mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Minor updates to the descriptions of some new scripts
This commit is contained in:
@@ -38,7 +38,7 @@ The script is in the "external" category because it sends target IPs to a third
|
||||
-- <elem key="filename">output_nmap.org</elem>
|
||||
---
|
||||
|
||||
author = {'Paulino Calderon <calderon@websec.mx>'}
|
||||
author = "Paulino Calderon <calderon@websec.mx>"
|
||||
|
||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Attempts to exploit an authentication bypass vulnerability in Adobe Coldfusion servers (APSA13-01:http://www.adobe.com/support/security/advisories/apsa13-01.html) to retrieve a valid administrator's session cookie.
|
||||
Attempts to exploit an authentication bypass vulnerability in Adobe Coldfusion servers (APSA13-01: http://www.adobe.com/support/security/advisories/apsa13-01.html) to retrieve a valid administrator's session cookie.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Attempts to retrieve version, absolute path of administration panel and the file 'password.properties' in vulnerable installations of ColdFusion 9 and 10.
|
||||
Attempts to retrieve version, absolute path of administration panel and the file 'password.properties' from vulnerable installations of ColdFusion 9 and 10.
|
||||
|
||||
This was based on the exploit 'ColdSub-Zero.pyFusion v2'.
|
||||
]]
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Extracts and outputs HTML/JS comments from HTTP responses.
|
||||
Extracts and outputs HTML and JavaScript comments from HTTP responses.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -4,7 +4,7 @@ local http = require "http"
|
||||
local vulns = require "vulns"
|
||||
|
||||
description = [[
|
||||
Exploits a directory traversal vulnerability in phpMyAdmin 2.6.4-pl1 to retrieve remote files on the web server. Other phpmyadmin versions might be vulnerable.
|
||||
Exploits a directory traversal vulnerability in phpMyAdmin 2.6.4-pl1 (and possibly other versions) to retrieve remote files on the web server.
|
||||
|
||||
Reference:
|
||||
* http://www.exploit-db.com/exploits/1244/
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
description = [[
|
||||
This script will POST specially crafted strings to every form it
|
||||
encounters and then it will search through the website for those
|
||||
strings to check if the payloads were succesful.
|
||||
Posts specially crafted strings to every form it
|
||||
encounters and then searches through the website for those
|
||||
strings to determine whether the payloads were succesful.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -6,10 +6,9 @@ local ike = require "ike"
|
||||
|
||||
|
||||
description=[[
|
||||
Get information from an IKE service.
|
||||
Tests the service with both Main and Aggressive Mode.
|
||||
Sends multiple transforms in a single request, so currently,
|
||||
only four packets are sent to the host.
|
||||
|
||||
Obtains information (such as vendor and device type where available) from an IKE service by sending four packets to the host. This scripts tests with both Main and Aggressive Mode and sends multiple transforms per request.
|
||||
|
||||
]]
|
||||
|
||||
|
||||
|
||||
@@ -10,15 +10,14 @@ local string = require "string"
|
||||
local openssl = stdnse.silent_require "openssl"
|
||||
|
||||
description = [[
|
||||
Performs valid user enumeration against MySQL server.
|
||||
Performs valid-user enumeration against MySQL server using a bug
|
||||
discovered and published by Kingcope
|
||||
(http://seclists.org/fulldisclosure/2012/Dec/9).
|
||||
|
||||
Server version 5.x are succeptible to an user enumeration
|
||||
attack due to different messages during login when using
|
||||
old authentication mechanism from versions 4.x and earlier.
|
||||
|
||||
Original bug discovered and published by Kingcope:
|
||||
http://seclists.org/fulldisclosure/2012/Dec/9
|
||||
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -5,7 +5,7 @@ local bin = require "bin"
|
||||
local stdnse = require "stdnse"
|
||||
|
||||
description = [[
|
||||
Detects the TeamSpeak 2 server UDP voice communication service.
|
||||
Detects the TeamSpeak 2 voice communication server and attempts to determine version and configuration information.
|
||||
|
||||
A single UDP packet (a login request) is sent. If the server does not have a
|
||||
password set, the exact version, name, and OS type will also be reported on.
|
||||
|
||||
@@ -9,8 +9,9 @@ local shortport = require "shortport"
|
||||
|
||||
description = [[
|
||||
Detects the Ventrilo voice communication server service versions 2.1.2
|
||||
and above. Some of the older versions (pre 3.0.0) may not have the UDP
|
||||
service this probe relies on enabled by default.
|
||||
and above and tries to determine version and configuration
|
||||
information. Some of the older versions (pre 3.0.0) may not have the
|
||||
UDP service that this probe relies on enabled by default.
|
||||
|
||||
The Ventrilo server listens on a TCP (voice/control) and an UDP (ping/status)
|
||||
port with the same port number (fixed to 3784 in the free version, otherwise
|
||||
|
||||
Reference in New Issue
Block a user