1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00

Spell-check NSEDoc.

This commit is contained in:
david
2010-07-19 16:29:48 +00:00
parent b70fe49adf
commit 3df554de64
7 changed files with 8 additions and 8 deletions

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Extracts a list of applications, acls, and settings from the Citrix XML Extracts a list of applications, ACLs, and settings from the Citrix XML
service. service.
The script returns more output with higher verbosity. The script returns more output with higher verbosity.

View File

@@ -2,7 +2,7 @@ author = "jah"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery", "intrusive"} categories = {"discovery", "intrusive"}
description = [[ description = [[
Attempts to enumerate valid usernames on webservers running with the mod_userdir Attempts to enumerate valid usernames on web servers running with the mod_userdir
module or similar enabled. module or similar enabled.
The Apache mod_userdir module allows user-specific directories to be accessed The Apache mod_userdir module allows user-specific directories to be accessed

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Classifies a host's IP ID sequence (test for susceptability to idle Classifies a host's IP ID sequence (test for susceptibility to idle
scan). scan).
Sends six probes to obtain IP IDs from the target and classifies them Sends six probes to obtain IP IDs from the target and classifies them

View File

@@ -1,6 +1,6 @@
description = [[ description = [[
Detects the Java Debug Wire Protocol. This protocol is used by Java programs Detects the Java Debug Wire Protocol. This protocol is used by Java programs
to be debugged via the network. It should not be open to the public internet, to be debugged via the network. It should not be open to the public Internet,
as it does not provide any security against malicious attackers who can inject as it does not provide any security against malicious attackers who can inject
their own bytecode into the debugged process. their own bytecode into the debugged process.

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Attempts to get useful informations about files from NFS exports. Attempts to get useful information about files from NFS exports.
The output is intended to resemble the output of <code>ls</code>. The output is intended to resemble the output of <code>ls</code>.
The script starts by enumerating and mounting the remote NFS exports. After The script starts by enumerating and mounting the remote NFS exports. After

View File

@@ -2,9 +2,9 @@ description = [[
Checks for vulnerabilities: Checks for vulnerabilities:
* MS08-067, a Windows RPC vulnerability * MS08-067, a Windows RPC vulnerability
* Conficker, an infection by the Conficker worm * Conficker, an infection by the Conficker worm
* Unnamed regsvc DoS, a denial-of-service vulnerability I accidentically found in Windows 2000 * Unnamed regsvc DoS, a denial-of-service vulnerability I accidentally found in Windows 2000
* SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497) * SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
* MS06-025, a Windows Ras RPC service vulnerablity * MS06-025, a Windows Ras RPC service vulnerability
* MS07-029, a Windows Dns Server RPC service vulnerability * MS07-029, a Windows Dns Server RPC service vulnerability
WARNING: These checks are dangerous, and are very likely to bring down a server. WARNING: These checks are dangerous, and are very likely to bring down a server.

View File

@@ -28,7 +28,7 @@ for. The level of access required for this varies between Windows versions, but
2000 anybody (including the anonymous account) can access this, and in Windows 2003 a user 2000 anybody (including the anonymous account) can access this, and in Windows 2003 a user
or administrator account is required. or administrator account is required.
I learned the idea and technique for this from sysinternals' tool, <code>PsLoggedOn.exe</code>. I (Ron I learned the idea and technique for this from Sysinternals' tool, <code>PsLoggedOn.exe</code>. I (Ron
Bowes) use similar function calls to what they use (although I didn't use their source), Bowes) use similar function calls to what they use (although I didn't use their source),
so thanks go out to them. Thanks also to Matt Gardenghi, for requesting this script. so thanks go out to them. Thanks also to Matt Gardenghi, for requesting this script.