1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-12 02:39:03 +00:00

Did some NSEDoc cleanup on many of the 45 NSE scripts which are new since the 5.35DC1 Nmap release. Emphasis was on the first paragraph of the description, since that is shown on the front page of http://nmap.org/nsedoc and I'm planning to use that description verbatim (except for removing tags like <code>) for the CHANGELOG

This commit is contained in:
fyodor
2011-01-14 10:20:51 +00:00
parent ed12841d70
commit a84c2e4498
39 changed files with 69 additions and 78 deletions

View File

@@ -2,7 +2,6 @@ description = [[
Discovers Microsoft SQL servers in the same broadcast domain. Discovers Microsoft SQL servers in the same broadcast domain.
]] ]]
-- --
-- Version 0.1 -- Version 0.1
-- Created 07/12/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net> -- Created 07/12/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Attempts to extract system information from the UPnP service by running a multicast query. Attempts to extract system information from the UPnP service by sending a multicast query, then collecting, parsing, and displaying all responses.
]] ]]
--- ---

View File

@@ -1,7 +1,8 @@
description = [[ description = [[
Discovers devices supporting the Web Services Dynamic Discovery (WS-Discovery) Uses a multicast query to discover devices supporting the Web Services
protocol. It also attempts to locate any published Windows Communication Dynamic Discovery (WS-Discovery) protocol. It also attempts to locate
Framework (WCF) web services (.NET 4.0 or later). any published Windows Communication Framework (WCF) web services (.NET
4.0 or later).
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Attempts to discover DB2 servers on the network using UDP. Attempts to discover DB2 servers on the network by querying open ibm-db2 UDP ports (normally port 523).
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against the Lotus Domino Console Performs brute force password auditing against the Lotus Domino Console.
]] ]]
--- ---
@@ -18,8 +18,6 @@ Performs password guessing against the Lotus Domino Console
-- x The Driver class contains the driver implementation used by the brute -- x The Driver class contains the driver implementation used by the brute
-- library -- library
-- --
--
-- --
-- Version 0.1 -- Version 0.1
-- Created 07/12/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net> -- Created 07/12/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Runs a console command on the Lotus Domino Console Runs a console command on the Lotus Domino Console using the given authentication credentials (see also: domcon-brute)
]] ]]
--- ---

View File

@@ -1,6 +1,5 @@
description = [[ description = [[
A script that attempts to discover valid IBM Lotus Domino users and download Attempts to discover valid IBM Lotus Domino users and download their ID files by exploiting the CVE-2006-5835 vulnerability.
their ID files. (CVE-2006-5835)
]] ]]
--- ---

View File

@@ -1,6 +1,6 @@
description = [[ description = [[
Try to discover firewall rules with an IP TTL expiration technique known Tries to discover firewall rules using an IP TTL expiration technique known
as "firewalking". as firewalking.
The scan requires a firewall (or "gateway") and a metric (or "target"). The scan requires a firewall (or "gateway") and a metric (or "target").
For each filtered port on the target, send a probe with an IP TTL one greater For each filtered port on the target, send a probe with an IP TTL one greater

View File

@@ -2,11 +2,7 @@
-- vim: set filetype=lua : -- vim: set filetype=lua :
description = [[ description = [[
This script tests ProFTPD 1.3.3c for the presence of the backdoor which was Tests for the presence of the ProFTPD 1.3.3c backdoor reported as OSVDB-ID 69562. This script attempts to exploit the backdoor using the innocuous <code>id</code> command by default, but that can be changed with the <code>ftp-proftpd-backdoor.cmd</code> script argument.
reported as OSVDB-ID 69562.
It allows the remote execution of commands in a root shell. The command that is
executed by default is <code>id</code>, but that can be changed via script-args.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Queries the CORBA naming server for a list of objects Queries a CORBA naming server for a list of objects.
]] ]]
author = "Patrik Karlsson" author = "Patrik Karlsson"

View File

@@ -1,10 +1,7 @@
description = [[ description = [[
Tries to find hostnames that resolve to the target's IP address. Tries to find hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html.
The script works by querying the online database at The script is in the "external" category because it sends target IPs to a third party in order to query their database.
http://www.bfk.de/bfk_dnslogger.html. It is in the "external" category
because of this. Be aware that this script could expose the targets of a
scan to a third party.
]] ]]
--- ---
@@ -34,7 +31,7 @@ scan to a third party.
-- | www.sectools.org -- | www.sectools.org
-- |_seclists.org -- |_seclists.org
author = "Ange Gutek <ange.gutek@gmail.com>" author = "Ange Gutek"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html" license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against http basic authentication Performs brute force password auditing against http basic authentication.
]] ]]
--- ---

View File

@@ -1,6 +1,7 @@
description = [[ description = [[
Attempts to enumerate the hashed Domino Internet Passwords, that by default are accessible to all authenticated users. Attempts to enumerate the hashed Domino Internet Passwords that are
The script can also download any Domino ID Files attached to the Person document. accessible by all authenticated users by default. This script can also
download any Domino ID Files attached to the Person document.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against http form-based authentication Performs brute force password auditing against http form-based authentication.
]] ]]
--- ---

View File

@@ -1,8 +1,8 @@
description = [[ description = [[
Searches for web virtual hostnames. Searches for web virtual hostnames by making a large number of HEAD requests against http servers using common hostnames.
Makes a number of HEAD requests to the same server, providing a different Each HEAD request provides a different
<code>Host</code> header each time. The hostnames come from a built-in default <code>Host</code> header. The hostnames come from a built-in default
list. Shows the names that return a document. Also shows the location of list. Shows the names that return a document. Also shows the location of
redirections. redirections.

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against Informix Dynamic Server Performs brute force password auditing against IBM Informix Dynamic Server.
]] ]]
--- ---

View File

@@ -1,5 +1,6 @@
description = [[ description = [[
Runs a query against IBM Informix Dynamic Server. Runs a query against IBM Informix Dynamic Server using the given
authentication credentials (see also: informix-brute).
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Retrieves a list of tables and column definition for each Informix database Retrieves a list of tables and column definitions for each database on an Informix server.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against iSCSI targets Performs brute force password auditing against iSCSI targets.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Retrieves information from the remote iSCSI target. Collects and displays information from remote iSCSI targets.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Enumerates Modbus slave ids (sids) and gets their device information. Enumerates SCADA Modbus slave ids (sids) and gets their device information.
Modbus is one of the popular SCADA protocols. This script does Modbus device Modbus is one of the popular SCADA protocols. This script does Modbus device
information disclosure. It tries to find legal sids (slave ids) of Modbus information disclosure. It tries to find legal sids (slave ids) of Modbus

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Queries the NAT-PMP service for the external address Queries a NAT-PMP service for its external address.
]] ]]
--- ---

View File

@@ -1,6 +1,6 @@
description = [[ description = [[
Checks if a NetBus server is vulnerable to authentication bypass. Checks if a NetBus server is vulnerable to an authentication bypass
Servers with this vulnerability can be accessed without knowing vulnerability which allows them to be fully accessed without knowing
the password. the password.
For example a server running on TCP port 12345 on localhost with For example a server running on TCP port 12345 on localhost with

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Tries to retrieve NetBus password by guessing. Performs brute force password auditing about the Netbus backdoor ("remote administration") service.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Extends version detection to cover NetBuster, a honeypot service Extends version detection to detect NetBuster, a honeypot service
that mimes NetBus. that mimes NetBus.
]] ]]

View File

@@ -2,10 +2,9 @@
-- vim: set filetype=lua : -- vim: set filetype=lua :
description = [[ description = [[
Queries Nagios Remote Plugin Executor daemons. Queries Nagios Remote Plugin Executor (NRPE) daemons to obtain information such as load averages, process counts, logged in user information, etc.
Nagios plugins can be remotely queried without authentication through the NRPE This script attempts to execute the stock list of commands that are
daemon. This script attempts to execute the stock list of commands that are
enabled. User-supplied arguments are not supported. enabled. User-supplied arguments are not supported.
]] ]]

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against Oracle Performs brute force password auditing against Oracle servers.
]] ]]
--- ---

View File

@@ -1,9 +1,6 @@
description = [[ description = [[
Attempts to determine valid Oracle user names against unpatched Oracle 11g Attempts to enumerate valid Oracle user names against Oracle 11g
servers. servers (this bug was fixed in Oracle's October 2009 Critical Patch Update).
This script does only work against Oracle 11g pre October 2009 Critical Patch
Update (CPU).
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs simple Path MTU Discovery to the target host. Performs simple Path MTU Discovery to target hosts.
TCP or UDP packets are sent to the host with the DF (don't fragment) bit TCP or UDP packets are sent to the host with the DF (don't fragment) bit
set and with varying amounts of data. If an ICMP Fragmentation Needed set and with varying amounts of data. If an ICMP Fragmentation Needed

View File

@@ -1,6 +1,8 @@
description = [[ description = [[
Resolves hostnames and adds every address (IPv4 or IPv6, depending) to Nmap's Resolves hostnames and adds every address (IPv4 or IPv6, depending on
target list. Nmap itself resolves a host but only scans the first address. Nmap mode) to Nmap's target list. This differs from Nmap's normal
host resolution process, which only scans the first address (A or AAAA
record) returned for each host name.
]] ]]
--- ---

View File

@@ -1,14 +1,16 @@
description = [[ description = [[
This script connects to a remote RMI registry and attempts to dump all Connects to a remote RMI registry and attempts to dump all its objects.
its objects.
First it tries to First it tries to determine the names of all objects bound in the
determine the names of all objects bound in the registry, and then it tries to determine information about the objects, registry, and then it tries to determine information about the
such as the the class names of the superclasses and interfaces. This may, depending on what the registry is used for, give objects, such as the the class names of the superclasses and
valuable information about the service. E.g, if the app uses JMX (Java Management eXtensions), you should see an object interfaces. This may, depending on what the registry is used for, give
called "jmxconnector" on it. valuable information about the service. E.g, if the app uses JMX (Java
Management eXtensions), you should see an object called "jmxconnector"
on it.
It also gives information about where the objects are located, (marked with @<ip>:port in the output). It also gives information about where the objects are located, (marked
with @<ip>:port in the output).
Some apps give away the classpath, which this scripts catches in so-called "Custom data". Some apps give away the classpath, which this scripts catches in so-called "Custom data".
]] ]]

View File

@@ -1,7 +1,7 @@
description = [[ description = [[
Exhaust the limit of SMB connections on a remote server by opening as many as we can. Exhausts the limit of SMB connections on a remote server by opening as many as we can.
Most implementations of SMB have a hard global limit of 11 connections for user accounts Most implementations of SMB have a hard global limit of 11 connections for user accounts
and 10 connections for anonymous. Once that limit is exhausted, further connections and 10 connections for anonymous. Once that limit is reached, further connections
are denied. This exploits that limit by taking up all the connections and holding them. are denied. This exploits that limit by taking up all the connections and holding them.
This works better with a valid user account, because Windows reserves one slot for valid This works better with a valid user account, because Windows reserves one slot for valid

View File

@@ -2,7 +2,7 @@
-- vim: set filetype=lua : -- vim: set filetype=lua :
description = [[ description = [[
This script detects whether a host is infected with the Stuxnet worm. Detects whether a host is infected with the Stuxnet worm (http://en.wikipedia.org/wiki/Stuxnet).
An executable version of the Stuxnet infection will be downloaded if a format An executable version of the Stuxnet infection will be downloaded if a format
for the filename is given on the command line. for the filename is given on the command line.

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against Subversion Performs brute force password auditing against Subversion source code control servers.
]] ]]
--- ---

View File

@@ -1,8 +1,5 @@
description = [[ description = [[
Inserts traceroute hops into the Nmap scanning queue. Inserts traceroute hops into the Nmap scanning queue. It only functions if Nmap's <code>--traceroute</code> option is used and the <code>newtargets</code> script argument is given.
The script needs Nmap <code>traceroute</code> option, and will
only run if the script argument <code>newtargets</code> is given.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against VNC Performs brute force password auditing against VNC servers.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Queries a VNC server for the supported security types Queries a VNC server for the protocol version and supported security types.
]] ]]
author = "Patrik Karlsson" author = "Patrik Karlsson"

View File

@@ -1,5 +1,6 @@
description = [[ description = [[
Gathers information from a Wind DeBug Agent on VxWorks Detects vulnerabilities and gathers information (such as version
numbers and hardware support) from a VxWorks Wind DeBug Agent.
Wind DeBug is a SunRPC-type service that is enabled by default on many devices Wind DeBug is a SunRPC-type service that is enabled by default on many devices
that use the popular VxWorks real-time embedded operating system. H.D. Moore that use the popular VxWorks real-time embedded operating system. H.D. Moore

View File

@@ -1,7 +1,8 @@
description = [[ description = [[
Discovers devices supporting the Web Services Dynamic Discovery (WS-Discovery) Retrieves and displays information from devices supporting the Web
protocol. It also attempts to locate any published Windows Communication Services Dynamic Discovery (WS-Discovery) protocol. It also attempts
Framework (WCF) web services (.NET 4.0 or later). to locate any published Windows Communication Framework (WCF) web
services (.NET 4.0 or later).
]] ]]
--- ---