mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Add some cross-references to NSEdoc for recent scripts
This commit is contained in:
@@ -55,6 +55,7 @@ by it will be checked in addition to the root.
|
||||
-- </table>
|
||||
--
|
||||
-- @see http-enum.nse
|
||||
-- @see http-security-headers.nse
|
||||
|
||||
categories = { "default", "safe", "vuln" }
|
||||
author = "Steve Benson"
|
||||
|
||||
@@ -24,6 +24,8 @@ Performs a HEAD request for the root folder ("/") of a web server and displays t
|
||||
--
|
||||
--@args path The path to request, such as <code>/index.php</code>. Default <code>/</code>.
|
||||
--@args useget Set to force GET requests instead of HEAD.
|
||||
--
|
||||
--@see http-security-headers.nse
|
||||
|
||||
author = "Ron Bowes"
|
||||
|
||||
|
||||
@@ -14,6 +14,8 @@ https://github.com/countercept/doublepulsar-detection-script
|
||||
---
|
||||
-- @usage nmap -p 445 <target> --script=smb-double-pulsar-backdoor
|
||||
--
|
||||
-- @see smb-vuln-ms17-010.nse
|
||||
--
|
||||
-- @output
|
||||
-- | smb-double-pulsar-backdoor:
|
||||
-- | VULNERABLE:
|
||||
|
||||
@@ -5,7 +5,7 @@ local string = require "string"
|
||||
|
||||
description = [[
|
||||
Attempts to detect if a Microsoft SMBv1 server is vulnerable to a remote code
|
||||
execution vulnerability (ms17-010).
|
||||
execution vulnerability (ms17-010, a.k.a. EternalBlue).
|
||||
|
||||
The script connects to the $IPC tree, executes a transaction on FID 0 and
|
||||
checks if the error "STATUS_INSUFF_SERVER_RESOURCES" is returned to
|
||||
@@ -26,6 +26,8 @@ References:
|
||||
-- @usage nmap -p445 --script smb-vuln-ms17-010 <target>
|
||||
-- @usage nmap -p445 --script vuln <target>
|
||||
--
|
||||
-- @see smb-double-pulsar-backdoor.nse
|
||||
--
|
||||
-- @output
|
||||
-- Host script results:
|
||||
-- | smb-vuln-ms17-010:
|
||||
|
||||
Reference in New Issue
Block a user