mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
Adds script http-bigip-cookie. Closes #892
This commit is contained in:
@@ -4,6 +4,10 @@ o [GH#926] The rarity level of MS SQL's service detection probe was decreased.
|
|||||||
Now we can find MS SQL in odd ports without increasing version intensity.
|
Now we can find MS SQL in odd ports without increasing version intensity.
|
||||||
[Paulino Calderon]
|
[Paulino Calderon]
|
||||||
|
|
||||||
|
o [NSE][GH#892] New script http-bigip-cookie decodes unencrypted F5 BIG-IP
|
||||||
|
cookies and reports back the IP address and port of the actual server behind
|
||||||
|
the load-balancer. [Seth Jackson]
|
||||||
|
|
||||||
o [NSE] New script http-jsonp-detection Attempts to discover JSONP endpoints in
|
o [NSE] New script http-jsonp-detection Attempts to discover JSONP endpoints in
|
||||||
web servers. JSONP endpoints can be used to bypass Same-origin Policy
|
web servers. JSONP endpoints can be used to bypass Same-origin Policy
|
||||||
restrictions in web browsers. [Vinamra Bhatia]
|
restrictions in web browsers. [Vinamra Bhatia]
|
||||||
|
|||||||
83
scripts/http-bigip-cookie.nse
Normal file
83
scripts/http-bigip-cookie.nse
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
description = [[
|
||||||
|
Decodes any unencrypted F5 BIG-IP cookies in the HTTP response.
|
||||||
|
BIG-IP cookies contain information on backend systems such as
|
||||||
|
internal IP addresses and port numbers.
|
||||||
|
See here for more info: https://support.f5.com/csp/article/K6917
|
||||||
|
]]
|
||||||
|
|
||||||
|
local http = require "http"
|
||||||
|
local shortport = require "shortport"
|
||||||
|
local stdnse = require "stdnse"
|
||||||
|
local table = require "table"
|
||||||
|
|
||||||
|
---
|
||||||
|
-- @usage
|
||||||
|
-- nmap -p <port> --script http-bigip-cookie <target>
|
||||||
|
--
|
||||||
|
-- @output
|
||||||
|
-- PORT STATE SERVICE
|
||||||
|
-- 80/tcp open http
|
||||||
|
-- | http-bigip-cookie:
|
||||||
|
-- | BIGipServer<pool_name>:
|
||||||
|
-- | address:
|
||||||
|
-- | host: 10.1.1.100
|
||||||
|
-- | type: ipv4
|
||||||
|
-- |_ port: 8080
|
||||||
|
--
|
||||||
|
-- @xmloutput
|
||||||
|
-- <table key="BIGipServer<pool_name>">
|
||||||
|
-- <table key="address">
|
||||||
|
-- <elem key="host">10.1.1.100</elem>
|
||||||
|
-- <elem key="type">ipv4</elem>
|
||||||
|
-- </table>
|
||||||
|
-- <elem key="port">8080</elem>
|
||||||
|
-- </table>
|
||||||
|
--
|
||||||
|
-- @args http-bigip-cookie.path The URL path to request. The default path is "/".
|
||||||
|
|
||||||
|
author = "Seth Jackson"
|
||||||
|
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
|
||||||
|
categories = { "discovery", "safe" }
|
||||||
|
|
||||||
|
portrule = shortport.http
|
||||||
|
|
||||||
|
action = function(host, port)
|
||||||
|
local path = stdnse.get_script_args(SCRIPT_NAME..".path") or "/"
|
||||||
|
|
||||||
|
local response = http.get(host, port, path, { redirect_ok = false })
|
||||||
|
|
||||||
|
if not response then
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
if not response.cookies then
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
local output = stdnse.output_table()
|
||||||
|
|
||||||
|
for _, cookie in ipairs(response.cookies) do
|
||||||
|
if cookie.name:find("BIGipServer") then
|
||||||
|
local host, port = cookie.value:match("^(%d+)%.(%d+)%.")
|
||||||
|
|
||||||
|
if host and tonumber(host) < 0x100000000 and tonumber(port) < 0x10000 then
|
||||||
|
host = table.concat({("BBBB"):unpack(("<I4"):pack(host))}, ".", 1, 4)
|
||||||
|
port = (">I2"):unpack(("<I2"):pack(port))
|
||||||
|
|
||||||
|
local result = {
|
||||||
|
address = {
|
||||||
|
host = host,
|
||||||
|
type = "ipv4"
|
||||||
|
},
|
||||||
|
port = port
|
||||||
|
}
|
||||||
|
|
||||||
|
output[cookie.name] = result
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
if #output > 0 then
|
||||||
|
return output
|
||||||
|
end
|
||||||
|
end
|
||||||
@@ -159,6 +159,7 @@ Entry { filename = "http-awstatstotals-exec.nse", categories = { "exploit", "int
|
|||||||
Entry { filename = "http-axis2-dir-traversal.nse", categories = { "exploit", "intrusive", "vuln", } }
|
Entry { filename = "http-axis2-dir-traversal.nse", categories = { "exploit", "intrusive", "vuln", } }
|
||||||
Entry { filename = "http-backup-finder.nse", categories = { "discovery", "safe", } }
|
Entry { filename = "http-backup-finder.nse", categories = { "discovery", "safe", } }
|
||||||
Entry { filename = "http-barracuda-dir-traversal.nse", categories = { "auth", "exploit", "intrusive", } }
|
Entry { filename = "http-barracuda-dir-traversal.nse", categories = { "auth", "exploit", "intrusive", } }
|
||||||
|
Entry { filename = "http-bigip-cookie.nse", categories = { "discovery", "safe", } }
|
||||||
Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } }
|
Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } }
|
||||||
Entry { filename = "http-cakephp-version.nse", categories = { "discovery", "safe", } }
|
Entry { filename = "http-cakephp-version.nse", categories = { "discovery", "safe", } }
|
||||||
Entry { filename = "http-chrono.nse", categories = { "discovery", "intrusive", } }
|
Entry { filename = "http-chrono.nse", categories = { "discovery", "intrusive", } }
|
||||||
|
|||||||
Reference in New Issue
Block a user