mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Cleaning up the descriptions for 28 scripts for consistency
This commit is contained in:
@@ -5,8 +5,7 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Retrieves the authentication scheme and realm of an AJP service that requires
|
Retrieves the authentication scheme and realm of an AJP service (Apache JServ Protocol) that requires authentication.
|
||||||
authentication.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ local stdnse = require "stdnse"
|
|||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Performs a HEAD or GET request against either the root directory or any
|
Performs a HEAD or GET request against either the root directory or any
|
||||||
optional directory and returns the server response headers.
|
optional directory of an Apache JServe Protocol server and returns the server response headers.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -4,8 +4,9 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Finds out what options are supported by the AJP server by sending an OPTIONS
|
Discovers which options are supported by the AJP (Apache JServ
|
||||||
request and lists potentially risky methods.
|
Protocol) server by sending an OPTIONS request and lists potentially
|
||||||
|
risky methods.
|
||||||
|
|
||||||
In this script, "potentially risky" methods are anything except GET,
|
In this script, "potentially risky" methods are anything except GET,
|
||||||
HEAD, POST, and OPTIONS. If the script reports potentially risky
|
HEAD, POST, and OPTIONS. If the script reports potentially risky
|
||||||
|
|||||||
@@ -4,9 +4,9 @@ local shortport = require "shortport"
|
|||||||
local stdnse = require "stdnse"
|
local stdnse = require "stdnse"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Request an URI over the Apache JServe Protocol and displays or alternatively
|
Requests a URI over the Apache JServe Protocol and displays the result
|
||||||
stores the result in a file. Different AJP methods such as; GET, HEAD, TRACE,
|
(or stores it in a file). Different AJP methods such as; GET, HEAD,
|
||||||
PUT or DELETE may be used.
|
TRACE, PUT or DELETE may be used.
|
||||||
|
|
||||||
The Apache JServ Protocol is commonly used by web servers to communicate with
|
The Apache JServ Protocol is commonly used by web servers to communicate with
|
||||||
back-end Java application server containers.
|
back-end Java application server containers.
|
||||||
|
|||||||
@@ -4,8 +4,7 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Discovers the EMC Networker backup software server on a LAN by
|
Discovers EMC Networker backup software servers on a LAN by sending a network broadcast query.
|
||||||
using network broadcasts.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special UDP probe.
|
Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special broadcast UDP probe.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -5,10 +5,11 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Discovers PPPoE servers using the PPPoE Discovery protocol (PPPoED).
|
Discovers PPPoE (Point-to-Point Protocol over Ethernet) servers using
|
||||||
PPPoE is an ethernet based protocol so the script has to know what ethernet
|
the PPPoE Discovery protocol (PPPoED). PPPoE is an ethernet based
|
||||||
interface to use for discovery. If no interface is specified, requests are sent
|
protocol so the script has to know what ethernet interface to use for
|
||||||
out on all available interfaces.
|
discovery. If no interface is specified, requests are sent out on all
|
||||||
|
available interfaces.
|
||||||
|
|
||||||
As the script send raw ethernet frames it requires Nmap to be run in privileged
|
As the script send raw ethernet frames it requires Nmap to be run in privileged
|
||||||
mode to operate.
|
mode to operate.
|
||||||
|
|||||||
@@ -7,8 +7,7 @@ local table = require "table"
|
|||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Discovers hosts and routing information from devices running RIPng on the
|
Discovers hosts and routing information from devices running RIPng on the
|
||||||
LAN by sending a RIPng Request command and collecting the responses
|
LAN by sending a broadcast RIPng Request command and collecting any responses.
|
||||||
from all responsive devices.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Discovers Versant object databases using the srvloc protocol.
|
Discovers Versant object databases using the broadcast srvloc protocol.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ local table = require "table"
|
|||||||
local url = require "url"
|
local url = require "url"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Retrieves a list of proxy servers on the LAN using the Web Proxy
|
Retrieves a list of proxy servers on a LAN using the Web Proxy
|
||||||
Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS
|
Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS
|
||||||
methods of doing so and starts by querying DHCP to get the address.
|
methods of doing so and starts by querying DHCP to get the address.
|
||||||
DHCP discovery requires nmap to be running in privileged mode and will
|
DHCP discovery requires nmap to be running in privileged mode and will
|
||||||
|
|||||||
@@ -4,8 +4,8 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Connects to a dictionary server using the DICT protocol and runs the SHOW
|
Connects to a dictionary server using the DICT protocol, runs the SHOW
|
||||||
SERVER command and displays the result. The DICT protocol is defined in RFC
|
SERVER command, and displays the result. The DICT protocol is defined in RFC
|
||||||
2229 and is a protocol which allows a client to query a dictionary server for
|
2229 and is a protocol which allows a client to query a dictionary server for
|
||||||
definitions from a set of natural language dictionary databases.
|
definitions from a set of natural language dictionary databases.
|
||||||
|
|
||||||
|
|||||||
@@ -6,12 +6,12 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Performs a domain lookup using the edns-client-subnet option that adds
|
Performs a domain lookup using the edns-client-subnet option which
|
||||||
support for adding subnet information to the query describing where the
|
allows clients to specify the subnet that queries supposedly originate
|
||||||
query is originating. The script uses this option to supply a number of
|
from. The script uses this option to supply a number of
|
||||||
geographically distributed locations in an attempt to enumerate as many
|
geographically distributed locations in an attempt to enumerate as
|
||||||
different address records as possible. The script also supports requests using
|
many different address records as possible. The script also supports
|
||||||
a given subnet.
|
requests using a given subnet.
|
||||||
|
|
||||||
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
||||||
]]
|
]]
|
||||||
|
|||||||
@@ -7,9 +7,8 @@ local tab = require "tab"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Performs IPv6 a quick reverse lookup of an IPv6 network using a technique
|
Performs a quick reverse DNS lookup of an IPv6 network using a technique
|
||||||
that allows reducing the amount of queries by analyzing DNS server response
|
which analyzes DNS server response codes to dramatically reduce the number of queries needed to enumerate large networks.
|
||||||
codes.
|
|
||||||
|
|
||||||
The technique essentially works by adding an octet to a given IPv6 prefix
|
The technique essentially works by adding an octet to a given IPv6 prefix
|
||||||
and resolving it. If the added octet is correct, the server will return
|
and resolving it. If the added octet is correct, the server will return
|
||||||
|
|||||||
@@ -6,9 +6,10 @@ local string = require "string"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Attempts to discover multihomed systems by analysing and
|
Attempts to discover multihomed systems by analysing and comparing
|
||||||
comparing information collected by other scripts. The information analyzed
|
information collected by other scripts. The information analyzed
|
||||||
currently includes, SSL certificates, SSH host keys, MAC addresses, and Netbios server names.
|
currently includes, SSL certificates, SSH host keys, MAC addresses,
|
||||||
|
and Netbios server names.
|
||||||
|
|
||||||
In order for the script to be able to analyze the data it has dependencies to
|
In order for the script to be able to analyze the data it has dependencies to
|
||||||
the following scripts: ssl-cert,ssh-hostkey,nbtstat.
|
the following scripts: ssl-cert,ssh-hostkey,nbtstat.
|
||||||
|
|||||||
@@ -6,8 +6,9 @@ local string = require "string"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Enumerates the authentication methods offered by an EAP authenticator for a
|
Enumerates the authentication methods offered by an EAP (Extensible
|
||||||
given identity or for the anonymous identity if no argument is passed.
|
Authentication Protocol) authenticator for a given identity or for the
|
||||||
|
anonymous identity if no argument is passed.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ local string = require "string"
|
|||||||
local target = require "target"
|
local target = require "target"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Tries to find hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
|
Discovers hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
|
||||||
|
|
||||||
The script is in the "external" category because it sends target IPs to a third party in order to query their database.
|
The script is in the "external" category because it sends target IPs to a third party in order to query their database.
|
||||||
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ local table = require "table"
|
|||||||
local url = require "url"
|
local url = require "url"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
This script measures the time a website takes to deliver a web page and returns
|
Measures the time a website takes to deliver a web page and returns
|
||||||
the maximum, minimum and average time it took to fetch a page.
|
the maximum, minimum and average time it took to fetch a page.
|
||||||
|
|
||||||
Web pages that take longer time to load could be abused by attackers in DoS or
|
Web pages that take longer time to load could be abused by attackers in DoS or
|
||||||
|
|||||||
@@ -5,8 +5,10 @@ local string = require "string"
|
|||||||
local vulns = require "vulns"
|
local vulns = require "vulns"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials
|
Detects Huawei modems models HG530x, HG520x, HG510x (and possibly
|
||||||
and other interesting configuration values.
|
others...) vulnerable to a remote credential and information
|
||||||
|
disclosure vulnerability. It also extracts the PPPoE credentials and
|
||||||
|
other interesting configuration values.
|
||||||
|
|
||||||
Attackers can query the URIs "/Listadeparametros.html" and "/wanfun.js" to extract sensitive information
|
Attackers can query the URIs "/Listadeparametros.html" and "/wanfun.js" to extract sensitive information
|
||||||
including PPPoE credentials, firmware version, model, gateway, dns servers and active connections among other values.
|
including PPPoE credentials, firmware version, model, gateway, dns servers and active connections among other values.
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ local shortport = require "shortport"
|
|||||||
local stdnse = require "stdnse"
|
local stdnse = require "stdnse"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Performs brute force password guessing against a HTTP proxy server.
|
Performs brute force password guessing against HTTP proxy servers.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ local string = require "string"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Finds up to 100 domain names that use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/.
|
Finds up to 100 domain names which use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/.
|
||||||
|
|
||||||
The target must be specified by DNS name, not IP address.
|
The target must be specified by DNS name, not IP address.
|
||||||
]];
|
]];
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Connects to the VLC Streamer helper service and lists directory contents. The
|
Connects to a VLC Streamer helper service and lists directory contents. The
|
||||||
VLC Streamer helper service is used by the iOS VLC Streamer application to
|
VLC Streamer helper service is used by the iOS VLC Streamer application to
|
||||||
enable streaming of multimedia content from the remote server to the device.
|
enable streaming of multimedia content from the remote server to the device.
|
||||||
]]
|
]]
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ local string = require "string"
|
|||||||
local vulns = require "vulns"
|
local vulns = require "vulns"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This vulnerability is critical and it allows attackers to retrieve source code and execute code remotely.
|
Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This critical vulnerability allows attackers to retrieve source code and execute code remotely.
|
||||||
|
|
||||||
The script works by appending "?-s" to the uri to make vulnerable php-cgi handlers return colour syntax highlighted source. We use the pattern "<span style=.*><?" to detect
|
The script works by appending "?-s" to the uri to make vulnerable php-cgi handlers return colour syntax highlighted source. We use the pattern "<span style=.*><?" to detect
|
||||||
vulnerable installations.
|
vulnerable installations.
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ local stdnse = require "stdnse"
|
|||||||
local table = require "table"
|
local table = require "table"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Tries a list of known ICAP service names and prints information about the ones
|
Tests a list of known ICAP service names and prints information about
|
||||||
it detects. The Internet Content Adaptation Protocol (ICAP) is used to extend
|
any it detects. The Internet Content Adaptation Protocol (ICAP) is
|
||||||
transparent proxy server and is generally used for content filtering and
|
used to extend transparent proxy servers and is generally used for
|
||||||
antivirus scanning.
|
content filtering and antivirus scanning.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ local stdnse = require "stdnse"
|
|||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Performs brute force password auditing against the RPA Tech Mobile Mouse
|
Performs brute force password auditing against the RPA Tech Mobile Mouse
|
||||||
Server.
|
servers.
|
||||||
|
|
||||||
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
|
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
|
||||||
control of the keyboard and mouse from an iOS device. For more information:
|
control of the keyboard and mouse from an iOS device. For more information:
|
||||||
|
|||||||
@@ -4,9 +4,10 @@ local shortport = require "shortport"
|
|||||||
local stdnse = require "stdnse"
|
local stdnse = require "stdnse"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Connects to the mobile mouse server, starts an application and sends a sequence
|
Connects to an RPA Tech Mobile Mouse server, starts an application and
|
||||||
of keys to it. Any application that the user has access to can be started and
|
sends a sequence of keys to it. Any application that the user has
|
||||||
the key sequence is sent to the application after it has been started.
|
access to can be started and the key sequence is sent to the
|
||||||
|
application after it has been started.
|
||||||
|
|
||||||
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
|
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
|
||||||
control of the keyboard and mouse from an iOS device. For more information:
|
control of the keyboard and mouse from an iOS device. For more information:
|
||||||
|
|||||||
@@ -5,8 +5,7 @@ local string = require "string"
|
|||||||
local vulns = require "vulns"
|
local vulns = require "vulns"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Check if the machine is vulnerable to Samba heap overflow vulnerability
|
Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182.
|
||||||
marked with CVE-2012-1182.
|
|
||||||
|
|
||||||
Samba versions 3.6.3 and all versions previous to this are affected by
|
Samba versions 3.6.3 and all versions previous to this are affected by
|
||||||
a vulnerability that allows remote code execution as the "root" user
|
a vulnerability that allows remote code execution as the "root" user
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ local table = require "table"
|
|||||||
local openssl= require 'openssl'
|
local openssl= require 'openssl'
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Attempts to get useful information about files from SMB volumes.
|
Attempts to retrieve useful information about files shared on SMB volumes.
|
||||||
The output is intended to resemble the output of <code>ls</code>.
|
The output is intended to resemble the output of <code>ls</code>.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ local table = require "table"
|
|||||||
local target = require "target"
|
local target = require "target"
|
||||||
|
|
||||||
description = [[
|
description = [[
|
||||||
Produces a list of IP prefixes for a given AS number (ASN).
|
Produces a list of IP prefixes for a given routing AS number (ASN).
|
||||||
|
|
||||||
This script uses a whois server database operated by the Shadowserver
|
This script uses a whois server database operated by the Shadowserver
|
||||||
Foundation. We thank them for granting us permission to use this in
|
Foundation. We thank them for granting us permission to use this in
|
||||||
|
|||||||
Reference in New Issue
Block a user