mirror of
https://github.com/nmap/nmap.git
synced 2025-12-09 22:21:29 +00:00
o Replaced kibuvDetection.nse with version detection match lines which
work better than the script. [Kris, Brandon]
This commit is contained in:
@@ -79,6 +79,9 @@ o Changed SSLv2-support.nse so that it only enumerates the list of
|
||||
available ciphers with a verbosity level of at least two or with
|
||||
debugging enabled. [Kris]
|
||||
|
||||
o Replaced kibuvDetection.nse with version detection match lines which
|
||||
work better than the script. [Kris, Brandon]
|
||||
|
||||
o Removed mswindowsShell.nse as there is a version detection NULL probe
|
||||
match which accomplishes the same thing. [Brandon, Fyodor, Kris]
|
||||
|
||||
|
||||
@@ -85,6 +85,8 @@ match backdoor m|^\xfa\xcb\xd9\xd9\xdd\xc5\xd8\xce\xd6| p/Theef trojan/ i/**BACK
|
||||
match backdoor m|^220 SSL Connection Established - Loading Protocol\.\.\.\.\r\n| p/dhcpse.exe/ i/**BACKDOOR**/ o/Windows/
|
||||
match backdoor m|^A-311 Death welcome\x001| p/Haxdoor trojan/ i/**BACKDOOR**/ o/Windows/
|
||||
match backdoor m|^220 CAFEiNi [-\w_.]+ FTP server\r\n$| p/CAFEiNi trojan/ i/**BACKDOOR**/ o/Windows/
|
||||
match backdoor m/^220 (Stny|fuck)Ftpd 0wns j0\r?\n/ p/Kibuv.b worm/ i/**BACKDOOR**/ o/Windows/
|
||||
match backdoor m|^220 [Sf.][tu.][nc.][yk.][.F][t.][p.][d.] [0.][w.][n.][s.] [j.][0.]\r?\n|i p/Generic Kibuv worm/ i/**BACKDOOR**/ o/Windows/
|
||||
|
||||
match bf2rcon m|^### Battlefield 2 ModManager Rcon v([\d.]+)\.\n### Digest seed: \w+\n\n| p/Battlefield 2 ModManager Remote Console/ v/$1/
|
||||
|
||||
@@ -482,7 +484,6 @@ match ftp m|^220 HD316\r FTP server\(Version([\d.]+)\) ready\.\r\n| p/Panasonic
|
||||
match ftp m=^220 \w+ IBM Infoprint (Color |)(\d+) FTP Server ([\d.]+) ready\.\r\n= p/IBM Inforprint $1$2 ftpd/ v/$3/ d/printer/
|
||||
match ftp m|^220 ShareIt FTP Server ([\d.]+) \(WINCE\) Ready\.\r\n| p/ShareIt ftpd/ v/$1/ d/PDA/
|
||||
match ftp m|^220 ShareIt FTP Pro ([\d.]+) \(WINCE\) Ready\.\r\n| p/ShareIt Pro ftpd/ v/$1/ d/PDA/
|
||||
match ftp m|^220 StnyFtpd 0wns j0\n$| p/Unknown ftp backdoor/
|
||||
match ftp m|^220 ISOS FTP Server for Upgrade Purpose \(([\d.]+)\) ready\r\n| p/Billion 741GE ADSL router/ v/$1/ d/router/
|
||||
match ftp m|^220 PV11 FTP Server ready\r\n| p/Unknown wireless acces point ftpd/ i/Runs Phar Lap RTOS/ d/router/
|
||||
match ftp m|^220 Alize Session Manager FTP Server\r\n| p/Alcatel OmniPCX ftpd/ d/PBX/
|
||||
|
||||
@@ -1,37 +0,0 @@
|
||||
id = "Kibuv worm"
|
||||
|
||||
description = "\
|
||||
A fake FTP server was installed by the KIBUV.B worm \
|
||||
on this port. This worm uses known security flaws to \
|
||||
infect the system. \
|
||||
\
|
||||
This machine may already be a 'zombi' used by crackers \
|
||||
to perform distributed denial of service. \
|
||||
\
|
||||
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KIBUV.B&VSect=T"
|
||||
|
||||
author = "Diman Todorov <diman.todorov@gmail.com>"
|
||||
|
||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||
|
||||
categories = {"malware"}
|
||||
|
||||
require "shortport"
|
||||
|
||||
portrule = shortport.port_or_service({7955, 14920, 42260}, "ftp")
|
||||
|
||||
action = function(host, port)
|
||||
local socket = nmap.new_socket()
|
||||
|
||||
socket:connect(host.ip, port.number)
|
||||
local status, s = socket:receive_lines(1)
|
||||
|
||||
if string.match(s, "220 StnyFtpd 0wns j0")
|
||||
or
|
||||
string.match(s, "220 fuckFtpd 0wns j0")
|
||||
then
|
||||
return "Suspecting that the host is KIBUV.B infected"
|
||||
end
|
||||
|
||||
return
|
||||
end
|
||||
@@ -10,7 +10,7 @@ Entry{ category = "version", filename = "PPTPversion.nse" }
|
||||
Entry{ category = "backdoor", filename = "RealVNC_auth_bypass.nse" }
|
||||
Entry{ category = "demo", filename = "SMTP_openrelay_test.nse" }
|
||||
Entry{ category = "discovery", filename = "SMTPcommands.nse" }
|
||||
Entry{ category = "intrusive", filename = "SMTPcommands.nse" }
|
||||
Entry{ category = "safe", filename = "SMTPcommands.nse" }
|
||||
Entry{ category = "discovery", filename = "SNMPsysdesr.nse" }
|
||||
Entry{ category = "safe", filename = "SNMPsysdesr.nse" }
|
||||
Entry{ category = "vulnerability", filename = "SQLInject.nse" }
|
||||
@@ -28,7 +28,6 @@ Entry{ category = "intrusive", filename = "ftpbounce.nse" }
|
||||
Entry{ category = "version", filename = "iax2Detect.nse" }
|
||||
Entry{ category = "discovery", filename = "ircServerInfo.nse" }
|
||||
Entry{ category = "malware", filename = "ircZombieTest.nse" }
|
||||
Entry{ category = "malware", filename = "kibuvDetection.nse" }
|
||||
Entry{ category = "discovery", filename = "nbstat.nse" }
|
||||
Entry{ category = "safe", filename = "nbstat.nse" }
|
||||
Entry{ category = "version", filename = "netbios-smb-os-discovery.nse" }
|
||||
|
||||
Reference in New Issue
Block a user