mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Cleaning up the descriptions for 28 scripts for consistency
This commit is contained in:
@@ -5,8 +5,7 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Retrieves the authentication scheme and realm of an AJP service that requires
|
||||
authentication.
|
||||
Retrieves the authentication scheme and realm of an AJP service (Apache JServ Protocol) that requires authentication.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -4,7 +4,7 @@ local stdnse = require "stdnse"
|
||||
|
||||
description = [[
|
||||
Performs a HEAD or GET request against either the root directory or any
|
||||
optional directory and returns the server response headers.
|
||||
optional directory of an Apache JServe Protocol server and returns the server response headers.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -4,8 +4,9 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Finds out what options are supported by the AJP server by sending an OPTIONS
|
||||
request and lists potentially risky methods.
|
||||
Discovers which options are supported by the AJP (Apache JServ
|
||||
Protocol) server by sending an OPTIONS request and lists potentially
|
||||
risky methods.
|
||||
|
||||
In this script, "potentially risky" methods are anything except GET,
|
||||
HEAD, POST, and OPTIONS. If the script reports potentially risky
|
||||
|
||||
@@ -4,9 +4,9 @@ local shortport = require "shortport"
|
||||
local stdnse = require "stdnse"
|
||||
|
||||
description = [[
|
||||
Request an URI over the Apache JServe Protocol and displays or alternatively
|
||||
stores the result in a file. Different AJP methods such as; GET, HEAD, TRACE,
|
||||
PUT or DELETE may be used.
|
||||
Requests a URI over the Apache JServe Protocol and displays the result
|
||||
(or stores it in a file). Different AJP methods such as; GET, HEAD,
|
||||
TRACE, PUT or DELETE may be used.
|
||||
|
||||
The Apache JServ Protocol is commonly used by web servers to communicate with
|
||||
back-end Java application server containers.
|
||||
|
||||
@@ -4,8 +4,7 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Discovers the EMC Networker backup software server on a LAN by
|
||||
using network broadcasts.
|
||||
Discovers EMC Networker backup software servers on a LAN by sending a network broadcast query.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -6,7 +6,7 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special UDP probe.
|
||||
Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special broadcast UDP probe.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -5,10 +5,11 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Discovers PPPoE servers using the PPPoE Discovery protocol (PPPoED).
|
||||
PPPoE is an ethernet based protocol so the script has to know what ethernet
|
||||
interface to use for discovery. If no interface is specified, requests are sent
|
||||
out on all available interfaces.
|
||||
Discovers PPPoE (Point-to-Point Protocol over Ethernet) servers using
|
||||
the PPPoE Discovery protocol (PPPoED). PPPoE is an ethernet based
|
||||
protocol so the script has to know what ethernet interface to use for
|
||||
discovery. If no interface is specified, requests are sent out on all
|
||||
available interfaces.
|
||||
|
||||
As the script send raw ethernet frames it requires Nmap to be run in privileged
|
||||
mode to operate.
|
||||
|
||||
@@ -7,8 +7,7 @@ local table = require "table"
|
||||
|
||||
description = [[
|
||||
Discovers hosts and routing information from devices running RIPng on the
|
||||
LAN by sending a RIPng Request command and collecting the responses
|
||||
from all responsive devices.
|
||||
LAN by sending a broadcast RIPng Request command and collecting any responses.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -3,7 +3,7 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Discovers Versant object databases using the srvloc protocol.
|
||||
Discovers Versant object databases using the broadcast srvloc protocol.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -8,7 +8,7 @@ local table = require "table"
|
||||
local url = require "url"
|
||||
|
||||
description = [[
|
||||
Retrieves a list of proxy servers on the LAN using the Web Proxy
|
||||
Retrieves a list of proxy servers on a LAN using the Web Proxy
|
||||
Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS
|
||||
methods of doing so and starts by querying DHCP to get the address.
|
||||
DHCP discovery requires nmap to be running in privileged mode and will
|
||||
|
||||
@@ -4,8 +4,8 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Connects to a dictionary server using the DICT protocol and runs the SHOW
|
||||
SERVER command and displays the result. The DICT protocol is defined in RFC
|
||||
Connects to a dictionary server using the DICT protocol, runs the SHOW
|
||||
SERVER command, and displays the result. The DICT protocol is defined in RFC
|
||||
2229 and is a protocol which allows a client to query a dictionary server for
|
||||
definitions from a set of natural language dictionary databases.
|
||||
|
||||
|
||||
@@ -6,12 +6,12 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Performs a domain lookup using the edns-client-subnet option that adds
|
||||
support for adding subnet information to the query describing where the
|
||||
query is originating. The script uses this option to supply a number of
|
||||
geographically distributed locations in an attempt to enumerate as many
|
||||
different address records as possible. The script also supports requests using
|
||||
a given subnet.
|
||||
Performs a domain lookup using the edns-client-subnet option which
|
||||
allows clients to specify the subnet that queries supposedly originate
|
||||
from. The script uses this option to supply a number of
|
||||
geographically distributed locations in an attempt to enumerate as
|
||||
many different address records as possible. The script also supports
|
||||
requests using a given subnet.
|
||||
|
||||
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
||||
]]
|
||||
|
||||
@@ -7,9 +7,8 @@ local tab = require "tab"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Performs IPv6 a quick reverse lookup of an IPv6 network using a technique
|
||||
that allows reducing the amount of queries by analyzing DNS server response
|
||||
codes.
|
||||
Performs a quick reverse DNS lookup of an IPv6 network using a technique
|
||||
which analyzes DNS server response codes to dramatically reduce the number of queries needed to enumerate large networks.
|
||||
|
||||
The technique essentially works by adding an octet to a given IPv6 prefix
|
||||
and resolving it. If the added octet is correct, the server will return
|
||||
|
||||
@@ -6,9 +6,10 @@ local string = require "string"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Attempts to discover multihomed systems by analysing and
|
||||
comparing information collected by other scripts. The information analyzed
|
||||
currently includes, SSL certificates, SSH host keys, MAC addresses, and Netbios server names.
|
||||
Attempts to discover multihomed systems by analysing and comparing
|
||||
information collected by other scripts. The information analyzed
|
||||
currently includes, SSL certificates, SSH host keys, MAC addresses,
|
||||
and Netbios server names.
|
||||
|
||||
In order for the script to be able to analyze the data it has dependencies to
|
||||
the following scripts: ssl-cert,ssh-hostkey,nbtstat.
|
||||
|
||||
@@ -6,8 +6,9 @@ local string = require "string"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Enumerates the authentication methods offered by an EAP authenticator for a
|
||||
given identity or for the anonymous identity if no argument is passed.
|
||||
Enumerates the authentication methods offered by an EAP (Extensible
|
||||
Authentication Protocol) authenticator for a given identity or for the
|
||||
anonymous identity if no argument is passed.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -7,7 +7,7 @@ local string = require "string"
|
||||
local target = require "target"
|
||||
|
||||
description = [[
|
||||
Tries to find hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
|
||||
Discovers hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
|
||||
|
||||
The script is in the "external" category because it sends target IPs to a third party in order to query their database.
|
||||
|
||||
|
||||
@@ -9,7 +9,7 @@ local table = require "table"
|
||||
local url = require "url"
|
||||
|
||||
description = [[
|
||||
This script measures the time a website takes to deliver a web page and returns
|
||||
Measures the time a website takes to deliver a web page and returns
|
||||
the maximum, minimum and average time it took to fetch a page.
|
||||
|
||||
Web pages that take longer time to load could be abused by attackers in DoS or
|
||||
|
||||
@@ -5,8 +5,10 @@ local string = require "string"
|
||||
local vulns = require "vulns"
|
||||
|
||||
description = [[
|
||||
Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials
|
||||
and other interesting configuration values.
|
||||
Detects Huawei modems models HG530x, HG520x, HG510x (and possibly
|
||||
others...) vulnerable to a remote credential and information
|
||||
disclosure vulnerability. It also extracts the PPPoE credentials and
|
||||
other interesting configuration values.
|
||||
|
||||
Attackers can query the URIs "/Listadeparametros.html" and "/wanfun.js" to extract sensitive information
|
||||
including PPPoE credentials, firmware version, model, gateway, dns servers and active connections among other values.
|
||||
|
||||
@@ -6,7 +6,7 @@ local shortport = require "shortport"
|
||||
local stdnse = require "stdnse"
|
||||
|
||||
description = [[
|
||||
Performs brute force password guessing against a HTTP proxy server.
|
||||
Performs brute force password guessing against HTTP proxy servers.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -4,7 +4,7 @@ local string = require "string"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Finds up to 100 domain names that use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/.
|
||||
Finds up to 100 domain names which use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/.
|
||||
|
||||
The target must be specified by DNS name, not IP address.
|
||||
]];
|
||||
|
||||
@@ -5,7 +5,7 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Connects to the VLC Streamer helper service and lists directory contents. The
|
||||
Connects to a VLC Streamer helper service and lists directory contents. The
|
||||
VLC Streamer helper service is used by the iOS VLC Streamer application to
|
||||
enable streaming of multimedia content from the remote server to the device.
|
||||
]]
|
||||
|
||||
@@ -5,7 +5,7 @@ local string = require "string"
|
||||
local vulns = require "vulns"
|
||||
|
||||
description = [[
|
||||
Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This vulnerability is critical and it allows attackers to retrieve source code and execute code remotely.
|
||||
Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This critical vulnerability allows attackers to retrieve source code and execute code remotely.
|
||||
|
||||
The script works by appending "?-s" to the uri to make vulnerable php-cgi handlers return colour syntax highlighted source. We use the pattern "<span style=.*><?" to detect
|
||||
vulnerable installations.
|
||||
|
||||
@@ -4,10 +4,10 @@ local stdnse = require "stdnse"
|
||||
local table = require "table"
|
||||
|
||||
description = [[
|
||||
Tries a list of known ICAP service names and prints information about the ones
|
||||
it detects. The Internet Content Adaptation Protocol (ICAP) is used to extend
|
||||
transparent proxy server and is generally used for content filtering and
|
||||
antivirus scanning.
|
||||
Tests a list of known ICAP service names and prints information about
|
||||
any it detects. The Internet Content Adaptation Protocol (ICAP) is
|
||||
used to extend transparent proxy servers and is generally used for
|
||||
content filtering and antivirus scanning.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -6,7 +6,7 @@ local stdnse = require "stdnse"
|
||||
|
||||
description = [[
|
||||
Performs brute force password auditing against the RPA Tech Mobile Mouse
|
||||
Server.
|
||||
servers.
|
||||
|
||||
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
|
||||
control of the keyboard and mouse from an iOS device. For more information:
|
||||
|
||||
@@ -4,9 +4,10 @@ local shortport = require "shortport"
|
||||
local stdnse = require "stdnse"
|
||||
|
||||
description = [[
|
||||
Connects to the mobile mouse server, starts an application and sends a sequence
|
||||
of keys to it. Any application that the user has access to can be started and
|
||||
the key sequence is sent to the application after it has been started.
|
||||
Connects to an RPA Tech Mobile Mouse server, starts an application and
|
||||
sends a sequence of keys to it. Any application that the user has
|
||||
access to can be started and the key sequence is sent to the
|
||||
application after it has been started.
|
||||
|
||||
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
|
||||
control of the keyboard and mouse from an iOS device. For more information:
|
||||
|
||||
@@ -5,8 +5,7 @@ local string = require "string"
|
||||
local vulns = require "vulns"
|
||||
|
||||
description = [[
|
||||
Check if the machine is vulnerable to Samba heap overflow vulnerability
|
||||
marked with CVE-2012-1182.
|
||||
Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182.
|
||||
|
||||
Samba versions 3.6.3 and all versions previous to this are affected by
|
||||
a vulnerability that allows remote code execution as the "root" user
|
||||
|
||||
@@ -6,7 +6,7 @@ local table = require "table"
|
||||
local openssl= require 'openssl'
|
||||
|
||||
description = [[
|
||||
Attempts to get useful information about files from SMB volumes.
|
||||
Attempts to retrieve useful information about files shared on SMB volumes.
|
||||
The output is intended to resemble the output of <code>ls</code>.
|
||||
]]
|
||||
|
||||
|
||||
@@ -4,7 +4,7 @@ local table = require "table"
|
||||
local target = require "target"
|
||||
|
||||
description = [[
|
||||
Produces a list of IP prefixes for a given AS number (ASN).
|
||||
Produces a list of IP prefixes for a given routing AS number (ASN).
|
||||
|
||||
This script uses a whois server database operated by the Shadowserver
|
||||
Foundation. We thank them for granting us permission to use this in
|
||||
|
||||
Reference in New Issue
Block a user