mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Spell-check NSEDoc.
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Extracts a list of applications, acls, and settings from the Citrix XML
|
||||
Extracts a list of applications, ACLs, and settings from the Citrix XML
|
||||
service.
|
||||
|
||||
The script returns more output with higher verbosity.
|
||||
|
||||
@@ -2,7 +2,7 @@ author = "jah"
|
||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||
categories = {"discovery", "intrusive"}
|
||||
description = [[
|
||||
Attempts to enumerate valid usernames on webservers running with the mod_userdir
|
||||
Attempts to enumerate valid usernames on web servers running with the mod_userdir
|
||||
module or similar enabled.
|
||||
|
||||
The Apache mod_userdir module allows user-specific directories to be accessed
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Classifies a host's IP ID sequence (test for susceptability to idle
|
||||
Classifies a host's IP ID sequence (test for susceptibility to idle
|
||||
scan).
|
||||
|
||||
Sends six probes to obtain IP IDs from the target and classifies them
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
description = [[
|
||||
Detects the Java Debug Wire Protocol. This protocol is used by Java programs
|
||||
to be debugged via the network. It should not be open to the public internet,
|
||||
to be debugged via the network. It should not be open to the public Internet,
|
||||
as it does not provide any security against malicious attackers who can inject
|
||||
their own bytecode into the debugged process.
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Attempts to get useful informations about files from NFS exports.
|
||||
Attempts to get useful information about files from NFS exports.
|
||||
The output is intended to resemble the output of <code>ls</code>.
|
||||
|
||||
The script starts by enumerating and mounting the remote NFS exports. After
|
||||
|
||||
@@ -2,9 +2,9 @@ description = [[
|
||||
Checks for vulnerabilities:
|
||||
* MS08-067, a Windows RPC vulnerability
|
||||
* Conficker, an infection by the Conficker worm
|
||||
* Unnamed regsvc DoS, a denial-of-service vulnerability I accidentically found in Windows 2000
|
||||
* Unnamed regsvc DoS, a denial-of-service vulnerability I accidentally found in Windows 2000
|
||||
* SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
|
||||
* MS06-025, a Windows Ras RPC service vulnerablity
|
||||
* MS06-025, a Windows Ras RPC service vulnerability
|
||||
* MS07-029, a Windows Dns Server RPC service vulnerability
|
||||
|
||||
WARNING: These checks are dangerous, and are very likely to bring down a server.
|
||||
|
||||
@@ -28,7 +28,7 @@ for. The level of access required for this varies between Windows versions, but
|
||||
2000 anybody (including the anonymous account) can access this, and in Windows 2003 a user
|
||||
or administrator account is required.
|
||||
|
||||
I learned the idea and technique for this from sysinternals' tool, <code>PsLoggedOn.exe</code>. I (Ron
|
||||
I learned the idea and technique for this from Sysinternals' tool, <code>PsLoggedOn.exe</code>. I (Ron
|
||||
Bowes) use similar function calls to what they use (although I didn't use their source),
|
||||
so thanks go out to them. Thanks also to Matt Gardenghi, for requesting this script.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user