diff --git a/scripts/broadcast-eigrp-discovery.nse b/scripts/broadcast-eigrp-discovery.nse index 696dfdab5..a66d36c75 100644 --- a/scripts/broadcast-eigrp-discovery.nse +++ b/scripts/broadcast-eigrp-discovery.nse @@ -39,6 +39,7 @@ through all valid ethernet interfaces simultaneously. -- -- @args broadcast-eigrp-discovery.kparams the K metrics. -- Defaults to 101000. +-- @args broadcast-eigrp-discovery.interface Interface to send on (overrides -e) -- --@output -- Pre-scan script results: diff --git a/scripts/http-domino-enum-passwords.nse b/scripts/http-domino-enum-passwords.nse index 495466e29..19065e3c2 100644 --- a/scripts/http-domino-enum-passwords.nse +++ b/scripts/http-domino-enum-passwords.nse @@ -77,6 +77,8 @@ also download any Domino ID Files attached to the Person document. -- If a negative value is given, all hashes and id files are retrieved (default: 10) -- @args domino-enum-passwords.idpath the path where downloaded ID files should be saved -- If not given, the script will only indicate if the ID file is donwloadable or not +-- @args domino-enum-passwords.username Username for HTTP auth, if required +-- @args domino-enum-passwords.password Password for HTTP auth, if required -- -- Version 0.2 diff --git a/scripts/http-form-brute.nse b/scripts/http-form-brute.nse index 1a75bb273..3c91a7d91 100644 --- a/scripts/http-form-brute.nse +++ b/scripts/http-form-brute.nse @@ -188,7 +188,6 @@ action = function( host, port ) local uservar = stdnse.get_script_args('http-form-brute.uservar') local passvar = stdnse.get_script_args('http-form-brute.passvar') local path = stdnse.get_script_args('http-form-brute.path') or "/" - local force = stdnse.get_script_args("http-form-brute.force") local onsuccess = stdnse.get_script_args("http-form-brute.onsuccess") local onfailure = stdnse.get_script_args("http-form-brute.onfailure") diff --git a/scripts/informix-query.nse b/scripts/informix-query.nse index 1f5fded42..cd3a43494 100644 --- a/scripts/informix-query.nse +++ b/scripts/informix-query.nse @@ -31,6 +31,7 @@ authentication credentials (see also: informix-brute). -- (default: sysmaster) -- @args informix-query.query The query to run against the server -- (default: returns hostname and version) +-- @args informix-query.instance The name of the instance to connect to -- Version 0.1 diff --git a/scripts/ms-sql-query.nse b/scripts/ms-sql-query.nse index 4da1b3d08..91106e0d9 100644 --- a/scripts/ms-sql-query.nse +++ b/scripts/ms-sql-query.nse @@ -37,6 +37,7 @@ be disabled using the mssql.scanned-ports-only script argument. -- -- @args ms-sql-query.query The query to run against the server. -- (default: SELECT @@version version) +-- @args mssql.database Database to connect to (default: tempdb) -- -- @output -- | ms-sql-query: @@ -69,6 +70,7 @@ local function process_instance( instance ) local status, result -- the tempdb should be a safe guess, anyway the library is set up -- to continue even if the DB is not accessible to the user + -- TODO: consider renaming this arg to ms-sql-query.database local database = stdnse.get_script_args( 'mssql.database' ) or "tempdb" local query = stdnse.get_script_args( {'ms-sql-query.query', 'mssql-query.query' } ) or "SELECT @@version version" local helper = mssql.Helper:new() diff --git a/scripts/mysql-query.nse b/scripts/mysql-query.nse index 670440a13..c03254a8c 100644 --- a/scripts/mysql-query.nse +++ b/scripts/mysql-query.nse @@ -24,9 +24,10 @@ Runs a query against a MySQL database and returns the results as a table. -- | Query: SELECT host, user FROM mysql.user -- |_ User: root -- --- @args query the query for which to return the results --- @args username (optional) the username used to authenticate to the database server --- @args password (optional) the password used to authenticate to the database server +-- @args mysql-query.query the query for which to return the results +-- @args mysql-query.username (optional) the username used to authenticate to the database server +-- @args mysql-query.password (optional) the password used to authenticate to the database server +-- @args mysql-query.noheaders do not display column headers (default: false) -- author = "Patrik Karlsson" diff --git a/scripts/mysql-vuln-cve2012-2122.nse b/scripts/mysql-vuln-cve2012-2122.nse index 444d3ba19..2477af763 100644 --- a/scripts/mysql-vuln-cve2012-2122.nse +++ b/scripts/mysql-vuln-cve2012-2122.nse @@ -65,6 +65,7 @@ Interesting post about this vuln: -- |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122 -- -- @args mysql-vuln-cve2012-2122.user MySQL username. Default: root. +-- @args mysql-vuln-cve2012-2122.pass MySQL password. Default: nmapFTW. -- @args mysql-vuln-cve2012-2122.iterations Connection retries. Default: 1500. -- @args mysql-vuln-cve2012-2122.socket_timeout Socket timeout (milliseconds). Default: 5000. --- diff --git a/scripts/targets-ipv6-multicast-mld.nse b/scripts/targets-ipv6-multicast-mld.nse index 097ce9cd2..354bb9e01 100644 --- a/scripts/targets-ipv6-multicast-mld.nse +++ b/scripts/targets-ipv6-multicast-mld.nse @@ -24,6 +24,7 @@ Attempts to discover available IPv6 hosts on the LAN by sending an MLD (multicas -- -- @args targets-ipv6-multicast-mld.timeout timeout to wait for -- responses (default: 10s) +-- @args targets-ipv6-multicast-mld.interface Interface to send on (overrides -e) -- author = "niteesh"