1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 12:41:29 +00:00

Fix various NSEDoc problems.

Found by David Matousek.
http://seclists.org/nmap-dev/2013/q1/88
This commit is contained in:
david
2013-01-24 18:04:42 +00:00
parent 11ba3ef045
commit 67aa5516f4
6 changed files with 17 additions and 13 deletions

View File

@@ -24,6 +24,8 @@ to be on the LAN.
-- @usage -- @usage
-- sudo nmap -sn <target> --script ip-forwarding --script-args='target=www.example.com' -- sudo nmap -sn <target> --script ip-forwarding --script-args='target=www.example.com'
-- --
-- @args ip-forwarding.target the host to which to attempt forwarding (required).
--
-- @output -- @output
-- | ip-forwarding: -- | ip-forwarding:
-- |_ The host has ip forwarding enabled, tried ping against (www.example.com) -- |_ The host has ip forwarding enabled, tried ping against (www.example.com)

View File

@@ -40,6 +40,8 @@ categories = {"discovery", "vuln", "safe"}
-- @usage -- @usage
-- nmap -p 6667 --script=irc-botnet-channels --script-args 'irc-botnet-channels.channels={chan1,chan2,chan3}' <target> -- nmap -p 6667 --script=irc-botnet-channels --script-args 'irc-botnet-channels.channels={chan1,chan2,chan3}' <target>
-- --
-- @args irc-botnet-channels.channels a list of channel names to check for.
--
-- @output -- @output
-- | irc-botnet-channels: -- | irc-botnet-channels:
-- | #loic -- | #loic

View File

@@ -19,14 +19,10 @@ accepts a shell command as its argument.
]] ]]
author = "Aleksandar Nikolic"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"safe","discovery"}
--- ---
-- @usage nmap -sT <target> -p <port> --script=+jdwp-exec --script-args cmd="date" -- @usage nmap -sT <target> -p <port> --script=+jdwp-exec --script-args cmd="date"
-- --
-- @args cmd Command to execute on the remote system. -- @args jdwp-exec.cmd Command to execute on the remote system.
-- --
-- @output -- @output
-- PORT STATE SERVICE REASON -- PORT STATE SERVICE REASON
@@ -36,6 +32,10 @@ categories = {"safe","discovery"}
-- | Sat Aug 11 15:27:21 Central European Daylight Time 2012 -- | Sat Aug 11 15:27:21 Central European Daylight Time 2012
-- |_ -- |_
author = "Aleksandar Nikolic"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"safe","discovery"}
portrule = function(host, port) portrule = function(host, port)
-- JDWP will close the port if there is no valid handshake within 2 -- JDWP will close the port if there is no valid handshake within 2
-- seconds, Service detection's NULL probe detects it as tcpwrapped. -- seconds, Service detection's NULL probe detects it as tcpwrapped.

View File

@@ -16,20 +16,20 @@ You can specify your own .class file to inject by <code>filename</code> argument
See nselib/data/jdwp-class/README for more. See nselib/data/jdwp-class/README for more.
]] ]]
author = "Aleksandar Nikolic"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"safe","discovery"}
--- ---
-- @usage nmap -sT <target> -p <port> --script=+jdwp-inject --script-args filename=HelloWorld.class -- @usage nmap -sT <target> -p <port> --script=+jdwp-inject --script-args filename=HelloWorld.class
-- --
-- @args filename Java .class file to inject. -- @args jdwp-inject.filename Java <code>.class</code> file to inject.
-- @output -- @output
-- PORT STATE SERVICE REASON -- PORT STATE SERVICE REASON
-- 2010/tcp open search syn-ack -- 2010/tcp open search syn-ack
-- | jdwp-inject: -- | jdwp-inject:
-- |_ Hello world from the remote machine! -- |_ Hello world from the remote machine!
--
author = "Aleksandar Nikolic"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"safe","discovery"}
portrule = function(host, port) portrule = function(host, port)
-- JDWP will close the port if there is no valid handshake within 2 -- JDWP will close the port if there is no valid handshake within 2
-- seconds, Service detection's NULL probe detects it as tcpwrapped. -- seconds, Service detection's NULL probe detects it as tcpwrapped.

View File

@@ -19,7 +19,7 @@ for the filename is given on the command line.
-- nmap --script stuxnet-detect -p 445 <host> -- nmap --script stuxnet-detect -p 445 <host>
-- --
-- @args stuxnet-detect.save Path to save Stuxnet executable under, with -- @args stuxnet-detect.save Path to save Stuxnet executable under, with
-- <code>%h/code> replaced by the host's IP address, and <code>%v</code> -- <code>%h</code> replaced by the host's IP address, and <code>%v</code>
-- replaced by the version of Stuxnet. -- replaced by the version of Stuxnet.
-- --
-- @output -- @output

View File

@@ -14,7 +14,7 @@ services (.NET 4.0 or later).
--- ---
-- @usage -- @usage
-- sudo ./nmap --script broadcast-wsdd-discover -- sudo ./nmap --script wsdd-discover
-- --
-- @output -- @output
-- PORT STATE SERVICE -- PORT STATE SERVICE