mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 21:21:31 +00:00
Minor NSEDoc summary cleanup
This commit is contained in:
@@ -1,7 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to enumerate the hashed Domino Internet Passwords that are
|
Attempts to enumerate the hashed Domino Internet Passwords that are
|
||||||
accessible by all authenticated users by default. This script can also
|
(by default) accessible by all authenticated users. This script can
|
||||||
download any Domino ID Files attached to the Person document.
|
also download any Domino ID Files attached to the Person document.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Enumerates SCADA Modbus slave ids (sids) and gets their device information.
|
Enumerates SCADA Modbus slave ids (sids) and collects their device information.
|
||||||
|
|
||||||
Modbus is one of the popular SCADA protocols. This script does Modbus device
|
Modbus is one of the popular SCADA protocols. This script does Modbus device
|
||||||
information disclosure. It tries to find legal sids (slave ids) of Modbus
|
information disclosure. It tries to find legal sids (slave ids) of Modbus
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks if a NetBus server is vulnerable to an authentication bypass
|
Checks if a NetBus server is vulnerable to an authentication bypass
|
||||||
vulnerability which allows them to be fully accessed without knowing
|
vulnerability which allows ful access without knowing the password.
|
||||||
the password.
|
|
||||||
|
|
||||||
For example a server running on TCP port 12345 on localhost with
|
For example a server running on TCP port 12345 on localhost with
|
||||||
this vulnerability is accessible to anyone. An attacker could
|
this vulnerability is accessible to anyone. An attacker could
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs brute force password auditing about the Netbus backdoor ("remote administration") service.
|
Performs brute force password auditing against the Netbus backdoor ("remote administration") service.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to enumerate valid Oracle user names against Oracle 11g
|
Attempts to enumerate valid Oracle user names against unpatched Oracle 11g
|
||||||
servers (this bug was fixed in Oracle's October 2009 Critical Patch Update).
|
servers (this bug was fixed in Oracle's October 2009 Critical Patch Update).
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Connects to a remote RMI registry and attempts to dump all its objects.
|
Connects to a remote RMI registry and attempts to dump all of its objects.
|
||||||
|
|
||||||
First it tries to determine the names of all objects bound in the
|
First it tries to determine the names of all objects bound in the
|
||||||
registry, and then it tries to determine information about the
|
registry, and then it tries to determine information about the
|
||||||
|
|||||||
@@ -1,15 +1,18 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Exhausts the limit of SMB connections on a remote server by opening as many as we can.
|
Exhausts a remote SMB server's connection limit by by opening as many
|
||||||
Most implementations of SMB have a hard global limit of 11 connections for user accounts
|
connections as we can. Most implementations of SMB have a hard global
|
||||||
and 10 connections for anonymous. Once that limit is reached, further connections
|
limit of 11 connections for user accounts and 10 connections for
|
||||||
are denied. This exploits that limit by taking up all the connections and holding them.
|
anonymous. Once that limit is reached, further connections are
|
||||||
|
denied. This script exploits that limit by taking up all the
|
||||||
|
connections and holding them.
|
||||||
|
|
||||||
This works better with a valid user account, because Windows reserves one slot for valid
|
This works better with a valid user account, because Windows reserves
|
||||||
users. So, no matter how many anonymous connections are taking up spaces, a single valid
|
one slot for valid users. So, no matter how many anonymous connections
|
||||||
user can still log in.
|
are taking up spaces, a single valid user can still log in.
|
||||||
|
|
||||||
This is *not* recommended as a general purpose script, because a) it is designed to harm
|
This is *not* recommended as a general purpose script, because a) it
|
||||||
the server and has no useful output, and b) it never ends (until timeout).
|
is designed to harm the server and has no useful output, and b) it
|
||||||
|
never ends (until timeout).
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Reports the number of algorithms (such as encryption, compression, etc.) that
|
Reports the number of algorithms (for encryption, compression, etc.) that
|
||||||
the target SSH2 server offers. If verbosity is set, then the offered algorithms
|
the target SSH2 server offers. If verbosity is set, the offered algorithms
|
||||||
are each listed by type.
|
are each listed by type.
|
||||||
|
|
||||||
If the "client to server" and "server to client" algorithm lists are identical
|
If the "client to server" and "server to client" algorithm lists are identical
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Queries a VNC server for the protocol version and supported security types.
|
Queries a VNC server for its protocol version and supported security types.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
author = "Patrik Karlsson"
|
author = "Patrik Karlsson"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Detects vulnerabilities and gathers information (such as version
|
Detects vulnerabilities and gathers information (such as version
|
||||||
numbers and hardware support) from a VxWorks Wind DeBug Agent.
|
numbers and hardware support) from VxWorks Wind DeBug agents.
|
||||||
|
|
||||||
Wind DeBug is a SunRPC-type service that is enabled by default on many devices
|
Wind DeBug is a SunRPC-type service that is enabled by default on many devices
|
||||||
that use the popular VxWorks real-time embedded operating system. H.D. Moore
|
that use the popular VxWorks real-time embedded operating system. H.D. Moore
|
||||||
|
|||||||
Reference in New Issue
Block a user