diff --git a/scripts/broadcast-ping.nse b/scripts/broadcast-ping.nse index aebedb39b..aa93f707d 100755 --- a/scripts/broadcast-ping.nse +++ b/scripts/broadcast-ping.nse @@ -1,7 +1,6 @@ description = [[ Sends broadcast pings on a selected interface using raw ethernet packets and -outputs the responder hosts' IP and MAC addresses. r00t permissions are a -prerequisite. Most operating systems don't respond to broadcast-ping probes, +outputs the responding hosts' IP and MAC addresses or (if requested) adds them as targets. Root privileges on UNIX are required to run this script since it uses raw sockets. Most operating systems don't respond to broadcast-ping probes, but they can be configured to do so. The interface on which is broadcasted can be specified using the -e Nmap option diff --git a/scripts/cvs-brute-repository.nse b/scripts/cvs-brute-repository.nse index e799c55be..16c3b3bd4 100644 --- a/scripts/cvs-brute-repository.nse +++ b/scripts/cvs-brute-repository.nse @@ -1,5 +1,5 @@ description = [[ -Attempts to guess the name of the CVS repository hosted on the remote server. +Attempts to guess the name of the CVS repositories hosted on the remote server. With knowledge of the correct repository name, usernames and passwords can be guessed. ]] diff --git a/scripts/cvs-brute.nse b/scripts/cvs-brute.nse index 5c4bf653c..12bab4966 100644 --- a/scripts/cvs-brute.nse +++ b/scripts/cvs-brute.nse @@ -1,5 +1,5 @@ description = [[ -Performs password guessing against CVS pserver. +Performs brute force password auditing against CVS pserver authentication. ]] --- diff --git a/scripts/http-default-accounts.nse b/scripts/http-default-accounts.nse index 36c4833e9..09c9763d7 100644 --- a/scripts/http-default-accounts.nse +++ b/scripts/http-default-accounts.nse @@ -1,5 +1,5 @@ description = [[ -http-default-accounts tests for access with default credentials in a variety of web applications and devices. +http-default-accounts tests for access with default credentials used by a variety of web applications and devices. It works similar to http-enum, we detect applications by matching known paths and launching a login routine using default credentials when found. This script depends on a fingerprint file containing the target's information: name, category, location paths, default credentials and login routine. diff --git a/scripts/imap-brute.nse b/scripts/imap-brute.nse index 98426af16..23304c83e 100644 --- a/scripts/imap-brute.nse +++ b/scripts/imap-brute.nse @@ -1,6 +1,5 @@ description = [[ -Performs password guessing against IMAP servers using either LOGIN, PLAIN, -CRAM-MD5, DIGEST-MD5 or NTLM authentication. +Performs brute force password auditing against IMAP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication. ]] --- diff --git a/scripts/smtp-brute.nse b/scripts/smtp-brute.nse index 2bfcbe9e4..ddce2d58f 100644 --- a/scripts/smtp-brute.nse +++ b/scripts/smtp-brute.nse @@ -1,6 +1,5 @@ description = [[ -Performs password guessing against SMTP servers using either LOGIN, PLAIN, -CRAM-MD5, DIGEST-MD5 or NTLM authentication. +Performs brute force password auditing against SMTP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication. ]] --- diff --git a/scripts/smtp-vuln-cve2011-1764.nse b/scripts/smtp-vuln-cve2011-1764.nse index 9d1132552..81c9f0dde 100644 --- a/scripts/smtp-vuln-cve2011-1764.nse +++ b/scripts/smtp-vuln-cve2011-1764.nse @@ -1,10 +1,5 @@ description = [[ -Checks for a format string vulnerability in the Exim SMTP server with -DomainKeys Identified Mail (DKIM) support, version between 4.70 and 4.75. -The DKIM logging mechanism did not use format string specifiers when -logging some parts of the DKIM-Signature header field. A remote attacker -who is able to send emails, can exploit this vulnerability and execute -arbitrary code with the privileges of the Exim daemon (CVE-2011-1764). +Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support. The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon (CVE-2011-1764). Reference: * http://bugs.exim.org/show_bug.cgi?id=1106 diff --git a/scripts/xmpp-brute.nse b/scripts/xmpp-brute.nse index 04c805766..4514915f8 100644 --- a/scripts/xmpp-brute.nse +++ b/scripts/xmpp-brute.nse @@ -1,5 +1,5 @@ description = [[ -Performs brute force password auditing against XMPP (jabber) servers. +Performs brute force password auditing against XMPP (Jabber) servers. ]] ---