1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-23 16:09:02 +00:00

a couple more adjustments to account status handling in brute scripts.

Revert wording in oracle-brute.nse, add support for new category in ldap-brute.nse and reflect new wording in examples in afp-brute.nse
This commit is contained in:
tomsellers
2011-09-13 01:44:30 +00:00
parent 5743a26565
commit b841ee37b7
3 changed files with 11 additions and 5 deletions

View File

@@ -10,7 +10,7 @@ Performs password guessing against Apple Filing Protocol (AFP).
-- PORT STATE SERVICE
-- 548/tcp open afp
-- | afp-brute:
-- |_ admin:KenSentMe => Login Correct
-- |_ admin:KenSentMe => Valid credentials
-- Information on AFP implementations
--

View File

@@ -28,7 +28,13 @@ This script uses some AD-specific support and optimizations:
-- @output
-- 389/tcp open ldap
-- | ldap-brute:
-- |_ ldaptest:ldaptest => Login Correct
-- |_ ldaptest:ldaptest => Valid credentials
-- | restrict.ws:restricted1 => Valid credentials, account cannot log in from current host
-- | restrict.time:restricted1 => Valid credentials, account cannot log in at current time
-- | valid.user:valid1 => Valid credentials
-- | expired.user:expired1 => Valid credentials, account expired
-- | disabled.user:disabled1 => Valid credentials, account disabled
-- |_ must.change:need2change => Valid credentials, password must be changed at next logon
--
-- @args ldap.base If set, the script will use it as a base for the password
-- guessing attempts. If both ldap.base and ldap.upnsuffix are unset the user
@@ -217,7 +223,7 @@ action = function( host, port )
if not status and response:match("AcceptSecurityContext error, data 775,") then
table.insert( valid_accounts, string.format("%s => Valid credentials, account locked", fq_username ) )
stdnse.print_verbose(2, string.format(" ldap-brute: %s => Valid credentials, account locked", fq_username ))
credTable:add(fq_username,password, creds.State.LOCKED)
credTable:add(fq_username,password, creds.State.LOCKED_VALID)
break
end
@@ -225,7 +231,7 @@ action = function( host, port )
if not status and response:match("AcceptSecurityContext error, data 533,") then
table.insert( valid_accounts, string.format("%s:%s => Valid credentials, account disabled", fq_username, password:len()>0 and password or "<empty>" ) )
stdnse.print_verbose(2, string.format(" ldap-brute: %s:%s => Valid credentials, account disabled", fq_username, password:len()>0 and password or "<empty>" ))
credTable:add(fq_username,password, creds.State.DISABLED)
credTable:add(fq_username,password, creds.State.DISABLED_VALID)
break
end

View File

@@ -27,7 +27,7 @@ result in a large number of accounts being locked out on the database server.
-- 1521/tcp open oracle syn-ack
-- | oracle-brute:
-- | Accounts
-- | system:powell => Valid credentials, account locked
-- | system:powell => Account locked
-- | haxxor:haxxor => Valid credentials
-- | Statistics
-- |_ Perfomed 157 guesses in 8 seconds, average tps: 19