diff --git a/scripts/http-auth-finder.nse b/scripts/http-auth-finder.nse index e899717eb..9bc9a7f5f 100644 --- a/scripts/http-auth-finder.nse +++ b/scripts/http-auth-finder.nse @@ -35,6 +35,9 @@ detected method. -- @args http-auth-finder.withindomain only spider URLs within the same -- domain. This widens the scope from withinhost and can -- not be used in combination. (default: false) +-- +-- @see http-auth.nse +-- @see http-brute.nse author = "Patrik Karlsson" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/http-auth.nse b/scripts/http-auth.nse index 7281adb83..d71847ffb 100644 --- a/scripts/http-auth.nse +++ b/scripts/http-auth.nse @@ -41,6 +41,9 @@ authentication. -- -- -- @args http-auth.path Define the request path +-- +-- @see http-auth-finder.nse +-- @see http-brute.nse -- HTTP authentication information gathering script -- rev 1.1 (2007-05-25) diff --git a/scripts/http-dombased-xss.nse b/scripts/http-dombased-xss.nse index 9f7d9cae9..bcf41c2c6 100644 --- a/scripts/http-dombased-xss.nse +++ b/scripts/http-dombased-xss.nse @@ -31,6 +31,9 @@ http://www.webappsec.org/projects/articles/071105.shtml -- | Source: document.write(document.URL.substring(pos,document.URL.length) -- |_ Pages: http://some-very-random-page.com/foo.html -- +-- @see http-stored-xss.nse +-- @see http-phpself-xss.nse +-- @see http-xssed.nse --- categories = {"intrusive", "exploit", "vuln"} diff --git a/scripts/http-enum.nse b/scripts/http-enum.nse index 6ed0a560e..335c2a659 100644 --- a/scripts/http-enum.nse +++ b/scripts/http-enum.nse @@ -72,6 +72,8 @@ database can specify their own criteria for accepting a page as valid. -- | /images/outlook.jpg: Outlook Web Access -- | /nfservlets/servlet/SPSRouterServlet/: netForensics -- |_ /nfservlets/servlet/SPSRouterServlet/: netForensics +-- +-- @see http-iis-short-name-brute.nse author = {"Ron Bowes", "Andrew Orr", "Rob Nicholls"} diff --git a/scripts/http-internal-ip-disclosure.nse b/scripts/http-internal-ip-disclosure.nse index f8c8392f8..1cff0a189 100644 --- a/scripts/http-internal-ip-disclosure.nse +++ b/scripts/http-internal-ip-disclosure.nse @@ -25,7 +25,8 @@ versions of Microsoft IIS, but affects other web servers as well. -- -- @xmloutput -- 10.0.0.2 ---- +-- +-- @see ssl-cert-intaddr.nse author = "Josh Amishav-Zlatin" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/http-joomla-brute.nse b/scripts/http-joomla-brute.nse index d47d8ff94..293511081 100644 --- a/scripts/http-joomla-brute.nse +++ b/scripts/http-joomla-brute.nse @@ -50,8 +50,7 @@ Joomla's default uri and form names: -- * userdb = String - Path to user list -- -- --- Based on Patrik Karlsson's http-form-brute --- +-- @see http-form-brute.nse author = "Paulino Calderon " license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/http-methods.nse b/scripts/http-methods.nse index cf344ec0f..0d58b13d3 100644 --- a/scripts/http-methods.nse +++ b/scripts/http-methods.nse @@ -54,9 +54,9 @@ only the potentially risky methods are shown. -- OPTIONS -- -- --- @see http-method-tamper --- @see http-trace --- @see http-put +-- @see http-method-tamper.nse +-- @see http-trace.nse +-- @see http-put.nse author = {"Bernd Stroessenreuther ", "Gyanendra Mishra"} diff --git a/scripts/http-mobileversion-checker.nse b/scripts/http-mobileversion-checker.nse index 261edb4b1..ae0942b92 100644 --- a/scripts/http-mobileversion-checker.nse +++ b/scripts/http-mobileversion-checker.nse @@ -18,7 +18,7 @@ Checks if the website holds a mobile version. -- 80/tcp open http syn-ack -- |_ http-mobileversion-checker: Found mobile version: https://m.some-very-random-website.com (Redirected to a different host) -- ---- +-- @see http-useragent-tester.nse categories = {"discovery", "safe"} author = "George Chatzisofroniou" diff --git a/scripts/http-phpself-xss.nse b/scripts/http-phpself-xss.nse index 5fb1312d0..9be1845a6 100644 --- a/scripts/http-phpself-xss.nse +++ b/scripts/http-phpself-xss.nse @@ -47,6 +47,10 @@ The attack vector/probe used is: /'"/> -- -- @args http-phpself-xss.uri URI. Default: / -- @args http-phpself-xss.timeout Spidering timeout. (default 10s) +-- +-- @see http-stored-xss.nse +-- @see http-dombased-xss.nse +-- @see http-xssed.nse author = "Paulino Calderon " license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"fuzzer", "intrusive", "vuln"} diff --git a/scripts/http-slowloris-check.nse b/scripts/http-slowloris-check.nse index 84ab66eb0..8006091d8 100644 --- a/scripts/http-slowloris-check.nse +++ b/scripts/http-slowloris-check.nse @@ -56,6 +56,8 @@ Idea from Qualys blogpost: -- | References: -- | http://ha.ckers.org/slowloris/ -- |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 +-- +-- @see http-slowloris.nse author = "Aleksandar Nikolic" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/http-slowloris.nse b/scripts/http-slowloris.nse index c66009a9c..2ea43f31c 100644 --- a/scripts/http-slowloris.nse +++ b/scripts/http-slowloris.nse @@ -52,6 +52,8 @@ when run from Windows. -- | the DoS attack took +2m22s -- | with 501 concurrent connections -- |_ and 441 sent queries +-- +-- @see http-slowloris-check.nse author = {"Aleksandar Nikolic", "Ange Gutek"} license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/http-stored-xss.nse b/scripts/http-stored-xss.nse index a484e53e6..c57c44b02 100644 --- a/scripts/http-stored-xss.nse +++ b/scripts/http-stored-xss.nse @@ -48,8 +48,9 @@ strings to determine whether the payloads were successful. -- | Uploaded on: /posts.php -- |_ Description: Unfiltered " (double quotation mark). An indication of potential XSS vulnerability. -- --- --- +-- @see http-dombased-xss.nse +-- @see http-phpself-xss.nse +-- @see http-xssed.nse --- categories = {"intrusive", "exploit", "vuln"} diff --git a/scripts/http-useragent-tester.nse b/scripts/http-useragent-tester.nse index 197e003cf..768e8311d 100644 --- a/scripts/http-useragent-tester.nse +++ b/scripts/http-useragent-tester.nse @@ -40,7 +40,7 @@ Checks if various crawling utilities are allowed by the host. -- | libcurl-agent/1.0 redirected to: https://www.some-random-page.com/unsupportedbrowser (different host) -- |_ Wget/1.13.4 (linux-gnu) redirected to: https://www.some-random-page.com/unsupportedbrowser (different host) -- ---- +-- @see http-mobileversion-checker.nse categories = {"discovery", "safe"} author = "George Chatzisofroniou" diff --git a/scripts/http-wordpress-brute.nse b/scripts/http-wordpress-brute.nse index 41376ad25..842cdf799 100644 --- a/scripts/http-wordpress-brute.nse +++ b/scripts/http-wordpress-brute.nse @@ -48,8 +48,7 @@ Wordpress default uri and form names: -- * passdb = String - Path to password list -- * userdb = String - Path to user list -- --- Based on Patrik Karlsson's http-form-brute --- +-- @see http-form-brute.nse author = "Paulino Calderon " license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/http-xssed.nse b/scripts/http-xssed.nse index 493d83b1a..5b6403d6f 100644 --- a/scripts/http-xssed.nse +++ b/scripts/http-xssed.nse @@ -21,7 +21,10 @@ This script searches the xssed.com database and outputs the result. -- | xssed.com found the following previously reported XSS vulnerabilities marked as fixed: -- | -- |_ /myBook/myregion.php?targetUrl=javascript:alert(1); ---- +-- +-- @see http-stored-xss.nse +-- @see http-dombased-xss.nse +-- @see http-phpself-xss.nse author = "George Chatzisofroniou" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/metasploit-info.nse b/scripts/metasploit-info.nse index 3c11d58be..3be5186a1 100644 --- a/scripts/metasploit-info.nse +++ b/scripts/metasploit-info.nse @@ -37,6 +37,8 @@ References: -- @args metasploit-info.username Valid metasploit rpc username (required) -- @args metasploit-info.password Valid metasploit rpc password (required) -- @args metasploit-info.command Custom command to run on the server (optional) +-- +-- @see metasploit-msgrpc-brute.nse diff --git a/scripts/rpc-grind.nse b/scripts/rpc-grind.nse index 6cf56b07e..dfe990927 100644 --- a/scripts/rpc-grind.nse +++ b/scripts/rpc-grind.nse @@ -33,6 +33,7 @@ Any other accept state is an incorrect behaviour. --PORT STATE SERVICE VERSION --53344/udp open walld 1 (RPC #100008) -- +-- @see rpcinfo.nse author = "Hani Benhabiles" diff --git a/scripts/rpcap-info.nse b/scripts/rpcap-info.nse index 311bbc3cf..fd460c939 100644 --- a/scripts/rpcap-info.nse +++ b/scripts/rpcap-info.nse @@ -31,6 +31,7 @@ setup to require authentication or not and also supports IP restrictions. -- -- @args creds.rpcap username:password to use for authentication -- +-- @see rpcap-brute.nse author = "Patrik Karlsson" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/rpcinfo.nse b/scripts/rpcinfo.nse index b028d6fd3..d4785debc 100644 --- a/scripts/rpcinfo.nse +++ b/scripts/rpcinfo.nse @@ -72,6 +72,8 @@ supported version numbers, port number and protocol, and program name. -- -- -- +-- +-- @see rpc-grind.nse author = "Patrik Karlsson" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/smb-enum-sessions.nse b/scripts/smb-enum-sessions.nse index 76eb08216..5aed00d3f 100644 --- a/scripts/smb-enum-sessions.nse +++ b/scripts/smb-enum-sessions.nse @@ -58,7 +58,8 @@ the system, besides showing a message box to the user. -- | |_ DOMAIN\rbowes since 2008-10-20 09:03:23 -- | Active SMB Sessions: -- |_ |_ ADMINISTRATOR is connected from 10.100.254.138 for [just logged in, it's probably you], idle for [not idle] ------------------------------------------------------------------------ +-- +-- @see smb-enum-users.nse author = "Ron Bowes" copyright = "Ron Bowes" diff --git a/scripts/smb-vuln-ms10-061.nse b/scripts/smb-vuln-ms10-061.nse index 75920deac..9bb5e84bf 100644 --- a/scripts/smb-vuln-ms10-061.nse +++ b/scripts/smb-vuln-ms10-061.nse @@ -52,6 +52,8 @@ References: -- | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729 -- | http://technet.microsoft.com/en-us/security/bulletin/MS10-061 -- |_ http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx +-- +-- @see stuxnet-detect.nse author = "Aleksandar Nikolic" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/ssl-cert-intaddr.nse b/scripts/ssl-cert-intaddr.nse index c3d0fe668..f474d050f 100644 --- a/scripts/ssl-cert-intaddr.nse +++ b/scripts/ssl-cert-intaddr.nse @@ -32,7 +32,8 @@ address itself is not private. Nmap v7.30 or later is required. -- -- 10.3.4.5 --
---- +-- +-- @see http-internal-ip-disclosure.nse author = "Steve Benson" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" diff --git a/scripts/stuxnet-detect.nse b/scripts/stuxnet-detect.nse index d52e8e6e1..548430680 100644 --- a/scripts/stuxnet-detect.nse +++ b/scripts/stuxnet-detect.nse @@ -27,6 +27,8 @@ for the filename is given on the command line. -- -- Host script results: -- |_stuxnet-detect: INFECTED (version 4c:04:00:00:01:00:00:00) +-- +-- @see smb-vuln-ms10-061.nse author = "Mak Kolybabi" license = "Same as Nmap--See https://nmap.org/book/man-legal.html"