1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 06:01:28 +00:00

Improve some NSEDoc descriptions

This commit is contained in:
fyodor
2011-09-11 20:44:07 +00:00
parent bff90f3d55
commit a5d81c3b35
10 changed files with 15 additions and 16 deletions

View File

@@ -1,5 +1,5 @@
description = [[
Shows extra information about IP addresses.
Shows extra information about IPv6 addresses, such as embedded MAC or IPv4 addresses when applicable.
Some IP address formats encode extra information; for example some IPv4
addresses encode an IPv4 address or MAC address. This script can decode

View File

@@ -1,9 +1,10 @@
description = [[
Discovers bittorrent peers and nodes using the Bittorrent and DHT protocol when
supplied with a valid torrent file or a magnet link. The peers implement the
Bittorrent protocol and share the torrent, whereas the nodes implement the DHT
protocol and are used to track the peers. The sets of peers and nodes are not
the same, but they usually intersect.
Discovers bittorrent peers sharing a file based on a user-supplied
torrent file or magnet link. Peers implement the Bittorrent protocol
and share the torrent, whereas the nodes (only shown if the
include-nodes NSE argument is given) implement the DHT protocol and
are used to track the peers. The sets of peers and nodes are not the
same, but they usually intersect.
If the <code>newtargets</code> script-arg is supplied it adds the discovered
peers as targets.

View File

@@ -1,5 +1,5 @@
description = [[
The script sniffs the network for incoming broadcast communication and
Sniffs the network for incoming broadcast communication and
attempts to decode the received packets. It supports protocols like CDP, HSRP,
Spotify, DropBox, DHCP, ARP and a few more. See packetdecoders.lua for more
information.

View File

@@ -1,5 +1,5 @@
description = [[
Tries to get FTP login credentials by guessing usernames and passwords.
Performs brute force password auditing against FTP servers.
This uses the standard unpwdb username/password list. However, in tests FTP servers are
significantly slower than other servers when responding, so the number of usernames/passwords

View File

@@ -1,5 +1,5 @@
description = [[
http-awstatstotals-exec exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it. [CVE: 2008-3922]
Exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it (CVE: 2008-3922).
This vulnerability can be exploited through the GET variable sort. The script queries the web server with the command payload encoded using PHP's chr() function:
<code>?sort={%24{passthru%28chr(117).chr(110).chr(97).chr(109).chr(101).chr(32).chr(45).chr(97)%29}}{%24{exit%28%29}}</code>

View File

@@ -1,5 +1,5 @@
description = [[
Performs a brute force password attack against Joomla installations.
Performs brute force password auditing against Joomla web CMS installations.
This script initially reads the session cookie and parses the security token to perfom the brute force password auditing.
It uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are stored using the

View File

@@ -1,6 +1,5 @@
description = [[
This script will check for a denial of service vulnerability that has been
found in the way the multiple overlapping/simple ranges are handled.
Detects a denial of service vulnerability in the way the Apache web server handles requests for multiple overlapping/simple ranges of a page.
References:
* http://seclists.org/fulldisclosure/2011/Aug/175

View File

@@ -1,5 +1,5 @@
description = [[
Determines if a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.
Attempts to determine whether a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.
To do this the script will send a "good" request and record the response, afterwards it will match this response against new requests containing
malicious payloads. In theory, web applications shouldn't react to malicious requests because we are storing the payloads in a variable that is

View File

@@ -1,5 +1,5 @@
description = [[
Performs a brute force password attack against Wordpress installations.
performs brute force password auditing against Wordpress CMS/blog installations.
This script uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are
stored using the credentials library.

View File

@@ -1,6 +1,5 @@
description = [[
http-wp-enum enumerates usernames in Wordpress installations by exploiting an information disclosure vulnerability
existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
Enumerates usernames in Wordpress blog/CMS installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
Original advisory:
* http://www.talsoft.com.ar/index.php/research/security-advisories/wordpress-user-id-and-user-name-disclosure