1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 12:41:29 +00:00

minor updates to the nsedoc descriptions for some scripts

This commit is contained in:
fyodor
2011-09-11 18:26:37 +00:00
parent 24c8c06f1b
commit bff90f3d55
8 changed files with 8 additions and 16 deletions

View File

@@ -1,7 +1,6 @@
description = [[ description = [[
Sends broadcast pings on a selected interface using raw ethernet packets and Sends broadcast pings on a selected interface using raw ethernet packets and
outputs the responder hosts' IP and MAC addresses. r00t permissions are a outputs the responding hosts' IP and MAC addresses or (if requested) adds them as targets. Root privileges on UNIX are required to run this script since it uses raw sockets. Most operating systems don't respond to broadcast-ping probes,
prerequisite. Most operating systems don't respond to broadcast-ping probes,
but they can be configured to do so. but they can be configured to do so.
The interface on which is broadcasted can be specified using the -e Nmap option The interface on which is broadcasted can be specified using the -e Nmap option

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Attempts to guess the name of the CVS repository hosted on the remote server. Attempts to guess the name of the CVS repositories hosted on the remote server.
With knowledge of the correct repository name, usernames and passwords can be guessed. With knowledge of the correct repository name, usernames and passwords can be guessed.
]] ]]

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs password guessing against CVS pserver. Performs brute force password auditing against CVS pserver authentication.
]] ]]
--- ---

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
http-default-accounts tests for access with default credentials in a variety of web applications and devices. http-default-accounts tests for access with default credentials used by a variety of web applications and devices.
It works similar to http-enum, we detect applications by matching known paths and launching a login routine using default credentials when found. It works similar to http-enum, we detect applications by matching known paths and launching a login routine using default credentials when found.
This script depends on a fingerprint file containing the target's information: name, category, location paths, default credentials and login routine. This script depends on a fingerprint file containing the target's information: name, category, location paths, default credentials and login routine.

View File

@@ -1,6 +1,5 @@
description = [[ description = [[
Performs password guessing against IMAP servers using either LOGIN, PLAIN, Performs brute force password auditing against IMAP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.
CRAM-MD5, DIGEST-MD5 or NTLM authentication.
]] ]]
--- ---

View File

@@ -1,6 +1,5 @@
description = [[ description = [[
Performs password guessing against SMTP servers using either LOGIN, PLAIN, Performs brute force password auditing against SMTP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.
CRAM-MD5, DIGEST-MD5 or NTLM authentication.
]] ]]
--- ---

View File

@@ -1,10 +1,5 @@
description = [[ description = [[
Checks for a format string vulnerability in the Exim SMTP server with Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support. The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon (CVE-2011-1764).
DomainKeys Identified Mail (DKIM) support, version between 4.70 and 4.75.
The DKIM logging mechanism did not use format string specifiers when
logging some parts of the DKIM-Signature header field. A remote attacker
who is able to send emails, can exploit this vulnerability and execute
arbitrary code with the privileges of the Exim daemon (CVE-2011-1764).
Reference: Reference:
* http://bugs.exim.org/show_bug.cgi?id=1106 * http://bugs.exim.org/show_bug.cgi?id=1106

View File

@@ -1,5 +1,5 @@
description = [[ description = [[
Performs brute force password auditing against XMPP (jabber) servers. Performs brute force password auditing against XMPP (Jabber) servers.
]] ]]
--- ---