mirror of
https://github.com/nmap/nmap.git
synced 2025-12-09 14:11:29 +00:00
Improve some NSEDoc descriptions
This commit is contained in:
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Shows extra information about IP addresses.
|
Shows extra information about IPv6 addresses, such as embedded MAC or IPv4 addresses when applicable.
|
||||||
|
|
||||||
Some IP address formats encode extra information; for example some IPv4
|
Some IP address formats encode extra information; for example some IPv4
|
||||||
addresses encode an IPv4 address or MAC address. This script can decode
|
addresses encode an IPv4 address or MAC address. This script can decode
|
||||||
|
|||||||
@@ -1,9 +1,10 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Discovers bittorrent peers and nodes using the Bittorrent and DHT protocol when
|
Discovers bittorrent peers sharing a file based on a user-supplied
|
||||||
supplied with a valid torrent file or a magnet link. The peers implement the
|
torrent file or magnet link. Peers implement the Bittorrent protocol
|
||||||
Bittorrent protocol and share the torrent, whereas the nodes implement the DHT
|
and share the torrent, whereas the nodes (only shown if the
|
||||||
protocol and are used to track the peers. The sets of peers and nodes are not
|
include-nodes NSE argument is given) implement the DHT protocol and
|
||||||
the same, but they usually intersect.
|
are used to track the peers. The sets of peers and nodes are not the
|
||||||
|
same, but they usually intersect.
|
||||||
|
|
||||||
If the <code>newtargets</code> script-arg is supplied it adds the discovered
|
If the <code>newtargets</code> script-arg is supplied it adds the discovered
|
||||||
peers as targets.
|
peers as targets.
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
The script sniffs the network for incoming broadcast communication and
|
Sniffs the network for incoming broadcast communication and
|
||||||
attempts to decode the received packets. It supports protocols like CDP, HSRP,
|
attempts to decode the received packets. It supports protocols like CDP, HSRP,
|
||||||
Spotify, DropBox, DHCP, ARP and a few more. See packetdecoders.lua for more
|
Spotify, DropBox, DHCP, ARP and a few more. See packetdecoders.lua for more
|
||||||
information.
|
information.
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Tries to get FTP login credentials by guessing usernames and passwords.
|
Performs brute force password auditing against FTP servers.
|
||||||
|
|
||||||
This uses the standard unpwdb username/password list. However, in tests FTP servers are
|
This uses the standard unpwdb username/password list. However, in tests FTP servers are
|
||||||
significantly slower than other servers when responding, so the number of usernames/passwords
|
significantly slower than other servers when responding, so the number of usernames/passwords
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
http-awstatstotals-exec exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it. [CVE: 2008-3922]
|
Exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it (CVE: 2008-3922).
|
||||||
|
|
||||||
This vulnerability can be exploited through the GET variable sort. The script queries the web server with the command payload encoded using PHP's chr() function:
|
This vulnerability can be exploited through the GET variable sort. The script queries the web server with the command payload encoded using PHP's chr() function:
|
||||||
<code>?sort={%24{passthru%28chr(117).chr(110).chr(97).chr(109).chr(101).chr(32).chr(45).chr(97)%29}}{%24{exit%28%29}}</code>
|
<code>?sort={%24{passthru%28chr(117).chr(110).chr(97).chr(109).chr(101).chr(32).chr(45).chr(97)%29}}{%24{exit%28%29}}</code>
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs a brute force password attack against Joomla installations.
|
Performs brute force password auditing against Joomla web CMS installations.
|
||||||
|
|
||||||
This script initially reads the session cookie and parses the security token to perfom the brute force password auditing.
|
This script initially reads the session cookie and parses the security token to perfom the brute force password auditing.
|
||||||
It uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are stored using the
|
It uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are stored using the
|
||||||
|
|||||||
@@ -1,6 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
This script will check for a denial of service vulnerability that has been
|
Detects a denial of service vulnerability in the way the Apache web server handles requests for multiple overlapping/simple ranges of a page.
|
||||||
found in the way the multiple overlapping/simple ranges are handled.
|
|
||||||
|
|
||||||
References:
|
References:
|
||||||
* http://seclists.org/fulldisclosure/2011/Aug/175
|
* http://seclists.org/fulldisclosure/2011/Aug/175
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Determines if a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.
|
Attempts to determine whether a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.
|
||||||
|
|
||||||
To do this the script will send a "good" request and record the response, afterwards it will match this response against new requests containing
|
To do this the script will send a "good" request and record the response, afterwards it will match this response against new requests containing
|
||||||
malicious payloads. In theory, web applications shouldn't react to malicious requests because we are storing the payloads in a variable that is
|
malicious payloads. In theory, web applications shouldn't react to malicious requests because we are storing the payloads in a variable that is
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs a brute force password attack against Wordpress installations.
|
performs brute force password auditing against Wordpress CMS/blog installations.
|
||||||
|
|
||||||
This script uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are
|
This script uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are
|
||||||
stored using the credentials library.
|
stored using the credentials library.
|
||||||
|
|||||||
@@ -1,6 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
http-wp-enum enumerates usernames in Wordpress installations by exploiting an information disclosure vulnerability
|
Enumerates usernames in Wordpress blog/CMS installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
|
||||||
existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
|
|
||||||
|
|
||||||
Original advisory:
|
Original advisory:
|
||||||
* http://www.talsoft.com.ar/index.php/research/security-advisories/wordpress-user-id-and-user-name-disclosure
|
* http://www.talsoft.com.ar/index.php/research/security-advisories/wordpress-user-id-and-user-name-disclosure
|
||||||
|
|||||||
Reference in New Issue
Block a user