mirror of
https://github.com/nmap/nmap.git
synced 2025-12-15 20:29:03 +00:00
Made some minor wording updates to script descriptions
This commit is contained in:
@@ -1,9 +1,9 @@
|
||||
description = [[
|
||||
Retrieves information from a listening acarsd daemon.
|
||||
acarsd is an ACARS decoder for a Linux or Windows PC which attempts to decode
|
||||
ACARS transmissions in real-time. The information retrieved includes the
|
||||
daemon version, API version, administrator e-mail address and listening
|
||||
frequency.
|
||||
Retrieves information from a listening acarsd daemon. Acarsd decodes
|
||||
ACARS (Aircraft Communication Addressing and Reporting System) data in
|
||||
real time. The information retrieved by this script includes the
|
||||
daemon version, API version, administrator e-mail address and
|
||||
listening frequency.
|
||||
|
||||
For more information about acarsd, see:
|
||||
* http://www.acarsd.org/
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Produces a list of prefixes for a given ASN.
|
||||
Produces a list of IP prefixes for a given AS number (ASN).
|
||||
|
||||
This script uses a whois server database operated by the Shadowserver
|
||||
Foundation. We thank them for granting us permission to use this in
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Discovers the server for EMC Networker backup software on the LAN by
|
||||
Discovers the EMC Networker backup software server on a LAN by
|
||||
using network broadcasts.
|
||||
]]
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Discovers Versant object databases using the srvloc protocol
|
||||
Discovers Versant object databases using the srvloc protocol.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
description = [[
|
||||
Performs a domain lookup using the edns-client-subnet [1] option that adds
|
||||
support for adding subnet information to the query in regards to where the
|
||||
query is originating from. The script uses this option to supply a number of
|
||||
Performs a domain lookup using the edns-client-subnet option that adds
|
||||
support for adding subnet information to the query describing where the
|
||||
query is originating. The script uses this option to supply a number of
|
||||
geographically distributed locations in an attempt to enumerate as many
|
||||
different address records as possible. The script also supports requests using
|
||||
a given subnet.
|
||||
|
||||
[1]http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
||||
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
description = [[
|
||||
Retrieves information from a DNS nameserver by requesting
|
||||
its nameserver ID (nsid), and asking for its id.server and
|
||||
version.bind. This script performs the same queries as the following
|
||||
its nameserver ID (nsid) and asking for its id.server and
|
||||
version.bind values. This script performs the same queries as the following
|
||||
two dig commands:
|
||||
- dig CH TXT bind.version @target
|
||||
- dig +nsid CH TXT id.server @target
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
description = [[
|
||||
This script will execute a directory traversal attack against a ColdFusion
|
||||
server and try to grab the password hash for the administrator user. It
|
||||
will then use the salt value (hidden in the web page) to create the SHA1
|
||||
Executes a directory traversal attack against a ColdFusion
|
||||
server and tries to grab the password hash for the administrator user. It
|
||||
then uses the salt value (hidden in the web page) to create the SHA1
|
||||
HMAC hash that the web server needs for authentication as admin. You can
|
||||
pass this value to the ColdFusion server as the admin without cracking
|
||||
the password hash.
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
description = [[
|
||||
Retrieves information from the CouchBase Web Administration port.
|
||||
The information retrieved by this script does not require any credentials.
|
||||
Retrieves information (hostname, OS, uptime, etc.) from the CouchBase
|
||||
Web Administration port. The information retrieved by this script
|
||||
does not require any credentials.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
description = [[
|
||||
Retrieves information from distributed memory object caching system memcached.
|
||||
Retrieves information (including system architecture, process ID, and
|
||||
server time) from distributed memory object caching system memcached.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs brute force password guessing against the MongoDB database.
|
||||
Performs brute force password auditing against the MongoDB database.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs brute force password guessing against the WinPcap Remote Capture
|
||||
Performs brute force password auditing against the WinPcap Remote Capture
|
||||
Daemon (rpcap).
|
||||
]]
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
description = [[
|
||||
Connect to the rpcap service, a service providing remote sniffing capabilities
|
||||
through WinPcap, and retrieves interface information. The service can either be
|
||||
Connects to the rpcap service (provides remote sniffing capabilities
|
||||
through WinPcap) and retrieves interface information. The service can either be
|
||||
setup to require authentication or not and also supports IP restrictions.
|
||||
]]
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs brute force password auditing against rsync.
|
||||
Performs brute force password auditing against the rsync remote file syncing protocol.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
List modules available for rsync synchronization
|
||||
Lists modules available for rsync (remote file sync) synchronization.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,7 +1,8 @@
|
||||
description = [[
|
||||
Determines the supported authentication mechanisms of a remote SOCKS server.
|
||||
Starting with SOCKS version 5 socks servers may support authentication.
|
||||
The script checks for the following authentication types:
|
||||
Determines the supported authentication mechanisms of a remote SOCKS
|
||||
proxy server. Starting with SOCKS version 5 socks servers may support
|
||||
authentication. The script checks for the following authentication
|
||||
types:
|
||||
0 - No authentication
|
||||
1 - GSSAPI
|
||||
2 - Username and password
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs brute force password auditing against SOCKS 5 servers.
|
||||
Performs brute force password auditing against SOCKS 5 proxy servers.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
Reference in New Issue
Block a user