mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
minor updates to the nsedoc descriptions for some scripts
This commit is contained in:
@@ -1,7 +1,6 @@
|
||||
description = [[
|
||||
Sends broadcast pings on a selected interface using raw ethernet packets and
|
||||
outputs the responder hosts' IP and MAC addresses. r00t permissions are a
|
||||
prerequisite. Most operating systems don't respond to broadcast-ping probes,
|
||||
outputs the responding hosts' IP and MAC addresses or (if requested) adds them as targets. Root privileges on UNIX are required to run this script since it uses raw sockets. Most operating systems don't respond to broadcast-ping probes,
|
||||
but they can be configured to do so.
|
||||
|
||||
The interface on which is broadcasted can be specified using the -e Nmap option
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Attempts to guess the name of the CVS repository hosted on the remote server.
|
||||
Attempts to guess the name of the CVS repositories hosted on the remote server.
|
||||
With knowledge of the correct repository name, usernames and passwords can be guessed.
|
||||
]]
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs password guessing against CVS pserver.
|
||||
Performs brute force password auditing against CVS pserver authentication.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
http-default-accounts tests for access with default credentials in a variety of web applications and devices.
|
||||
http-default-accounts tests for access with default credentials used by a variety of web applications and devices.
|
||||
|
||||
It works similar to http-enum, we detect applications by matching known paths and launching a login routine using default credentials when found.
|
||||
This script depends on a fingerprint file containing the target's information: name, category, location paths, default credentials and login routine.
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
description = [[
|
||||
Performs password guessing against IMAP servers using either LOGIN, PLAIN,
|
||||
CRAM-MD5, DIGEST-MD5 or NTLM authentication.
|
||||
Performs brute force password auditing against IMAP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
description = [[
|
||||
Performs password guessing against SMTP servers using either LOGIN, PLAIN,
|
||||
CRAM-MD5, DIGEST-MD5 or NTLM authentication.
|
||||
Performs brute force password auditing against SMTP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,10 +1,5 @@
|
||||
description = [[
|
||||
Checks for a format string vulnerability in the Exim SMTP server with
|
||||
DomainKeys Identified Mail (DKIM) support, version between 4.70 and 4.75.
|
||||
The DKIM logging mechanism did not use format string specifiers when
|
||||
logging some parts of the DKIM-Signature header field. A remote attacker
|
||||
who is able to send emails, can exploit this vulnerability and execute
|
||||
arbitrary code with the privileges of the Exim daemon (CVE-2011-1764).
|
||||
Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support. The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon (CVE-2011-1764).
|
||||
|
||||
Reference:
|
||||
* http://bugs.exim.org/show_bug.cgi?id=1106
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Performs brute force password auditing against XMPP (jabber) servers.
|
||||
Performs brute force password auditing against XMPP (Jabber) servers.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
Reference in New Issue
Block a user