mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Minor NSEDoc summary cleanup
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
description = [[
|
||||
Attempts to enumerate the hashed Domino Internet Passwords that are
|
||||
accessible by all authenticated users by default. This script can also
|
||||
download any Domino ID Files attached to the Person document.
|
||||
(by default) accessible by all authenticated users. This script can
|
||||
also download any Domino ID Files attached to the Person document.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Enumerates SCADA Modbus slave ids (sids) and gets their device information.
|
||||
Enumerates SCADA Modbus slave ids (sids) and collects their device information.
|
||||
|
||||
Modbus is one of the popular SCADA protocols. This script does Modbus device
|
||||
information disclosure. It tries to find legal sids (slave ids) of Modbus
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
description = [[
|
||||
Checks if a NetBus server is vulnerable to an authentication bypass
|
||||
vulnerability which allows them to be fully accessed without knowing
|
||||
the password.
|
||||
vulnerability which allows ful access without knowing the password.
|
||||
|
||||
For example a server running on TCP port 12345 on localhost with
|
||||
this vulnerability is accessible to anyone. An attacker could
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs brute force password auditing about the Netbus backdoor ("remote administration") service.
|
||||
Performs brute force password auditing against the Netbus backdoor ("remote administration") service.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Attempts to enumerate valid Oracle user names against Oracle 11g
|
||||
Attempts to enumerate valid Oracle user names against unpatched Oracle 11g
|
||||
servers (this bug was fixed in Oracle's October 2009 Critical Patch Update).
|
||||
]]
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Connects to a remote RMI registry and attempts to dump all its objects.
|
||||
Connects to a remote RMI registry and attempts to dump all of its objects.
|
||||
|
||||
First it tries to determine the names of all objects bound in the
|
||||
registry, and then it tries to determine information about the
|
||||
|
||||
@@ -1,15 +1,18 @@
|
||||
description = [[
|
||||
Exhausts the limit of SMB connections on a remote server by opening as many as we can.
|
||||
Most implementations of SMB have a hard global limit of 11 connections for user accounts
|
||||
and 10 connections for anonymous. Once that limit is reached, further connections
|
||||
are denied. This exploits that limit by taking up all the connections and holding them.
|
||||
Exhausts a remote SMB server's connection limit by by opening as many
|
||||
connections as we can. Most implementations of SMB have a hard global
|
||||
limit of 11 connections for user accounts and 10 connections for
|
||||
anonymous. Once that limit is reached, further connections are
|
||||
denied. This script exploits that limit by taking up all the
|
||||
connections and holding them.
|
||||
|
||||
This works better with a valid user account, because Windows reserves one slot for valid
|
||||
users. So, no matter how many anonymous connections are taking up spaces, a single valid
|
||||
user can still log in.
|
||||
This works better with a valid user account, because Windows reserves
|
||||
one slot for valid users. So, no matter how many anonymous connections
|
||||
are taking up spaces, a single valid user can still log in.
|
||||
|
||||
This is *not* recommended as a general purpose script, because a) it is designed to harm
|
||||
the server and has no useful output, and b) it never ends (until timeout).
|
||||
This is *not* recommended as a general purpose script, because a) it
|
||||
is designed to harm the server and has no useful output, and b) it
|
||||
never ends (until timeout).
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
description = [[
|
||||
Reports the number of algorithms (such as encryption, compression, etc.) that
|
||||
the target SSH2 server offers. If verbosity is set, then the offered algorithms
|
||||
Reports the number of algorithms (for encryption, compression, etc.) that
|
||||
the target SSH2 server offers. If verbosity is set, the offered algorithms
|
||||
are each listed by type.
|
||||
|
||||
If the "client to server" and "server to client" algorithm lists are identical
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Queries a VNC server for the protocol version and supported security types.
|
||||
Queries a VNC server for its protocol version and supported security types.
|
||||
]]
|
||||
|
||||
author = "Patrik Karlsson"
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
description = [[
|
||||
Detects vulnerabilities and gathers information (such as version
|
||||
numbers and hardware support) from a VxWorks Wind DeBug Agent.
|
||||
numbers and hardware support) from VxWorks Wind DeBug agents.
|
||||
|
||||
Wind DeBug is a SunRPC-type service that is enabled by default on many devices
|
||||
that use the popular VxWorks real-time embedded operating system. H.D. Moore
|
||||
|
||||
Reference in New Issue
Block a user