1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Cleaning up the descriptions for 28 scripts for consistency

This commit is contained in:
fyodor
2012-06-06 20:44:18 +00:00
parent 6ea3969357
commit 60baeb09b0
28 changed files with 57 additions and 55 deletions

View File

@@ -5,8 +5,7 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Retrieves the authentication scheme and realm of an AJP service that requires
authentication.
Retrieves the authentication scheme and realm of an AJP service (Apache JServ Protocol) that requires authentication.
]]
---

View File

@@ -4,7 +4,7 @@ local stdnse = require "stdnse"
description = [[
Performs a HEAD or GET request against either the root directory or any
optional directory and returns the server response headers.
optional directory of an Apache JServe Protocol server and returns the server response headers.
]]
---

View File

@@ -4,8 +4,9 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Finds out what options are supported by the AJP server by sending an OPTIONS
request and lists potentially risky methods.
Discovers which options are supported by the AJP (Apache JServ
Protocol) server by sending an OPTIONS request and lists potentially
risky methods.
In this script, "potentially risky" methods are anything except GET,
HEAD, POST, and OPTIONS. If the script reports potentially risky

View File

@@ -4,9 +4,9 @@ local shortport = require "shortport"
local stdnse = require "stdnse"
description = [[
Request an URI over the Apache JServe Protocol and displays or alternatively
stores the result in a file. Different AJP methods such as; GET, HEAD, TRACE,
PUT or DELETE may be used.
Requests a URI over the Apache JServe Protocol and displays the result
(or stores it in a file). Different AJP methods such as; GET, HEAD,
TRACE, PUT or DELETE may be used.
The Apache JServ Protocol is commonly used by web servers to communicate with
back-end Java application server containers.

View File

@@ -4,8 +4,7 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Discovers the EMC Networker backup software server on a LAN by
using network broadcasts.
Discovers EMC Networker backup software servers on a LAN by sending a network broadcast query.
]]
---

View File

@@ -6,7 +6,7 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special UDP probe.
Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special broadcast UDP probe.
]]
---

View File

@@ -5,10 +5,11 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Discovers PPPoE servers using the PPPoE Discovery protocol (PPPoED).
PPPoE is an ethernet based protocol so the script has to know what ethernet
interface to use for discovery. If no interface is specified, requests are sent
out on all available interfaces.
Discovers PPPoE (Point-to-Point Protocol over Ethernet) servers using
the PPPoE Discovery protocol (PPPoED). PPPoE is an ethernet based
protocol so the script has to know what ethernet interface to use for
discovery. If no interface is specified, requests are sent out on all
available interfaces.
As the script send raw ethernet frames it requires Nmap to be run in privileged
mode to operate.

View File

@@ -7,8 +7,7 @@ local table = require "table"
description = [[
Discovers hosts and routing information from devices running RIPng on the
LAN by sending a RIPng Request command and collecting the responses
from all responsive devices.
LAN by sending a broadcast RIPng Request command and collecting any responses.
]]
---

View File

@@ -3,7 +3,7 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Discovers Versant object databases using the srvloc protocol.
Discovers Versant object databases using the broadcast srvloc protocol.
]]
---

View File

@@ -8,7 +8,7 @@ local table = require "table"
local url = require "url"
description = [[
Retrieves a list of proxy servers on the LAN using the Web Proxy
Retrieves a list of proxy servers on a LAN using the Web Proxy
Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS
methods of doing so and starts by querying DHCP to get the address.
DHCP discovery requires nmap to be running in privileged mode and will

View File

@@ -4,8 +4,8 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Connects to a dictionary server using the DICT protocol and runs the SHOW
SERVER command and displays the result. The DICT protocol is defined in RFC
Connects to a dictionary server using the DICT protocol, runs the SHOW
SERVER command, and displays the result. The DICT protocol is defined in RFC
2229 and is a protocol which allows a client to query a dictionary server for
definitions from a set of natural language dictionary databases.

View File

@@ -6,12 +6,12 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Performs a domain lookup using the edns-client-subnet option that adds
support for adding subnet information to the query describing where the
query is originating. The script uses this option to supply a number of
geographically distributed locations in an attempt to enumerate as many
different address records as possible. The script also supports requests using
a given subnet.
Performs a domain lookup using the edns-client-subnet option which
allows clients to specify the subnet that queries supposedly originate
from. The script uses this option to supply a number of
geographically distributed locations in an attempt to enumerate as
many different address records as possible. The script also supports
requests using a given subnet.
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
]]

View File

@@ -7,9 +7,8 @@ local tab = require "tab"
local table = require "table"
description = [[
Performs IPv6 a quick reverse lookup of an IPv6 network using a technique
that allows reducing the amount of queries by analyzing DNS server response
codes.
Performs a quick reverse DNS lookup of an IPv6 network using a technique
which analyzes DNS server response codes to dramatically reduce the number of queries needed to enumerate large networks.
The technique essentially works by adding an octet to a given IPv6 prefix
and resolving it. If the added octet is correct, the server will return

View File

@@ -6,9 +6,10 @@ local string = require "string"
local table = require "table"
description = [[
Attempts to discover multihomed systems by analysing and
comparing information collected by other scripts. The information analyzed
currently includes, SSL certificates, SSH host keys, MAC addresses, and Netbios server names.
Attempts to discover multihomed systems by analysing and comparing
information collected by other scripts. The information analyzed
currently includes, SSL certificates, SSH host keys, MAC addresses,
and Netbios server names.
In order for the script to be able to analyze the data it has dependencies to
the following scripts: ssl-cert,ssh-hostkey,nbtstat.

View File

@@ -6,8 +6,9 @@ local string = require "string"
local table = require "table"
description = [[
Enumerates the authentication methods offered by an EAP authenticator for a
given identity or for the anonymous identity if no argument is passed.
Enumerates the authentication methods offered by an EAP (Extensible
Authentication Protocol) authenticator for a given identity or for the
anonymous identity if no argument is passed.
]]
---

View File

@@ -7,7 +7,7 @@ local string = require "string"
local target = require "target"
description = [[
Tries to find hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
Discovers hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
The script is in the "external" category because it sends target IPs to a third party in order to query their database.

View File

@@ -9,7 +9,7 @@ local table = require "table"
local url = require "url"
description = [[
This script measures the time a website takes to deliver a web page and returns
Measures the time a website takes to deliver a web page and returns
the maximum, minimum and average time it took to fetch a page.
Web pages that take longer time to load could be abused by attackers in DoS or

View File

@@ -5,8 +5,10 @@ local string = require "string"
local vulns = require "vulns"
description = [[
Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials
and other interesting configuration values.
Detects Huawei modems models HG530x, HG520x, HG510x (and possibly
others...) vulnerable to a remote credential and information
disclosure vulnerability. It also extracts the PPPoE credentials and
other interesting configuration values.
Attackers can query the URIs "/Listadeparametros.html" and "/wanfun.js" to extract sensitive information
including PPPoE credentials, firmware version, model, gateway, dns servers and active connections among other values.

View File

@@ -6,7 +6,7 @@ local shortport = require "shortport"
local stdnse = require "stdnse"
description = [[
Performs brute force password guessing against a HTTP proxy server.
Performs brute force password guessing against HTTP proxy servers.
]]
---

View File

@@ -4,7 +4,7 @@ local string = require "string"
local table = require "table"
description = [[
Finds up to 100 domain names that use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/.
Finds up to 100 domain names which use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/.
The target must be specified by DNS name, not IP address.
]];

View File

@@ -5,7 +5,7 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Connects to the VLC Streamer helper service and lists directory contents. The
Connects to a VLC Streamer helper service and lists directory contents. The
VLC Streamer helper service is used by the iOS VLC Streamer application to
enable streaming of multimedia content from the remote server to the device.
]]

View File

@@ -5,7 +5,7 @@ local string = require "string"
local vulns = require "vulns"
description = [[
Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This vulnerability is critical and it allows attackers to retrieve source code and execute code remotely.
Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This critical vulnerability allows attackers to retrieve source code and execute code remotely.
The script works by appending "?-s" to the uri to make vulnerable php-cgi handlers return colour syntax highlighted source. We use the pattern "<span style=.*>&lt;?" to detect
vulnerable installations.

View File

@@ -4,10 +4,10 @@ local stdnse = require "stdnse"
local table = require "table"
description = [[
Tries a list of known ICAP service names and prints information about the ones
it detects. The Internet Content Adaptation Protocol (ICAP) is used to extend
transparent proxy server and is generally used for content filtering and
antivirus scanning.
Tests a list of known ICAP service names and prints information about
any it detects. The Internet Content Adaptation Protocol (ICAP) is
used to extend transparent proxy servers and is generally used for
content filtering and antivirus scanning.
]]
---

View File

@@ -6,7 +6,7 @@ local stdnse = require "stdnse"
description = [[
Performs brute force password auditing against the RPA Tech Mobile Mouse
Server.
servers.
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
control of the keyboard and mouse from an iOS device. For more information:

View File

@@ -4,9 +4,10 @@ local shortport = require "shortport"
local stdnse = require "stdnse"
description = [[
Connects to the mobile mouse server, starts an application and sends a sequence
of keys to it. Any application that the user has access to can be started and
the key sequence is sent to the application after it has been started.
Connects to an RPA Tech Mobile Mouse server, starts an application and
sends a sequence of keys to it. Any application that the user has
access to can be started and the key sequence is sent to the
application after it has been started.
The Mobile Mouse server runs on OS X, Windows and Linux and enables remote
control of the keyboard and mouse from an iOS device. For more information:

View File

@@ -5,8 +5,7 @@ local string = require "string"
local vulns = require "vulns"
description = [[
Check if the machine is vulnerable to Samba heap overflow vulnerability
marked with CVE-2012-1182.
Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182.
Samba versions 3.6.3 and all versions previous to this are affected by
a vulnerability that allows remote code execution as the "root" user

View File

@@ -6,7 +6,7 @@ local table = require "table"
local openssl= require 'openssl'
description = [[
Attempts to get useful information about files from SMB volumes.
Attempts to retrieve useful information about files shared on SMB volumes.
The output is intended to resemble the output of <code>ls</code>.
]]

View File

@@ -4,7 +4,7 @@ local table = require "table"
local target = require "target"
description = [[
Produces a list of IP prefixes for a given AS number (ASN).
Produces a list of IP prefixes for a given routing AS number (ASN).
This script uses a whois server database operated by the Shadowserver
Foundation. We thank them for granting us permission to use this in