1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-15 20:29:03 +00:00

Made some minor wording updates to script descriptions

This commit is contained in:
fyodor
2012-03-08 20:59:06 +00:00
parent 1f43eed01b
commit aa9e024d88
16 changed files with 33 additions and 30 deletions

View File

@@ -1,9 +1,9 @@
description = [[
Retrieves information from a listening acarsd daemon.
acarsd is an ACARS decoder for a Linux or Windows PC which attempts to decode
ACARS transmissions in real-time. The information retrieved includes the
daemon version, API version, administrator e-mail address and listening
frequency.
Retrieves information from a listening acarsd daemon. Acarsd decodes
ACARS (Aircraft Communication Addressing and Reporting System) data in
real time. The information retrieved by this script includes the
daemon version, API version, administrator e-mail address and
listening frequency.
For more information about acarsd, see:
* http://www.acarsd.org/

View File

@@ -1,5 +1,5 @@
description = [[
Produces a list of prefixes for a given ASN.
Produces a list of IP prefixes for a given AS number (ASN).
This script uses a whois server database operated by the Shadowserver
Foundation. We thank them for granting us permission to use this in

View File

@@ -1,5 +1,5 @@
description = [[
Discovers the server for EMC Networker backup software on the LAN by
Discovers the EMC Networker backup software server on a LAN by
using network broadcasts.
]]

View File

@@ -1,5 +1,5 @@
description = [[
Discovers Versant object databases using the srvloc protocol
Discovers Versant object databases using the srvloc protocol.
]]
---

View File

@@ -1,12 +1,12 @@
description = [[
Performs a domain lookup using the edns-client-subnet [1] option that adds
support for adding subnet information to the query in regards to where the
query is originating from. The script uses this option to supply a number of
Performs a domain lookup using the edns-client-subnet option that adds
support for adding subnet information to the query describing where the
query is originating. The script uses this option to supply a number of
geographically distributed locations in an attempt to enumerate as many
different address records as possible. The script also supports requests using
a given subnet.
[1]http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
* http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00
]]
---

View File

@@ -1,7 +1,7 @@
description = [[
Retrieves information from a DNS nameserver by requesting
its nameserver ID (nsid), and asking for its id.server and
version.bind. This script performs the same queries as the following
its nameserver ID (nsid) and asking for its id.server and
version.bind values. This script performs the same queries as the following
two dig commands:
- dig CH TXT bind.version @target
- dig +nsid CH TXT id.server @target

View File

@@ -1,7 +1,7 @@
description = [[
This script will execute a directory traversal attack against a ColdFusion
server and try to grab the password hash for the administrator user. It
will then use the salt value (hidden in the web page) to create the SHA1
Executes a directory traversal attack against a ColdFusion
server and tries to grab the password hash for the administrator user. It
then uses the salt value (hidden in the web page) to create the SHA1
HMAC hash that the web server needs for authentication as admin. You can
pass this value to the ColdFusion server as the admin without cracking
the password hash.

View File

@@ -1,6 +1,7 @@
description = [[
Retrieves information from the CouchBase Web Administration port.
The information retrieved by this script does not require any credentials.
Retrieves information (hostname, OS, uptime, etc.) from the CouchBase
Web Administration port. The information retrieved by this script
does not require any credentials.
]]
---

View File

@@ -1,5 +1,6 @@
description = [[
Retrieves information from distributed memory object caching system memcached.
Retrieves information (including system architecture, process ID, and
server time) from distributed memory object caching system memcached.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Performs brute force password guessing against the MongoDB database.
Performs brute force password auditing against the MongoDB database.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Performs brute force password guessing against the WinPcap Remote Capture
Performs brute force password auditing against the WinPcap Remote Capture
Daemon (rpcap).
]]

View File

@@ -1,6 +1,6 @@
description = [[
Connect to the rpcap service, a service providing remote sniffing capabilities
through WinPcap, and retrieves interface information. The service can either be
Connects to the rpcap service (provides remote sniffing capabilities
through WinPcap) and retrieves interface information. The service can either be
setup to require authentication or not and also supports IP restrictions.
]]

View File

@@ -1,5 +1,5 @@
description = [[
Performs brute force password auditing against rsync.
Performs brute force password auditing against the rsync remote file syncing protocol.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
List modules available for rsync synchronization
Lists modules available for rsync (remote file sync) synchronization.
]]
---

View File

@@ -1,7 +1,8 @@
description = [[
Determines the supported authentication mechanisms of a remote SOCKS server.
Starting with SOCKS version 5 socks servers may support authentication.
The script checks for the following authentication types:
Determines the supported authentication mechanisms of a remote SOCKS
proxy server. Starting with SOCKS version 5 socks servers may support
authentication. The script checks for the following authentication
types:
0 - No authentication
1 - GSSAPI
2 - Username and password

View File

@@ -1,5 +1,5 @@
description = [[
Performs brute force password auditing against SOCKS 5 servers.
Performs brute force password auditing against SOCKS 5 proxy servers.
]]
---