mirror of
https://github.com/nmap/nmap.git
synced 2025-12-15 20:29:03 +00:00
Made some minor wording updates to script descriptions
This commit is contained in:
@@ -1,9 +1,9 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Retrieves information from a listening acarsd daemon.
|
Retrieves information from a listening acarsd daemon. Acarsd decodes
|
||||||
acarsd is an ACARS decoder for a Linux or Windows PC which attempts to decode
|
ACARS (Aircraft Communication Addressing and Reporting System) data in
|
||||||
ACARS transmissions in real-time. The information retrieved includes the
|
real time. The information retrieved by this script includes the
|
||||||
daemon version, API version, administrator e-mail address and listening
|
daemon version, API version, administrator e-mail address and
|
||||||
frequency.
|
listening frequency.
|
||||||
|
|
||||||
For more information about acarsd, see:
|
For more information about acarsd, see:
|
||||||
* http://www.acarsd.org/
|
* http://www.acarsd.org/
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Produces a list of prefixes for a given ASN.
|
Produces a list of IP prefixes for a given AS number (ASN).
|
||||||
|
|
||||||
This script uses a whois server database operated by the Shadowserver
|
This script uses a whois server database operated by the Shadowserver
|
||||||
Foundation. We thank them for granting us permission to use this in
|
Foundation. We thank them for granting us permission to use this in
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Discovers the server for EMC Networker backup software on the LAN by
|
Discovers the EMC Networker backup software server on a LAN by
|
||||||
using network broadcasts.
|
using network broadcasts.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Discovers Versant object databases using the srvloc protocol
|
Discovers Versant object databases using the srvloc protocol.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,12 +1,12 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs a domain lookup using the edns-client-subnet [1] option that adds
|
Performs a domain lookup using the edns-client-subnet option that adds
|
||||||
support for adding subnet information to the query in regards to where the
|
support for adding subnet information to the query describing where the
|
||||||
query is originating from. The script uses this option to supply a number of
|
query is originating. The script uses this option to supply a number of
|
||||||
geographically distributed locations in an attempt to enumerate as many
|
geographically distributed locations in an attempt to enumerate as many
|
||||||
different address records as possible. The script also supports requests using
|
different address records as possible. The script also supports requests using
|
||||||
a given subnet.
|
a given subnet.
|
||||||
|
|
||||||
[1]http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Retrieves information from a DNS nameserver by requesting
|
Retrieves information from a DNS nameserver by requesting
|
||||||
its nameserver ID (nsid), and asking for its id.server and
|
its nameserver ID (nsid) and asking for its id.server and
|
||||||
version.bind. This script performs the same queries as the following
|
version.bind values. This script performs the same queries as the following
|
||||||
two dig commands:
|
two dig commands:
|
||||||
- dig CH TXT bind.version @target
|
- dig CH TXT bind.version @target
|
||||||
- dig +nsid CH TXT id.server @target
|
- dig +nsid CH TXT id.server @target
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
This script will execute a directory traversal attack against a ColdFusion
|
Executes a directory traversal attack against a ColdFusion
|
||||||
server and try to grab the password hash for the administrator user. It
|
server and tries to grab the password hash for the administrator user. It
|
||||||
will then use the salt value (hidden in the web page) to create the SHA1
|
then uses the salt value (hidden in the web page) to create the SHA1
|
||||||
HMAC hash that the web server needs for authentication as admin. You can
|
HMAC hash that the web server needs for authentication as admin. You can
|
||||||
pass this value to the ColdFusion server as the admin without cracking
|
pass this value to the ColdFusion server as the admin without cracking
|
||||||
the password hash.
|
the password hash.
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Retrieves information from the CouchBase Web Administration port.
|
Retrieves information (hostname, OS, uptime, etc.) from the CouchBase
|
||||||
The information retrieved by this script does not require any credentials.
|
Web Administration port. The information retrieved by this script
|
||||||
|
does not require any credentials.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Retrieves information from distributed memory object caching system memcached.
|
Retrieves information (including system architecture, process ID, and
|
||||||
|
server time) from distributed memory object caching system memcached.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs brute force password guessing against the MongoDB database.
|
Performs brute force password auditing against the MongoDB database.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs brute force password guessing against the WinPcap Remote Capture
|
Performs brute force password auditing against the WinPcap Remote Capture
|
||||||
Daemon (rpcap).
|
Daemon (rpcap).
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Connect to the rpcap service, a service providing remote sniffing capabilities
|
Connects to the rpcap service (provides remote sniffing capabilities
|
||||||
through WinPcap, and retrieves interface information. The service can either be
|
through WinPcap) and retrieves interface information. The service can either be
|
||||||
setup to require authentication or not and also supports IP restrictions.
|
setup to require authentication or not and also supports IP restrictions.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs brute force password auditing against rsync.
|
Performs brute force password auditing against the rsync remote file syncing protocol.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
List modules available for rsync synchronization
|
Lists modules available for rsync (remote file sync) synchronization.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,7 +1,8 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Determines the supported authentication mechanisms of a remote SOCKS server.
|
Determines the supported authentication mechanisms of a remote SOCKS
|
||||||
Starting with SOCKS version 5 socks servers may support authentication.
|
proxy server. Starting with SOCKS version 5 socks servers may support
|
||||||
The script checks for the following authentication types:
|
authentication. The script checks for the following authentication
|
||||||
|
types:
|
||||||
0 - No authentication
|
0 - No authentication
|
||||||
1 - GSSAPI
|
1 - GSSAPI
|
||||||
2 - Username and password
|
2 - Username and password
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Performs brute force password auditing against SOCKS 5 servers.
|
Performs brute force password auditing against SOCKS 5 proxy servers.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
Reference in New Issue
Block a user