diff --git a/scripts/ajp-auth.nse b/scripts/ajp-auth.nse index 463612f9c..38dddc8b2 100644 --- a/scripts/ajp-auth.nse +++ b/scripts/ajp-auth.nse @@ -5,8 +5,7 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Retrieves the authentication scheme and realm of an AJP service that requires -authentication. +Retrieves the authentication scheme and realm of an AJP service (Apache JServ Protocol) that requires authentication. ]] --- diff --git a/scripts/ajp-headers.nse b/scripts/ajp-headers.nse index 02612650b..7f8a86425 100644 --- a/scripts/ajp-headers.nse +++ b/scripts/ajp-headers.nse @@ -4,7 +4,7 @@ local stdnse = require "stdnse" description = [[ Performs a HEAD or GET request against either the root directory or any -optional directory and returns the server response headers. +optional directory of an Apache JServe Protocol server and returns the server response headers. ]] --- diff --git a/scripts/ajp-methods.nse b/scripts/ajp-methods.nse index 38270084d..c0b825728 100644 --- a/scripts/ajp-methods.nse +++ b/scripts/ajp-methods.nse @@ -4,8 +4,9 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Finds out what options are supported by the AJP server by sending an OPTIONS -request and lists potentially risky methods. +Discovers which options are supported by the AJP (Apache JServ +Protocol) server by sending an OPTIONS request and lists potentially +risky methods. In this script, "potentially risky" methods are anything except GET, HEAD, POST, and OPTIONS. If the script reports potentially risky diff --git a/scripts/ajp-request.nse b/scripts/ajp-request.nse index 4731f8770..2b9858a8b 100644 --- a/scripts/ajp-request.nse +++ b/scripts/ajp-request.nse @@ -4,9 +4,9 @@ local shortport = require "shortport" local stdnse = require "stdnse" description = [[ -Request an URI over the Apache JServe Protocol and displays or alternatively -stores the result in a file. Different AJP methods such as; GET, HEAD, TRACE, -PUT or DELETE may be used. +Requests a URI over the Apache JServe Protocol and displays the result +(or stores it in a file). Different AJP methods such as; GET, HEAD, +TRACE, PUT or DELETE may be used. The Apache JServ Protocol is commonly used by web servers to communicate with back-end Java application server containers. diff --git a/scripts/broadcast-networker-discover.nse b/scripts/broadcast-networker-discover.nse index ed2b7cba4..febad0ae7 100644 --- a/scripts/broadcast-networker-discover.nse +++ b/scripts/broadcast-networker-discover.nse @@ -4,8 +4,7 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Discovers the EMC Networker backup software server on a LAN by -using network broadcasts. +Discovers EMC Networker backup software servers on a LAN by sending a network broadcast query. ]] --- diff --git a/scripts/broadcast-pc-duo.nse b/scripts/broadcast-pc-duo.nse index 38266ec2f..00017d6b5 100644 --- a/scripts/broadcast-pc-duo.nse +++ b/scripts/broadcast-pc-duo.nse @@ -6,7 +6,7 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special UDP probe. +Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special broadcast UDP probe. ]] --- diff --git a/scripts/broadcast-pppoe-discover.nse b/scripts/broadcast-pppoe-discover.nse index 6bfe55682..048d89490 100644 --- a/scripts/broadcast-pppoe-discover.nse +++ b/scripts/broadcast-pppoe-discover.nse @@ -5,10 +5,11 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Discovers PPPoE servers using the PPPoE Discovery protocol (PPPoED). -PPPoE is an ethernet based protocol so the script has to know what ethernet -interface to use for discovery. If no interface is specified, requests are sent -out on all available interfaces. +Discovers PPPoE (Point-to-Point Protocol over Ethernet) servers using +the PPPoE Discovery protocol (PPPoED). PPPoE is an ethernet based +protocol so the script has to know what ethernet interface to use for +discovery. If no interface is specified, requests are sent out on all +available interfaces. As the script send raw ethernet frames it requires Nmap to be run in privileged mode to operate. diff --git a/scripts/broadcast-ripng-discover.nse b/scripts/broadcast-ripng-discover.nse index 62cc8da19..9ffca56f3 100644 --- a/scripts/broadcast-ripng-discover.nse +++ b/scripts/broadcast-ripng-discover.nse @@ -7,8 +7,7 @@ local table = require "table" description = [[ Discovers hosts and routing information from devices running RIPng on the -LAN by sending a RIPng Request command and collecting the responses -from all responsive devices. +LAN by sending a broadcast RIPng Request command and collecting any responses. ]] --- diff --git a/scripts/broadcast-versant-locate.nse b/scripts/broadcast-versant-locate.nse index 5fa5abdf9..37998f9eb 100644 --- a/scripts/broadcast-versant-locate.nse +++ b/scripts/broadcast-versant-locate.nse @@ -3,7 +3,7 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Discovers Versant object databases using the srvloc protocol. +Discovers Versant object databases using the broadcast srvloc protocol. ]] --- diff --git a/scripts/broadcast-wpad-discover.nse b/scripts/broadcast-wpad-discover.nse index f82f37d52..d2f97d807 100644 --- a/scripts/broadcast-wpad-discover.nse +++ b/scripts/broadcast-wpad-discover.nse @@ -8,7 +8,7 @@ local table = require "table" local url = require "url" description = [[ -Retrieves a list of proxy servers on the LAN using the Web Proxy +Retrieves a list of proxy servers on a LAN using the Web Proxy Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS methods of doing so and starts by querying DHCP to get the address. DHCP discovery requires nmap to be running in privileged mode and will diff --git a/scripts/dict-info.nse b/scripts/dict-info.nse index 4effd6d18..19409e143 100644 --- a/scripts/dict-info.nse +++ b/scripts/dict-info.nse @@ -4,8 +4,8 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Connects to a dictionary server using the DICT protocol and runs the SHOW -SERVER command and displays the result. The DICT protocol is defined in RFC +Connects to a dictionary server using the DICT protocol, runs the SHOW +SERVER command, and displays the result. The DICT protocol is defined in RFC 2229 and is a protocol which allows a client to query a dictionary server for definitions from a set of natural language dictionary databases. diff --git a/scripts/dns-client-subnet-scan.nse b/scripts/dns-client-subnet-scan.nse index 922fab335..a9b9da92f 100644 --- a/scripts/dns-client-subnet-scan.nse +++ b/scripts/dns-client-subnet-scan.nse @@ -6,12 +6,12 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Performs a domain lookup using the edns-client-subnet option that adds -support for adding subnet information to the query describing where the -query is originating. The script uses this option to supply a number of -geographically distributed locations in an attempt to enumerate as many -different address records as possible. The script also supports requests using -a given subnet. +Performs a domain lookup using the edns-client-subnet option which +allows clients to specify the subnet that queries supposedly originate +from. The script uses this option to supply a number of +geographically distributed locations in an attempt to enumerate as +many different address records as possible. The script also supports +requests using a given subnet. * http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00 ]] diff --git a/scripts/dns-ip6-arpa-scan.nse b/scripts/dns-ip6-arpa-scan.nse index 2935fab9e..2f757b899 100644 --- a/scripts/dns-ip6-arpa-scan.nse +++ b/scripts/dns-ip6-arpa-scan.nse @@ -7,9 +7,8 @@ local tab = require "tab" local table = require "table" description = [[ -Performs IPv6 a quick reverse lookup of an IPv6 network using a technique -that allows reducing the amount of queries by analyzing DNS server response -codes. +Performs a quick reverse DNS lookup of an IPv6 network using a technique +which analyzes DNS server response codes to dramatically reduce the number of queries needed to enumerate large networks. The technique essentially works by adding an octet to a given IPv6 prefix and resolving it. If the added octet is correct, the server will return diff --git a/scripts/duplicates.nse b/scripts/duplicates.nse index 015f06976..70a72cfe1 100644 --- a/scripts/duplicates.nse +++ b/scripts/duplicates.nse @@ -6,9 +6,10 @@ local string = require "string" local table = require "table" description = [[ -Attempts to discover multihomed systems by analysing and -comparing information collected by other scripts. The information analyzed -currently includes, SSL certificates, SSH host keys, MAC addresses, and Netbios server names. +Attempts to discover multihomed systems by analysing and comparing +information collected by other scripts. The information analyzed +currently includes, SSL certificates, SSH host keys, MAC addresses, +and Netbios server names. In order for the script to be able to analyze the data it has dependencies to the following scripts: ssl-cert,ssh-hostkey,nbtstat. diff --git a/scripts/eap-info.nse b/scripts/eap-info.nse index df6819d84..5ef4825ac 100644 --- a/scripts/eap-info.nse +++ b/scripts/eap-info.nse @@ -6,8 +6,9 @@ local string = require "string" local table = require "table" description = [[ -Enumerates the authentication methods offered by an EAP authenticator for a -given identity or for the anonymous identity if no argument is passed. +Enumerates the authentication methods offered by an EAP (Extensible +Authentication Protocol) authenticator for a given identity or for the +anonymous identity if no argument is passed. ]] --- diff --git a/scripts/hostmap-bfk.nse b/scripts/hostmap-bfk.nse index edc82eaca..4e5850d75 100644 --- a/scripts/hostmap-bfk.nse +++ b/scripts/hostmap-bfk.nse @@ -7,7 +7,7 @@ local string = require "string" local target = require "target" description = [[ -Tries to find hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html. +Discovers hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html. The script is in the "external" category because it sends target IPs to a third party in order to query their database. diff --git a/scripts/http-chrono.nse b/scripts/http-chrono.nse index 288d3dd9a..7b54fdce1 100644 --- a/scripts/http-chrono.nse +++ b/scripts/http-chrono.nse @@ -9,7 +9,7 @@ local table = require "table" local url = require "url" description = [[ -This script measures the time a website takes to deliver a web page and returns +Measures the time a website takes to deliver a web page and returns the maximum, minimum and average time it took to fetch a page. Web pages that take longer time to load could be abused by attackers in DoS or diff --git a/scripts/http-huawei-hg5xx-vuln.nse b/scripts/http-huawei-hg5xx-vuln.nse index e55e456d7..162b3b587 100644 --- a/scripts/http-huawei-hg5xx-vuln.nse +++ b/scripts/http-huawei-hg5xx-vuln.nse @@ -5,8 +5,10 @@ local string = require "string" local vulns = require "vulns" description = [[ -Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials -and other interesting configuration values. +Detects Huawei modems models HG530x, HG520x, HG510x (and possibly +others...) vulnerable to a remote credential and information +disclosure vulnerability. It also extracts the PPPoE credentials and +other interesting configuration values. Attackers can query the URIs "/Listadeparametros.html" and "/wanfun.js" to extract sensitive information including PPPoE credentials, firmware version, model, gateway, dns servers and active connections among other values. diff --git a/scripts/http-proxy-brute.nse b/scripts/http-proxy-brute.nse index cc55d0316..f0ce43d19 100644 --- a/scripts/http-proxy-brute.nse +++ b/scripts/http-proxy-brute.nse @@ -6,7 +6,7 @@ local shortport = require "shortport" local stdnse = require "stdnse" description = [[ -Performs brute force password guessing against a HTTP proxy server. +Performs brute force password guessing against HTTP proxy servers. ]] --- diff --git a/scripts/http-robtex-shared-ns.nse b/scripts/http-robtex-shared-ns.nse index a83adff95..7aa05e9cc 100644 --- a/scripts/http-robtex-shared-ns.nse +++ b/scripts/http-robtex-shared-ns.nse @@ -4,7 +4,7 @@ local string = require "string" local table = require "table" description = [[ -Finds up to 100 domain names that use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/. +Finds up to 100 domain names which use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/. The target must be specified by DNS name, not IP address. ]]; diff --git a/scripts/http-vlcstreamer-ls.nse b/scripts/http-vlcstreamer-ls.nse index b0c0b0f09..79381d3a6 100644 --- a/scripts/http-vlcstreamer-ls.nse +++ b/scripts/http-vlcstreamer-ls.nse @@ -5,7 +5,7 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Connects to the VLC Streamer helper service and lists directory contents. The +Connects to a VLC Streamer helper service and lists directory contents. The VLC Streamer helper service is used by the iOS VLC Streamer application to enable streaming of multimedia content from the remote server to the device. ]] diff --git a/scripts/http-vuln-cve2012-1823.nse b/scripts/http-vuln-cve2012-1823.nse index 987d3ad89..52b42b441 100644 --- a/scripts/http-vuln-cve2012-1823.nse +++ b/scripts/http-vuln-cve2012-1823.nse @@ -5,7 +5,7 @@ local string = require "string" local vulns = require "vulns" description = [[ -Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This vulnerability is critical and it allows attackers to retrieve source code and execute code remotely. +Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This critical vulnerability allows attackers to retrieve source code and execute code remotely. The script works by appending "?-s" to the uri to make vulnerable php-cgi handlers return colour syntax highlighted source. We use the pattern "<?" to detect vulnerable installations. diff --git a/scripts/icap-info.nse b/scripts/icap-info.nse index b8aa3293e..dd01fa2d6 100644 --- a/scripts/icap-info.nse +++ b/scripts/icap-info.nse @@ -4,10 +4,10 @@ local stdnse = require "stdnse" local table = require "table" description = [[ -Tries a list of known ICAP service names and prints information about the ones -it detects. The Internet Content Adaptation Protocol (ICAP) is used to extend -transparent proxy server and is generally used for content filtering and -antivirus scanning. +Tests a list of known ICAP service names and prints information about +any it detects. The Internet Content Adaptation Protocol (ICAP) is +used to extend transparent proxy servers and is generally used for +content filtering and antivirus scanning. ]] --- diff --git a/scripts/mmouse-brute.nse b/scripts/mmouse-brute.nse index 680c526fb..a6fea30f2 100644 --- a/scripts/mmouse-brute.nse +++ b/scripts/mmouse-brute.nse @@ -6,7 +6,7 @@ local stdnse = require "stdnse" description = [[ Performs brute force password auditing against the RPA Tech Mobile Mouse -Server. +servers. The Mobile Mouse server runs on OS X, Windows and Linux and enables remote control of the keyboard and mouse from an iOS device. For more information: diff --git a/scripts/mmouse-exec.nse b/scripts/mmouse-exec.nse index 5e82bb37b..d6927e9f8 100644 --- a/scripts/mmouse-exec.nse +++ b/scripts/mmouse-exec.nse @@ -4,9 +4,10 @@ local shortport = require "shortport" local stdnse = require "stdnse" description = [[ -Connects to the mobile mouse server, starts an application and sends a sequence -of keys to it. Any application that the user has access to can be started and -the key sequence is sent to the application after it has been started. +Connects to an RPA Tech Mobile Mouse server, starts an application and +sends a sequence of keys to it. Any application that the user has +access to can be started and the key sequence is sent to the +application after it has been started. The Mobile Mouse server runs on OS X, Windows and Linux and enables remote control of the keyboard and mouse from an iOS device. For more information: diff --git a/scripts/samba-vuln-cve-2012-1182.nse b/scripts/samba-vuln-cve-2012-1182.nse index f7e6c72d7..42ffb3075 100644 --- a/scripts/samba-vuln-cve-2012-1182.nse +++ b/scripts/samba-vuln-cve-2012-1182.nse @@ -5,8 +5,7 @@ local string = require "string" local vulns = require "vulns" description = [[ -Check if the machine is vulnerable to Samba heap overflow vulnerability -marked with CVE-2012-1182. +Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182. Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the "root" user diff --git a/scripts/smb-ls.nse b/scripts/smb-ls.nse index 40265c5ff..97cf0cd1d 100644 --- a/scripts/smb-ls.nse +++ b/scripts/smb-ls.nse @@ -6,7 +6,7 @@ local table = require "table" local openssl= require 'openssl' description = [[ -Attempts to get useful information about files from SMB volumes. +Attempts to retrieve useful information about files shared on SMB volumes. The output is intended to resemble the output of ls. ]] diff --git a/scripts/targets-asn.nse b/scripts/targets-asn.nse index 9fb43acc4..67307ef5a 100644 --- a/scripts/targets-asn.nse +++ b/scripts/targets-asn.nse @@ -4,7 +4,7 @@ local table = require "table" local target = require "target" description = [[ -Produces a list of IP prefixes for a given AS number (ASN). +Produces a list of IP prefixes for a given routing AS number (ASN). This script uses a whois server database operated by the Shadowserver Foundation. We thank them for granting us permission to use this in