1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Some minor NSEDoc updates on scripts we completed in January 2012

This commit is contained in:
fyodor
2012-02-10 08:08:51 +00:00
parent 444db54fc5
commit 2dea1e46f8
20 changed files with 36 additions and 33 deletions

View File

@@ -1,7 +1,7 @@
description = [[ description = [[
Sends a DHCPv6 request (Solicit) to the DHCPv6 multicast address. It parses the Sends a DHCPv6 request (Solicit) to the DHCPv6 multicast address,
response and extracts the address along with any options returned by the parses the response, then extracts and prints the address along with
server. any options returned by the server.
The script requires Nmap to be run in privileged mode as it binds the socket The script requires Nmap to be run in privileged mode as it binds the socket
to a privileged port (udp/546). to a privileged port (udp/546).

View File

@@ -1,6 +1,6 @@
description = [[ description = [[
Discovers PPPoE servers using the PPPoE Discovery protocol (PPPoED) Discovers PPPoE servers using the PPPoE Discovery protocol (PPPoED).
The PPPoE is an ethernet based protocol so the script has to know what ethernet PPPoE is an ethernet based protocol so the script has to know what ethernet
interface to use for discovery. If no interface is specified, requests are sent interface to use for discovery. If no interface is specified, requests are sent
out on all available interfaces. out on all available interfaces.

View File

@@ -1,7 +1,7 @@
description = [[ description = [[
Discovers hosts and routing information from devices running RIPng on the Discovers hosts and routing information from devices running RIPng on the
LAN. It does so by sending a RIPng Request command and collects the responses LAN by sending a RIPng Request command and collecting the responses
from all devices responding to the request. from all responsive devices.
]] ]]
--- ---

View File

@@ -1,8 +1,10 @@
description = [[Detects the CCcam service. description = [[
Detects the CCcam service (software for sharing subscription TV among
multiple receivers).
CCcam is a way of sharing subscription TV among multiple receivers. The service The service normally runs on port 12000. It distinguishes
normally runs on port 12000. It distinguishes itself by printing 16 itself by printing 16 random-looking bytes upon receiving a
random-looking bytes upon receiving a connection. connection.
Because the script attempts to detect "random-looking" bytes, it has a small Because the script attempts to detect "random-looking" bytes, it has a small
chance of failing to detect the service when the data do not seem random chance of failing to detect the service when the data do not seem random

View File

@@ -1,10 +1,12 @@
description = [[ description = [[
Ateemps to get more information from a server by requesting the server nsid[1], Retrieves information from a DNS nameserver by requesting
and asking for id.server[2] and version.bind. This script dose the same as the its nameserver ID (nsid), and asking for its id.server and
following two dig commands: version.bind. This script performs the same queries as the following
two dig commands:
- dig CH TXT bind.version @target - dig CH TXT bind.version @target
- dig +nsid CH TXT id.server @target - dig +nsid CH TXT id.server @target
References:
[1]http://www.ietf.org/rfc/rfc5001.txt [1]http://www.ietf.org/rfc/rfc5001.txt
[2]http://www.ietf.org/rfc/rfc4892.txt [2]http://www.ietf.org/rfc/rfc4892.txt
]] ]]

View File

@@ -1,6 +1,5 @@
description = [[ description = [[
Spiders a web site to find web pages requiring authentication, either form- Spiders a web site to find web pages requiring form-based or HTTP-based authentication. The results are returned in a table with each url and the
based or HTTP-based. The results are returned in a table with each url and the
detected method. detected method.
]] ]]

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Displays the contents of the "generator" meta tag if there is one. Displays the contents of the "generator" meta tag of a web page (default: /) if there is one.
]] ]]
author = "Michael Kohl" author = "Michael Kohl"

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password guessing against a HTTP proxy server Performs brute force password guessing against a HTTP proxy server.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password guessing against the Asterisk IAX2 protocol. Performs brute force password auditing against the Asterisk IAX2 protocol.
Guessing fails when a large number of attempts is made due to the maxcallnumber limit (default 2048). Guessing fails when a large number of attempts is made due to the maxcallnumber limit (default 2048).
In case your getting "ERROR: Too many retries, aborted ..." after a while, this is most likely what's happening. In case your getting "ERROR: Too many retries, aborted ..." after a while, this is most likely what's happening.
In order to avoid this problem try: In order to avoid this problem try:

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password guessing against Couchbase Membase servers. Performs brute force password auditing against Couchbase Membase servers.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Retrieves information from distributed memory object caching system memcached Retrieves information from distributed memory object caching system memcached.
]] ]]
--- ---

View File

@@ -1,6 +1,5 @@
description = [[ description = [[
Maps a WAN port on the router to a local port on the client. Maps a WAN port on the router to a local port on the client using the NAT Port Mapping Protocol (NAT-PMP). It supports the following operations:
The script uses the NAT Port Mapping Protocol (NAT-PMP) to do so and supports the following operations:
o map - maps a new external port on the router to an internal port of the requesting IP o map - maps a new external port on the router to an internal port of the requesting IP
o unmap - unmaps a previously mapped port for the requesting IP o unmap - unmaps a previously mapped port for the requesting IP
o unmapall - unmaps all previously mapped ports for the requesting IP o unmapall - unmaps all previously mapped ports for the requesting IP

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force passwords guessing against a Redis key-value store Performs brute force passwords auditing against a Redis key-value store.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Gets information from a Redis key-value store Retrieves information (such as version number and architecture) from a Redis key-value store.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Retrieves information from a Basho Riak distributed database using the HTTP protocol. Retrieves information (such as node name and architecture) from a Basho Riak distributed database using the HTTP protocol.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Determines the supported authentication mechanisms of the remote SOCKS server. Determines the supported authentication mechanisms of a remote SOCKS server.
Starting with SOCKS version 5 socks servers may support authentication. Starting with SOCKS version 5 socks servers may support authentication.
The script checks for the following authentication types: The script checks for the following authentication types:
0 - No authentication 0 - No authentication

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password guessing against SOCKS 5 servers Performs brute force password auditing against SOCKS 5 servers.
]] ]]
--- ---

View File

@@ -1,7 +1,8 @@
description=[[ description=[[
Sniffs an interface for HTTP traffic and dumps any URLs, and their originating Sniffs an interface for HTTP traffic and dumps any URLs, and their
IP. Script output differs from other script as URLs are written to stdout originating IP address. Script output differs from other script as
directly. There is also an option to log the results to file. URLs are written to stdout directly. There is also an option to log
the results to file.
The script can be limited in time by using the timeout argument or run until a The script can be limited in time by using the timeout argument or run until a
ctrl+break is issued, by setting the timeout to 0. ctrl+break is issued, by setting the timeout to 0.

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password guessing against the VMWare Authentication Daemon (vmware-authd) Performs brute force password auditing against the VMWare Authentication Daemon (vmware-authd).
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Requests a XDMCP session and lists supported authentication and authorization mechanisms Requests an XDMCP (X display manager control protocol) session and lists supported authentication and authorization mechanisms.
]] ]]
--- ---