1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-14 19:59:02 +00:00

Update the script descriptions/nsedoc a bit

This commit is contained in:
fyodor
2012-01-01 22:21:08 +00:00
parent 2461746840
commit 78033599ed
25 changed files with 49 additions and 46 deletions

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Discovers PC-Anywhere hosts running on the LAN Sends a special broadcat probe to discover PC-Anywhere hosts running on a LAN
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description=[[ description=[[
Discovers devices and routing information from devices running RIPv2 on the Discovers hosts and routing information from devices running RIPv2 on the
LAN. It does so by sending a RIPv2 Request command and collects the responses LAN. It does so by sending a RIPv2 Request command and collects the responses
from all devices responding to the request. from all devices responding to the request.
]] ]]

View File

@@ -1,9 +1,11 @@
description = [[ description = [[
Retrieves a list of proxy servers on the LAN using the Web Proxy Autodiscovery Protocol (WPAD). Retrieves a list of proxy servers on the LAN using the Web Proxy
It implements both the DHCP and DNS methods of doing so and starts by querying DHCP to get the address. Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS
DHCP discovery requires nmap to be running in privileged mode and will be skipped when this is not the case. methods of doing so and starts by querying DHCP to get the address.
DNS discovery relies on the script being able to resolve the local domain either through a script argument or DHCP discovery requires nmap to be running in privileged mode and will
by attempting to reverse resolve the local IP. be skipped when this is not the case. DNS discovery relies on the
script being able to resolve the local domain either through a script
argument or by attempting to reverse resolve the local IP.
]] ]]
--- ---

View File

@@ -1,7 +1,8 @@
description = [[ description = [[
Checks an IP address against a number of different DNS spam blacklists and returns a list of services where the IP has been blacklisted. Checks target IP addresses against multiple DNS anti-spam and open
Checks may be limited by service category (eg: SPAM, PROXY) or to a specific service name. proxy blacklists and returns a list of services where the IP has been
]] blacklisted. Checks may be limited by service category (eg: SPAM,
PROXY) or to a specific service name. ]]
--- ---
-- @usage -- @usage

View File

@@ -22,7 +22,7 @@ For more information about hadoop, see:
--- ---
author = "john.r.bond@gmail.com" author = "John R. Bond"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -39,7 +39,7 @@ For more information about Hadoop, see:
-- --- -- ---
author = "john.r.bond@gmail.com" author = "John R. Bond"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -39,7 +39,7 @@ For more information about Hadoop, see:
--- ---
author = "john.r.bond@gmail.com" author = "John R. Bond (john.r.bond@gmail.com)"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -35,7 +35,7 @@ For more information about Hadoop, see:
-- |_ Checkpoint Size: 12345678 MB -- |_ Checkpoint Size: 12345678 MB
-- --
author = "john.r.bond@gmail.com" author = "John R. Bond"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -26,7 +26,7 @@ For more information about Hadoop, see:
--- ---
author = "john.r.bond@gmail.com" author = "John R. Bond"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -36,7 +36,7 @@ For more information about Hbase, see:
--- ---
author = "john.r.bond@gmail.com" author = "John R. Bond"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -30,7 +30,7 @@ For more information about Hbase, see:
--- ---
author = "john.r.bond@gmail.com" author = "John R. Bond"
license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified" license = "Simplified (2-clause) BSD license--See http://nmap.org/svn/docs/licenses/BSD-simplified"
categories = {"default", "discovery", "safe"} categories = {"default", "discovery", "safe"}

View File

@@ -1,13 +1,13 @@
description = [[ description = [[
Checks if the target has mod_negotiation is enabled. Checks if the target http server has mod_negotiation enabled. This
feature can be leveraged to find hidden resources and spider a web
site using fewer requests.
The script works by sending requests for resources like index and home The script works by sending requests for resources like index and home
without specifying the extension. If mod_negotiate is enabled (default without specifying the extension. If mod_negotiate is enabled (default
Apache configuration), the target would reply with content-location header Apache configuration), the target would reply with content-location header
containing target resource (such as index.html) and vary header containing containing target resource (such as index.html) and vary header containing
"negotiate" depending on the configuration. "negotiate" depending on the configuration.
This could be leveraged to find hidden resources and spider a web site
using less requests.
For more information, see: For more information, see:
* http://www.wisec.it/sectou.php?id=4698ebdc59d15 * http://www.wisec.it/sectou.php?id=4698ebdc59d15
@@ -27,7 +27,7 @@ For more information, see:
-- @args http-apache-negotiation.root target web site root. -- @args http-apache-negotiation.root target web site root.
-- Defaults to <code>/</code>. -- Defaults to <code>/</code>.
author = "Hani Benhabiles <kroosec@gmail.com>" author = "Hani Benhabiles"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,7 +1,6 @@
description = [[ description = [[
Spiders a website and attempts to identify backup copies of existing files. Spiders a website and attempts to identify backup copies of discovered files.
It does so by requesting a number of different combinations of the filename, It does so by requesting a number of different combinations of the filename (eg. index.bak, index.html~, copy of index.html).
such as eg.: index.bak, index.html~, copy of index.html etc.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Spiders a web site and collects e-mail addresses Spiders a web site and collects e-mail addresses.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Checks whether a JBoss target is vulnerable to jmx console authentication bypass (CVE-2010-0738). Tests whether a JBoss target is vulnerable to jmx console authentication bypass (CVE-2010-0738).
It works by checking if the target paths require authentication or redirect to a login page that could be It works by checking if the target paths require authentication or redirect to a login page that could be
bypassed via a HEAD request. RFC 2616 specifies that the HEAD request should be treated exactly like GET but bypassed via a HEAD request. RFC 2616 specifies that the HEAD request should be treated exactly like GET but
@@ -25,7 +25,7 @@ For more information, see:
-- @args http-method-tamper.path Array of paths to check. Defaults -- @args http-method-tamper.path Array of paths to check. Defaults
-- to <code>{"/jmx-console/"}</code>. -- to <code>{"/jmx-console/"}</code>.
author = "Hani Benhabiles <kroosec@gmail.com>" author = "Hani Benhabiles"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,6 +1,7 @@
description = [[ description = [[
Spiders a website and attempts to identify open redirects. Open redirects are handlers which commonly take a Spiders a website and attempts to identify open redirects. Open
URL as a parameter and responds with a http redirect (3XX) to the target redirects are handlers which commonly take a URL as a parameter and
responds with a http redirect (3XX) to the target.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Uploads a local file to a remote web server using the HTTP PUT method. Uploads a local file to a remote web server using the HTTP PUT method. You must specify the filename and URL path with NSE arguments.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Obtains up to 100 forward DNS names for a target IP address by querying http://www.robtex.com/ip/. Obtains up to 100 forward DNS names for a target IP address by querying the Robtex service (http://www.robtex.com/ip/).
]] ]]
--- ---

View File

@@ -1,9 +1,11 @@
description = [[ description = [[
Spiders a website and attempts to identify and issues with output escaping where content is reflected back to the user. Spiders a website and attempts to identify output escaping problems
This script locates all parameters, ?x=foo&y=bar and checks if the values are reflected on the page. If they where content is reflected back to the user. This script locates all
are indeed reflected, the script will try to insert ghz>hzx"zxc'xcv and check which (if any) characters were parameters, ?x=foo&y=bar and checks if the values are reflected on the
reflected back onto the page without proper html escaping. page. If they are indeed reflected, the script will try to insert
This is an indication of potential XSS issues. ghz>hzx"zxc'xcv and check which (if any) characters were reflected
back onto the page without proper html escaping. This is an
indication of potential XSS vulnerability.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Checks for the CVE-2011-3368 (Reverse Proxy Bypass) vulnerability in Apache HTTP server's reverse proxy mode. Tests for the CVE-2011-3368 (Reverse Proxy Bypass) vulnerability in Apache HTTP server's reverse proxy mode.
The script will run 3 tests: The script will run 3 tests:
o the loopback test, with 3 payloads to handle different rewrite rules o the loopback test, with 3 payloads to handle different rewrite rules
o the internal hosts test. According to Contextis, we expect a delay before a server error. o the internal hosts test. According to Contextis, we expect a delay before a server error.

View File

@@ -1,7 +1,7 @@
description = [[ description = [[
Dumps the password hashes from an MS-SQL server in a format suitable for Dumps the password hashes from an MS-SQL server in a format suitable for
cracking by tools such as John-the-ripper. In order to do so the user cracking by tools such as John-the-ripper. In order to do so the user
needs to have the appropriate privileges. needs to have the appropriate DB privileges.
Credentials passed as script arguments take precedence over credentials Credentials passed as script arguments take precedence over credentials
discovered by other scripts. discovered by other scripts.

View File

@@ -1,5 +1,5 @@
description=[[ description=[[
Performs brute force password auditing against a Nexpose vulnerability scanner using the API 1.1. Performs brute force password auditing against a Nexpose vulnerability scanner using the API 1.1. By default it only tries three guesses per username to avoid target account lockout.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Displays the banner information of an OpenLookup (network key-value store) server. Parses and displays the banner information of an OpenLookup (network key-value store) server.
]] ]]
--- ---

View File

@@ -1,9 +1,5 @@
description = [[ description = [[
Compares the detected service on a port against the expected service Compares the detected service on a port against the expected service for that port number (e.g. ssh on 22, http on 80) and reports deviations. The script requires that a version scan has been run in order to be able to discover what service is actually running on each port.
for that port number (e.g. ssh on 22, http on 80) and reports
deviations. The script requires that a version scan has been run in
order to be able to discover what service is actually running on each
port.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Retrieves some basic information, including protocol version from a Vuze node. Retrieves some basic information, including protocol version from a Vuze filesharing node.
]] ]]
--- ---
@@ -28,6 +28,8 @@ Retrieves some basic information, including protocol version from a Vuze node.
-- --
-- @args vuze-dht-info.allports if set runs this script against every open port -- @args vuze-dht-info.allports if set runs this script against every open port
author = "Patrik Karlsson"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery", "safe"} categories = {"discovery", "safe"}
require 'shortport' require 'shortport'