From 2dd295a266fdf7e217a19afbe6c3dbe38a985315 Mon Sep 17 00:00:00 2001 From: fyodor Date: Fri, 21 Jan 2011 08:28:38 +0000 Subject: [PATCH] Minor NSEDoc summary cleanup --- scripts/http-domino-enum-passwords.nse | 4 ++-- scripts/modbus-discover.nse | 2 +- scripts/netbus-auth-bypass.nse | 3 +-- scripts/netbus-brute.nse | 2 +- scripts/oracle-enum-users.nse | 2 +- scripts/rmi-dumpregistry.nse | 2 +- scripts/smb-flood.nse | 21 ++++++++++++--------- scripts/ssh2-enum-algos.nse | 4 ++-- scripts/vnc-info.nse | 4 ++-- scripts/wdb-version.nse | 2 +- 10 files changed, 24 insertions(+), 22 deletions(-) diff --git a/scripts/http-domino-enum-passwords.nse b/scripts/http-domino-enum-passwords.nse index 502ea77d7..783a69701 100644 --- a/scripts/http-domino-enum-passwords.nse +++ b/scripts/http-domino-enum-passwords.nse @@ -1,7 +1,7 @@ description = [[ Attempts to enumerate the hashed Domino Internet Passwords that are -accessible by all authenticated users by default. This script can also -download any Domino ID Files attached to the Person document. +(by default) accessible by all authenticated users. This script can +also download any Domino ID Files attached to the Person document. ]] --- diff --git a/scripts/modbus-discover.nse b/scripts/modbus-discover.nse index 4479d403d..b58051382 100644 --- a/scripts/modbus-discover.nse +++ b/scripts/modbus-discover.nse @@ -1,5 +1,5 @@ description = [[ -Enumerates SCADA Modbus slave ids (sids) and gets their device information. +Enumerates SCADA Modbus slave ids (sids) and collects their device information. Modbus is one of the popular SCADA protocols. This script does Modbus device information disclosure. It tries to find legal sids (slave ids) of Modbus diff --git a/scripts/netbus-auth-bypass.nse b/scripts/netbus-auth-bypass.nse index 69e63e7fa..cac451535 100644 --- a/scripts/netbus-auth-bypass.nse +++ b/scripts/netbus-auth-bypass.nse @@ -1,7 +1,6 @@ description = [[ Checks if a NetBus server is vulnerable to an authentication bypass -vulnerability which allows them to be fully accessed without knowing -the password. +vulnerability which allows ful access without knowing the password. For example a server running on TCP port 12345 on localhost with this vulnerability is accessible to anyone. An attacker could diff --git a/scripts/netbus-brute.nse b/scripts/netbus-brute.nse index 9fdaa9341..960dcc652 100644 --- a/scripts/netbus-brute.nse +++ b/scripts/netbus-brute.nse @@ -1,5 +1,5 @@ description = [[ -Performs brute force password auditing about the Netbus backdoor ("remote administration") service. +Performs brute force password auditing against the Netbus backdoor ("remote administration") service. ]] --- diff --git a/scripts/oracle-enum-users.nse b/scripts/oracle-enum-users.nse index f3fa406f3..87804847d 100644 --- a/scripts/oracle-enum-users.nse +++ b/scripts/oracle-enum-users.nse @@ -1,5 +1,5 @@ description = [[ -Attempts to enumerate valid Oracle user names against Oracle 11g +Attempts to enumerate valid Oracle user names against unpatched Oracle 11g servers (this bug was fixed in Oracle's October 2009 Critical Patch Update). ]] diff --git a/scripts/rmi-dumpregistry.nse b/scripts/rmi-dumpregistry.nse index c290e4eb3..131618b48 100644 --- a/scripts/rmi-dumpregistry.nse +++ b/scripts/rmi-dumpregistry.nse @@ -1,5 +1,5 @@ description = [[ -Connects to a remote RMI registry and attempts to dump all its objects. +Connects to a remote RMI registry and attempts to dump all of its objects. First it tries to determine the names of all objects bound in the registry, and then it tries to determine information about the diff --git a/scripts/smb-flood.nse b/scripts/smb-flood.nse index e1d425573..ae9a56dd6 100644 --- a/scripts/smb-flood.nse +++ b/scripts/smb-flood.nse @@ -1,15 +1,18 @@ description = [[ -Exhausts the limit of SMB connections on a remote server by opening as many as we can. -Most implementations of SMB have a hard global limit of 11 connections for user accounts -and 10 connections for anonymous. Once that limit is reached, further connections -are denied. This exploits that limit by taking up all the connections and holding them. +Exhausts a remote SMB server's connection limit by by opening as many +connections as we can. Most implementations of SMB have a hard global +limit of 11 connections for user accounts and 10 connections for +anonymous. Once that limit is reached, further connections are +denied. This script exploits that limit by taking up all the +connections and holding them. -This works better with a valid user account, because Windows reserves one slot for valid -users. So, no matter how many anonymous connections are taking up spaces, a single valid -user can still log in. +This works better with a valid user account, because Windows reserves +one slot for valid users. So, no matter how many anonymous connections +are taking up spaces, a single valid user can still log in. -This is *not* recommended as a general purpose script, because a) it is designed to harm -the server and has no useful output, and b) it never ends (until timeout). +This is *not* recommended as a general purpose script, because a) it +is designed to harm the server and has no useful output, and b) it +never ends (until timeout). ]] --- diff --git a/scripts/ssh2-enum-algos.nse b/scripts/ssh2-enum-algos.nse index 78d4ae50b..66f1ec2f7 100644 --- a/scripts/ssh2-enum-algos.nse +++ b/scripts/ssh2-enum-algos.nse @@ -1,6 +1,6 @@ description = [[ -Reports the number of algorithms (such as encryption, compression, etc.) that -the target SSH2 server offers. If verbosity is set, then the offered algorithms +Reports the number of algorithms (for encryption, compression, etc.) that +the target SSH2 server offers. If verbosity is set, the offered algorithms are each listed by type. If the "client to server" and "server to client" algorithm lists are identical diff --git a/scripts/vnc-info.nse b/scripts/vnc-info.nse index 9ed731681..5841ef75a 100644 --- a/scripts/vnc-info.nse +++ b/scripts/vnc-info.nse @@ -1,5 +1,5 @@ description = [[ -Queries a VNC server for the protocol version and supported security types. +Queries a VNC server for its protocol version and supported security types. ]] author = "Patrik Karlsson" @@ -54,4 +54,4 @@ action = function(host, port) end return stdnse.format_output(status, result) -end \ No newline at end of file +end diff --git a/scripts/wdb-version.nse b/scripts/wdb-version.nse index 97c3f77a2..8ceb6d319 100644 --- a/scripts/wdb-version.nse +++ b/scripts/wdb-version.nse @@ -1,6 +1,6 @@ description = [[ Detects vulnerabilities and gathers information (such as version -numbers and hardware support) from a VxWorks Wind DeBug Agent. +numbers and hardware support) from VxWorks Wind DeBug agents. Wind DeBug is a SunRPC-type service that is enabled by default on many devices that use the popular VxWorks real-time embedded operating system. H.D. Moore