mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Update and canonicalize a bunch of script descriptions
This commit is contained in:
@@ -1,6 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Gathers information from an AMQP server.
|
Gathers information (a list of all server properties) from an AMQP (advanced message queuing protocol) server.
|
||||||
It lists all of its server properties.
|
|
||||||
|
|
||||||
See http://www.rabbitmq.com/extensions.html for details on the
|
See http://www.rabbitmq.com/extensions.html for details on the
|
||||||
<code>server-properties</code> field.
|
<code>server-properties</code> field.
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Check if your IP-range is part of a Zeus botnet by quering ZTDNS @ abuse.ch!
|
Checks if the target IP range is part of a Zeus botnet by quering ZTDNS @ abuse.ch.
|
||||||
Please review the following information before you start to scan:
|
Please review the following information before you start to scan:
|
||||||
* https://zeustracker.abuse.ch/ztdns.php
|
* https://zeustracker.abuse.ch/ztdns.php
|
||||||
]]
|
]]
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Retrieves system information from a listening Ganglia Monitoring Daemon or
|
Retrieves system information (OS version, available memory, etc.) from
|
||||||
Ganglia Meta Daemon.
|
a listening Ganglia Monitoring Daemon or Ganglia Meta Daemon.
|
||||||
|
|
||||||
Ganglia is a scalable distributed monitoring system for high-performance
|
Ganglia is a scalable distributed monitoring system for high-performance
|
||||||
computing systems such as clusters and Grids. The information retrieved
|
computing systems such as clusters and Grids. The information retrieved
|
||||||
|
|||||||
@@ -1,10 +1,11 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Tests an http server for Cross-Origin Resource Sharing.
|
Tests an http server for Cross-Origin Resource Sharing (CORS), a way
|
||||||
|
for domains to explicitly opt in to having certain methods invoked by
|
||||||
|
another domain.
|
||||||
|
|
||||||
Cross-Origin Resource Sharing is a way for domains to explicitly opt in
|
The script works by setting the Access-Control-Request-Method header
|
||||||
to having certain methods invoked by another domain. The script works by
|
field for certain enumerated methods in OPTIONS requests, and checking
|
||||||
setting the Access-Control-Request-Method header field for certain
|
the responses.
|
||||||
enumerated methods in OPTIONS requests, and checking the responses.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,7 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
This script is inspired from http-reverse-ip to do a reverse ip lookup
|
Obtains up to 100 forward DNS names for a target IP address by querying http://www.robtex.com/ip/.
|
||||||
using robtex website by parsing http://www.robtex.com/ip/ and return
|
|
||||||
maximum of 100 domains
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Gets hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.
|
Obtains hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.
|
||||||
|
|
||||||
IPv6 Node Information Queries are defined in RFC 4620. There are three
|
IPv6 Node Information Queries are defined in RFC 4620. There are three
|
||||||
useful types of queries:
|
useful types of queries:
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description=[[
|
description=[[
|
||||||
Performs password guessing agains the IRC service
|
Performs brute force password auditing against IRC (Internet Relay Chat) servers.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Discovers valid usernames by querying the Kerberos service for a TGT.
|
Discovers valid usernames by brute force querying likely usernames against a Kerberos service.
|
||||||
When an invalid username is requested the server will responde using the
|
When an invalid username is requested the server will responde using the
|
||||||
Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine
|
Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine
|
||||||
that the user name was invalid. Valid user names will illicit either the
|
that the user name was invalid. Valid user names will illicit either the
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Dumps the password hashes from MS-SQL server in a format suitable for
|
Dumps the password hashes from an MS-SQL server in a format suitable for
|
||||||
John-the-ripper. In order to do so the user needs to have the appropriate
|
cracking by tools such as John-the-ripper. In order to do so the user
|
||||||
privileges.
|
needs to have the appropriate privileges.
|
||||||
|
|
||||||
Credentials passed as script arguments take precedence over credentials
|
Credentials passed as script arguments take precedence over credentials
|
||||||
discovered by other scripts.
|
discovered by other scripts.
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description=[[
|
description=[[
|
||||||
Performs password guessing against the Nessus service using the NTP 1.2 protocol.
|
Performs brute force password auditing against a Nessus vulnerability scanning daemon using the NTP 1.2 protocol.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,7 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Displays the banner information of an OpenLookup server.
|
Displays the banner information of an OpenLookup (network key-value store) server.
|
||||||
|
|
||||||
OpenLookup is a network-accessible key-value store.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Finds out what methods are supported by the RTSP server.
|
Determines which methods are supported by the RTSP (real time streaming protocol) server.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,6 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to brute common RTSP media URLs for devices such as surveillance IP
|
Attempts to enumerate RTSP media URLS by testing for common paths on devices such as surveillance IP cameras.
|
||||||
cameras.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks for TFTP filenames from a list.
|
Enumerates TFTP (trivial file transfer protocol) filenames by testing
|
||||||
|
for a list of common ones.
|
||||||
|
|
||||||
TFTP doesn't provide directory listings. This script tries to retrieve
|
TFTP doesn't provide directory listings. This script tries to retrieve
|
||||||
filenames from a list. The list is composed of static names from the
|
filenames from a list. The list is composed of static names from the
|
||||||
|
|||||||
Reference in New Issue
Block a user