 445 or 139). -\n\n + Will first attempt to call the QueryDisplayInfo() MSRPC function. If NULL sessions are enabled, this will succeed and pull back a detailed list of users. Unfortunately, this likely won't succeed unless we're scanning Windows 2000. diff --git a/scripts/smb-os-discovery.nse b/scripts/smb-os-discovery.nse index e0a3ac038..0d4e2b343 100644 --- a/scripts/smb-os-discovery.nse +++ b/scripts/smb-os-discovery.nse @@ -2,7 +2,7 @@ id = "OS from SMB" description = [[ Attempts to determine the operating system over the SMB protocol (ports 445 and 139). -\n\n + See nselib/smb.lua for more information on this protocol. ]] diff --git a/scripts/smb-security-mode.nse b/scripts/smb-security-mode.nse index c841448e3..e25b3eb45 100644 --- a/scripts/smb-security-mode.nse +++ b/scripts/smb-security-mode.nse @@ -1,7 +1,7 @@ id = "SMB Security" description = [[ Returns information about the SMB security level determined by SMB. -\n\n + Here is how to interpret the output: \n\n User-level security: Each user has a separate username/password that is used