mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Spell-check NSEDoc.
This commit is contained in:
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Extracts a list of applications, acls, and settings from the Citrix XML
|
Extracts a list of applications, ACLs, and settings from the Citrix XML
|
||||||
service.
|
service.
|
||||||
|
|
||||||
The script returns more output with higher verbosity.
|
The script returns more output with higher verbosity.
|
||||||
|
|||||||
@@ -2,7 +2,7 @@ author = "jah"
|
|||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
categories = {"discovery", "intrusive"}
|
categories = {"discovery", "intrusive"}
|
||||||
description = [[
|
description = [[
|
||||||
Attempts to enumerate valid usernames on webservers running with the mod_userdir
|
Attempts to enumerate valid usernames on web servers running with the mod_userdir
|
||||||
module or similar enabled.
|
module or similar enabled.
|
||||||
|
|
||||||
The Apache mod_userdir module allows user-specific directories to be accessed
|
The Apache mod_userdir module allows user-specific directories to be accessed
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Classifies a host's IP ID sequence (test for susceptability to idle
|
Classifies a host's IP ID sequence (test for susceptibility to idle
|
||||||
scan).
|
scan).
|
||||||
|
|
||||||
Sends six probes to obtain IP IDs from the target and classifies them
|
Sends six probes to obtain IP IDs from the target and classifies them
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Detects the Java Debug Wire Protocol. This protocol is used by Java programs
|
Detects the Java Debug Wire Protocol. This protocol is used by Java programs
|
||||||
to be debugged via the network. It should not be open to the public internet,
|
to be debugged via the network. It should not be open to the public Internet,
|
||||||
as it does not provide any security against malicious attackers who can inject
|
as it does not provide any security against malicious attackers who can inject
|
||||||
their own bytecode into the debugged process.
|
their own bytecode into the debugged process.
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to get useful informations about files from NFS exports.
|
Attempts to get useful information about files from NFS exports.
|
||||||
The output is intended to resemble the output of <code>ls</code>.
|
The output is intended to resemble the output of <code>ls</code>.
|
||||||
|
|
||||||
The script starts by enumerating and mounting the remote NFS exports. After
|
The script starts by enumerating and mounting the remote NFS exports. After
|
||||||
|
|||||||
@@ -2,9 +2,9 @@ description = [[
|
|||||||
Checks for vulnerabilities:
|
Checks for vulnerabilities:
|
||||||
* MS08-067, a Windows RPC vulnerability
|
* MS08-067, a Windows RPC vulnerability
|
||||||
* Conficker, an infection by the Conficker worm
|
* Conficker, an infection by the Conficker worm
|
||||||
* Unnamed regsvc DoS, a denial-of-service vulnerability I accidentically found in Windows 2000
|
* Unnamed regsvc DoS, a denial-of-service vulnerability I accidentally found in Windows 2000
|
||||||
* SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
|
* SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
|
||||||
* MS06-025, a Windows Ras RPC service vulnerablity
|
* MS06-025, a Windows Ras RPC service vulnerability
|
||||||
* MS07-029, a Windows Dns Server RPC service vulnerability
|
* MS07-029, a Windows Dns Server RPC service vulnerability
|
||||||
|
|
||||||
WARNING: These checks are dangerous, and are very likely to bring down a server.
|
WARNING: These checks are dangerous, and are very likely to bring down a server.
|
||||||
|
|||||||
@@ -28,7 +28,7 @@ for. The level of access required for this varies between Windows versions, but
|
|||||||
2000 anybody (including the anonymous account) can access this, and in Windows 2003 a user
|
2000 anybody (including the anonymous account) can access this, and in Windows 2003 a user
|
||||||
or administrator account is required.
|
or administrator account is required.
|
||||||
|
|
||||||
I learned the idea and technique for this from sysinternals' tool, <code>PsLoggedOn.exe</code>. I (Ron
|
I learned the idea and technique for this from Sysinternals' tool, <code>PsLoggedOn.exe</code>. I (Ron
|
||||||
Bowes) use similar function calls to what they use (although I didn't use their source),
|
Bowes) use similar function calls to what they use (although I didn't use their source),
|
||||||
so thanks go out to them. Thanks also to Matt Gardenghi, for requesting this script.
|
so thanks go out to them. Thanks also to Matt Gardenghi, for requesting this script.
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user