1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00

Minor NSEDoc summary cleanup

This commit is contained in:
fyodor
2011-01-21 08:28:38 +00:00
parent a3203d989b
commit 2dd295a266
10 changed files with 24 additions and 22 deletions

View File

@@ -1,7 +1,7 @@
description = [[
Attempts to enumerate the hashed Domino Internet Passwords that are
accessible by all authenticated users by default. This script can also
download any Domino ID Files attached to the Person document.
(by default) accessible by all authenticated users. This script can
also download any Domino ID Files attached to the Person document.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Enumerates SCADA Modbus slave ids (sids) and gets their device information.
Enumerates SCADA Modbus slave ids (sids) and collects their device information.
Modbus is one of the popular SCADA protocols. This script does Modbus device
information disclosure. It tries to find legal sids (slave ids) of Modbus

View File

@@ -1,7 +1,6 @@
description = [[
Checks if a NetBus server is vulnerable to an authentication bypass
vulnerability which allows them to be fully accessed without knowing
the password.
vulnerability which allows ful access without knowing the password.
For example a server running on TCP port 12345 on localhost with
this vulnerability is accessible to anyone. An attacker could

View File

@@ -1,5 +1,5 @@
description = [[
Performs brute force password auditing about the Netbus backdoor ("remote administration") service.
Performs brute force password auditing against the Netbus backdoor ("remote administration") service.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Attempts to enumerate valid Oracle user names against Oracle 11g
Attempts to enumerate valid Oracle user names against unpatched Oracle 11g
servers (this bug was fixed in Oracle's October 2009 Critical Patch Update).
]]

View File

@@ -1,5 +1,5 @@
description = [[
Connects to a remote RMI registry and attempts to dump all its objects.
Connects to a remote RMI registry and attempts to dump all of its objects.
First it tries to determine the names of all objects bound in the
registry, and then it tries to determine information about the

View File

@@ -1,15 +1,18 @@
description = [[
Exhausts the limit of SMB connections on a remote server by opening as many as we can.
Most implementations of SMB have a hard global limit of 11 connections for user accounts
and 10 connections for anonymous. Once that limit is reached, further connections
are denied. This exploits that limit by taking up all the connections and holding them.
Exhausts a remote SMB server's connection limit by by opening as many
connections as we can. Most implementations of SMB have a hard global
limit of 11 connections for user accounts and 10 connections for
anonymous. Once that limit is reached, further connections are
denied. This script exploits that limit by taking up all the
connections and holding them.
This works better with a valid user account, because Windows reserves one slot for valid
users. So, no matter how many anonymous connections are taking up spaces, a single valid
user can still log in.
This works better with a valid user account, because Windows reserves
one slot for valid users. So, no matter how many anonymous connections
are taking up spaces, a single valid user can still log in.
This is *not* recommended as a general purpose script, because a) it is designed to harm
the server and has no useful output, and b) it never ends (until timeout).
This is *not* recommended as a general purpose script, because a) it
is designed to harm the server and has no useful output, and b) it
never ends (until timeout).
]]
---

View File

@@ -1,6 +1,6 @@
description = [[
Reports the number of algorithms (such as encryption, compression, etc.) that
the target SSH2 server offers. If verbosity is set, then the offered algorithms
Reports the number of algorithms (for encryption, compression, etc.) that
the target SSH2 server offers. If verbosity is set, the offered algorithms
are each listed by type.
If the "client to server" and "server to client" algorithm lists are identical

View File

@@ -1,5 +1,5 @@
description = [[
Queries a VNC server for the protocol version and supported security types.
Queries a VNC server for its protocol version and supported security types.
]]
author = "Patrik Karlsson"

View File

@@ -1,6 +1,6 @@
description = [[
Detects vulnerabilities and gathers information (such as version
numbers and hardware support) from a VxWorks Wind DeBug Agent.
numbers and hardware support) from VxWorks Wind DeBug agents.
Wind DeBug is a SunRPC-type service that is enabled by default on many devices
that use the popular VxWorks real-time embedded operating system. H.D. Moore