mirror of
https://github.com/nmap/nmap.git
synced 2025-12-25 17:09:02 +00:00
Apply a patch from Toni Ruottu with some small misc. improvements to the netbus-* scripts. Also I changed netbus-auth-bypass to the safe category as recommended by Toni
This commit is contained in:
@@ -3,6 +3,9 @@ Performs brute force password auditing about the Netbus backdoor ("remote admini
|
||||
]]
|
||||
|
||||
---
|
||||
-- @usage
|
||||
-- nmap -p 12345 --script netbus-brute <target>
|
||||
--
|
||||
-- @output
|
||||
-- 12345/tcp open netbus
|
||||
-- |_netbus-brute: password123
|
||||
@@ -36,13 +39,18 @@ action = function( host, port )
|
||||
local login = buffer()
|
||||
if login == "Access;1" then
|
||||
-- Store the password for other netbus scripts
|
||||
nmap.registry.netbuspassword=password
|
||||
|
||||
local key = string.format("%s:%d", host.ip, port.number)
|
||||
if not nmap.registry.netbuspasswords then
|
||||
nmap.registry.netbuspasswords = {}
|
||||
end
|
||||
nmap.registry.netbuspasswords[key] = password
|
||||
if password == "" then
|
||||
return "<empty>"
|
||||
end
|
||||
return string.format("%s", password)
|
||||
end
|
||||
end
|
||||
socket:close()
|
||||
|
||||
end
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user