mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Update and canonicalize a bunch of script descriptions
This commit is contained in:
@@ -1,6 +1,5 @@
|
||||
description = [[
|
||||
Gathers information from an AMQP server.
|
||||
It lists all of its server properties.
|
||||
Gathers information (a list of all server properties) from an AMQP (advanced message queuing protocol) server.
|
||||
|
||||
See http://www.rabbitmq.com/extensions.html for details on the
|
||||
<code>server-properties</code> field.
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Check if your IP-range is part of a Zeus botnet by quering ZTDNS @ abuse.ch!
|
||||
Checks if the target IP range is part of a Zeus botnet by quering ZTDNS @ abuse.ch.
|
||||
Please review the following information before you start to scan:
|
||||
* https://zeustracker.abuse.ch/ztdns.php
|
||||
]]
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
description = [[
|
||||
Retrieves system information from a listening Ganglia Monitoring Daemon or
|
||||
Ganglia Meta Daemon.
|
||||
Retrieves system information (OS version, available memory, etc.) from
|
||||
a listening Ganglia Monitoring Daemon or Ganglia Meta Daemon.
|
||||
|
||||
Ganglia is a scalable distributed monitoring system for high-performance
|
||||
computing systems such as clusters and Grids. The information retrieved
|
||||
|
||||
@@ -1,10 +1,11 @@
|
||||
description = [[
|
||||
Tests an http server for Cross-Origin Resource Sharing.
|
||||
Tests an http server for Cross-Origin Resource Sharing (CORS), a way
|
||||
for domains to explicitly opt in to having certain methods invoked by
|
||||
another domain.
|
||||
|
||||
Cross-Origin Resource Sharing is a way for domains to explicitly opt in
|
||||
to having certain methods invoked by another domain. The script works by
|
||||
setting the Access-Control-Request-Method header field for certain
|
||||
enumerated methods in OPTIONS requests, and checking the responses.
|
||||
The script works by setting the Access-Control-Request-Method header
|
||||
field for certain enumerated methods in OPTIONS requests, and checking
|
||||
the responses.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,7 +1,5 @@
|
||||
description = [[
|
||||
This script is inspired from http-reverse-ip to do a reverse ip lookup
|
||||
using robtex website by parsing http://www.robtex.com/ip/ and return
|
||||
maximum of 100 domains
|
||||
Obtains up to 100 forward DNS names for a target IP address by querying http://www.robtex.com/ip/.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Gets hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.
|
||||
Obtains hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.
|
||||
|
||||
IPv6 Node Information Queries are defined in RFC 4620. There are three
|
||||
useful types of queries:
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description=[[
|
||||
Performs password guessing agains the IRC service
|
||||
Performs brute force password auditing against IRC (Internet Relay Chat) servers.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Discovers valid usernames by querying the Kerberos service for a TGT.
|
||||
Discovers valid usernames by brute force querying likely usernames against a Kerberos service.
|
||||
When an invalid username is requested the server will responde using the
|
||||
Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine
|
||||
that the user name was invalid. Valid user names will illicit either the
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
description = [[
|
||||
Dumps the password hashes from MS-SQL server in a format suitable for
|
||||
John-the-ripper. In order to do so the user needs to have the appropriate
|
||||
privileges.
|
||||
Dumps the password hashes from an MS-SQL server in a format suitable for
|
||||
cracking by tools such as John-the-ripper. In order to do so the user
|
||||
needs to have the appropriate privileges.
|
||||
|
||||
Credentials passed as script arguments take precedence over credentials
|
||||
discovered by other scripts.
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description=[[
|
||||
Performs password guessing against the Nessus service using the NTP 1.2 protocol.
|
||||
Performs brute force password auditing against a Nessus vulnerability scanning daemon using the NTP 1.2 protocol.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,7 +1,5 @@
|
||||
description = [[
|
||||
Displays the banner information of an OpenLookup server.
|
||||
|
||||
OpenLookup is a network-accessible key-value store.
|
||||
Displays the banner information of an OpenLookup (network key-value store) server.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
description = [[
|
||||
Finds out what methods are supported by the RTSP server.
|
||||
Determines which methods are supported by the RTSP (real time streaming protocol) server.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
description = [[
|
||||
Attempts to brute common RTSP media URLs for devices such as surveillance IP
|
||||
cameras.
|
||||
Attempts to enumerate RTSP media URLS by testing for common paths on devices such as surveillance IP cameras.
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
description = [[
|
||||
Checks for TFTP filenames from a list.
|
||||
Enumerates TFTP (trivial file transfer protocol) filenames by testing
|
||||
for a list of common ones.
|
||||
|
||||
TFTP doesn't provide directory listings. This script tries to retrieve
|
||||
filenames from a list. The list is composed of static names from the
|
||||
|
||||
Reference in New Issue
Block a user