mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 12:41:29 +00:00
Fixed comments about arguments on the script.
Fixed description.
This commit is contained in:
@@ -1,18 +1,16 @@
|
|||||||
description=[[
|
description=[[
|
||||||
Checks if an open socks proxy is running on the target.
|
Checks if an Socks proxy is open.
|
||||||
|
|
||||||
The script attempts to connect to a proxy server and send socks4 and
|
The script attempts to connect to the proxy server and send the socks4 and socks5
|
||||||
socks5 payloads. It is considered an open proxy if the script receives
|
payloads. If the script receives a Request Granted from server, the proxy is considered open.
|
||||||
a Request GRanted response from the target port.
|
|
||||||
|
|
||||||
The payloads request permission to open a connection with
|
The payloads try to open a connection with www.google.com at port 80.
|
||||||
www.google.com at port 80. A different test host can be passed as
|
|
||||||
argument, as described below.
|
|
||||||
|
|
||||||
This script was strongly based on the http-open-proxy.nse script, written by Andre 'Buanzo' Busleiman.
|
A different host can be passed as argument, as described below.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
--@args openproxy.host Host that will be requested to the proxy
|
||||||
--@output
|
--@output
|
||||||
-- Interesting ports on scanme.nmap.org (64.13.134.52):
|
-- Interesting ports on scanme.nmap.org (64.13.134.52):
|
||||||
-- PORT STATE SERVICE
|
-- PORT STATE SERVICE
|
||||||
@@ -26,6 +24,7 @@ This script was strongly based on the http-open-proxy.nse script, written by And
|
|||||||
author = "Joao Correa <joao@livewire.com.br>"
|
author = "Joao Correa <joao@livewire.com.br>"
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
categories = {"default", "discovery", "external", "intrusive"}
|
categories = {"default", "discovery", "external", "intrusive"}
|
||||||
|
|
||||||
require "shortport"
|
require "shortport"
|
||||||
require "bin"
|
require "bin"
|
||||||
require "nmap"
|
require "nmap"
|
||||||
@@ -71,7 +70,7 @@ action = function(host, port)
|
|||||||
payload = bin.pack("H",paystring)
|
payload = bin.pack("H",paystring)
|
||||||
|
|
||||||
local socket = nmap.new_socket()
|
local socket = nmap.new_socket()
|
||||||
socket:set_timeout(1000)
|
socket:set_timeout(10000)
|
||||||
try = nmap.new_try(function() socket:close() end)
|
try = nmap.new_try(function() socket:close() end)
|
||||||
try(socket:connect(host.ip, port.number))
|
try(socket:connect(host.ip, port.number))
|
||||||
try(socket:send(payload))
|
try(socket:send(payload))
|
||||||
@@ -101,7 +100,7 @@ action = function(host, port)
|
|||||||
|
|
||||||
-- Send first Socks5 payload to estabilish connection without authentication
|
-- Send first Socks5 payload to estabilish connection without authentication
|
||||||
local socket2 = nmap.new_socket()
|
local socket2 = nmap.new_socket()
|
||||||
socket2:set_timeout(1000)
|
socket2:set_timeout(10000)
|
||||||
try = nmap.new_try(function() socket2:close() end)
|
try = nmap.new_try(function() socket2:close() end)
|
||||||
try(socket2:connect(host.ip, port.number))
|
try(socket2:connect(host.ip, port.number))
|
||||||
try(socket2:send(payload))
|
try(socket2:send(payload))
|
||||||
|
|||||||
Reference in New Issue
Block a user