1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Update and canonicalize a bunch of script descriptions

This commit is contained in:
fyodor
2011-11-07 04:08:29 +00:00
parent 3c75f0f43c
commit f73e2b27d1
14 changed files with 23 additions and 27 deletions

View File

@@ -1,6 +1,5 @@
description = [[
Gathers information from an AMQP server.
It lists all of its server properties.
Gathers information (a list of all server properties) from an AMQP (advanced message queuing protocol) server.
See http://www.rabbitmq.com/extensions.html for details on the
<code>server-properties</code> field.

View File

@@ -1,5 +1,5 @@
description = [[
Check if your IP-range is part of a Zeus botnet by quering ZTDNS @ abuse.ch!
Checks if the target IP range is part of a Zeus botnet by quering ZTDNS @ abuse.ch.
Please review the following information before you start to scan:
* https://zeustracker.abuse.ch/ztdns.php
]]

View File

@@ -1,6 +1,6 @@
description = [[
Retrieves system information from a listening Ganglia Monitoring Daemon or
Ganglia Meta Daemon.
Retrieves system information (OS version, available memory, etc.) from
a listening Ganglia Monitoring Daemon or Ganglia Meta Daemon.
Ganglia is a scalable distributed monitoring system for high-performance
computing systems such as clusters and Grids. The information retrieved

View File

@@ -1,10 +1,11 @@
description = [[
Tests an http server for Cross-Origin Resource Sharing.
Tests an http server for Cross-Origin Resource Sharing (CORS), a way
for domains to explicitly opt in to having certain methods invoked by
another domain.
Cross-Origin Resource Sharing is a way for domains to explicitly opt in
to having certain methods invoked by another domain. The script works by
setting the Access-Control-Request-Method header field for certain
enumerated methods in OPTIONS requests, and checking the responses.
The script works by setting the Access-Control-Request-Method header
field for certain enumerated methods in OPTIONS requests, and checking
the responses.
]]
---

View File

@@ -1,7 +1,5 @@
description = [[
This script is inspired from http-reverse-ip to do a reverse ip lookup
using robtex website by parsing http://www.robtex.com/ip/ and return
maximum of 100 domains
Obtains up to 100 forward DNS names for a target IP address by querying http://www.robtex.com/ip/.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Gets hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.
Obtains hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.
IPv6 Node Information Queries are defined in RFC 4620. There are three
useful types of queries:

View File

@@ -1,5 +1,5 @@
description=[[
Performs password guessing agains the IRC service
Performs brute force password auditing against IRC (Internet Relay Chat) servers.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Discovers valid usernames by querying the Kerberos service for a TGT.
Discovers valid usernames by brute force querying likely usernames against a Kerberos service.
When an invalid username is requested the server will responde using the
Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine
that the user name was invalid. Valid user names will illicit either the

View File

@@ -1,7 +1,7 @@
description = [[
Dumps the password hashes from MS-SQL server in a format suitable for
John-the-ripper. In order to do so the user needs to have the appropriate
privileges.
Dumps the password hashes from an MS-SQL server in a format suitable for
cracking by tools such as John-the-ripper. In order to do so the user
needs to have the appropriate privileges.
Credentials passed as script arguments take precedence over credentials
discovered by other scripts.

View File

@@ -1,5 +1,5 @@
description=[[
Performs password guessing against the Nessus service using the NTP 1.2 protocol.
Performs brute force password auditing against a Nessus vulnerability scanning daemon using the NTP 1.2 protocol.
]]
---

View File

@@ -1,7 +1,5 @@
description = [[
Displays the banner information of an OpenLookup server.
OpenLookup is a network-accessible key-value store.
Displays the banner information of an OpenLookup (network key-value store) server.
]]
---

View File

@@ -1,5 +1,5 @@
description = [[
Finds out what methods are supported by the RTSP server.
Determines which methods are supported by the RTSP (real time streaming protocol) server.
]]
---

View File

@@ -1,6 +1,5 @@
description = [[
Attempts to brute common RTSP media URLs for devices such as surveillance IP
cameras.
Attempts to enumerate RTSP media URLS by testing for common paths on devices such as surveillance IP cameras.
]]
---

View File

@@ -1,5 +1,6 @@
description = [[
Checks for TFTP filenames from a list.
Enumerates TFTP (trivial file transfer protocol) filenames by testing
for a list of common ones.
TFTP doesn't provide directory listings. This script tries to retrieve
filenames from a list. The list is composed of static names from the