1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

48 Commits

Author SHA1 Message Date
nnposter
96dcf4e9ed Remove various "the the" repeats. Closes #2804 2024-03-16 01:16:34 +00:00
nnposter
c4f9e48dd3 Output of matched fingerprints in http-default-accounts. Fixes #2077 2020-07-21 23:49:28 +00:00
nnposter
7b828b89b4 Corrects argument name in the documentation. Closes #1468 2019-02-11 16:45:46 +00:00
nnposter
20b6bbda98 Report empty credentials as <blank> 2019-01-06 18:18:12 +00:00
nnposter
fc3c9159be Adds searching by fingerprint name 2018-12-18 17:30:30 +00:00
nnposter
ece05c34ee Miscellaneous code clean-up 2018-07-15 23:42:31 +00:00
nnposter
78601bc7c3 Rectifies a recently introduced bug that impacted fingerprint loading.
Incorrect registry entry was tested for cached fingerprints, which was
preventing the script to run against more than one target host/port.
2018-07-15 23:14:04 +00:00
dmiller
a87f36109d Load http default accounts fingerprints only once 2018-03-06 04:04:54 +00:00
rewanth
d9504537e6 Removes unused dependencies from all files in scripts folder. 2017-08-15 07:26:00 +00:00
nnposter
95c42025d7 Suppresses empty output if no credentials are found 2017-03-29 23:23:22 +00:00
nnposter
56b6a9b3eb Documents the CPE entry in fingerprints for script http-default-accounts 2016-12-28 20:13:09 +00:00
nnposter
7b9c6e74d9 Adds CPE entries to individual fingerprints (where known). XML output only. 2016-12-04 20:46:21 +00:00
nnposter
b0b94049b7 Implements XML structured output. Closes #604 2016-12-04 20:31:30 +00:00
nnposter
ede50cec50 Removes a limitation of script http-default-accounts that prevented testing of systems returning status 200 for non-existent pages. Closes #577 2016-10-30 19:20:28 +00:00
nnposter
de2ed2eec6 Implements consistent local cache control and redirect handling for script http-default-accounts. Closes #551 2016-10-30 18:58:25 +00:00
nnposter
5ac669b71c Removes non-existent 4th parameter from http.pipeline_go() calls 2016-09-27 18:56:27 +00:00
nnposter
efa565615b Removes leading comment from action() to prevent polluting nsedoc 2016-09-02 23:32:32 +00:00
nnposter
42b1491904 Aligns HTTP pipeline initialization with the API specification for http.pipeline_add() 2016-09-02 13:17:19 +00:00
nnposter
fc69ad90b2 Adds a fingerprint for VMware ESXi hypervisor 2016-08-30 21:12:59 +00:00
nnposter
3af4a0c20c Adds a fingerprint for Schneider Modicon Web Server 2016-08-30 21:09:24 +00:00
nnposter
3419a71b24 Adds a fingerprint for HP Storage Management Utility 2016-08-30 21:06:02 +00:00
nnposter
74769a0da6 Corrects categories listed in the description to reflect actually implemented fingerprints 2016-08-29 01:34:03 +00:00
nnposter
14cfbc6084 Improves efficiency of script http-default-accounts by sharing probe results across fingerprints. Closes #516 2016-08-19 15:01:04 +00:00
tomsellers
58f00324eb NSE: Prevent http.identify_404 from following HTTP redirects, standardize calls to it. Closes #251 2015-12-05 10:16:51 +00:00
dmiller
f4619edece Update http urls for nmap.org to https 2015-11-05 20:41:05 +00:00
dmiller
7852fa3c18 Remove many ERROR outputs from non-debug NSE output 2015-08-27 20:43:55 +00:00
dmiller
137d2e3e94 The \z escape is Lua5.2 only, and NSEdoc portal uses 5.1, so this hack didn't work 2015-01-19 04:12:57 +00:00
dmiller
fb6e1f013c Fix some nsedoc issues with http-default-accounts 2015-01-15 19:50:13 +00:00
devin
5e6c9d5f78 NSE enhanced output patch 2014-05-29 03:22:59 +00:00
tomsellers
4e572fadb2 Change http-default-accounts.nse from safe to intrusive as it attempts to login to the target. 2014-04-27 12:33:10 +00:00
dmiller
8e06cf53d4 http-default-accounts should return nil, not false, on failure 2014-02-20 22:10:15 +00:00
dmiller
1b71f75aad Spelling fixes for Lua files
Mostly in documentation/comments, but a couple code bugs were caught,
including a call to stdnse.pirnt_debug and a mis-declared variable.
2014-02-19 04:15:46 +00:00
dmiller
31a2c432e1 Final re-indent for scripts. 2014-02-02 15:33:39 +00:00
dmiller
620f9fdb34 Remove trailing whitespace in lua files
Whitespace is not significant, so this should not be a problem.
https://secwiki.org/w/Nmap/Code_Standards
2014-01-23 21:51:58 +00:00
dmiller
31bc2847bd Normalize script author fields
Clean up some typos and differences. Most have been normalized to
whatever form of the name occurred in the largest number of scripts.
Paulino was contacted directly and requested his email be added to all
of his credits.
2013-09-20 18:56:22 +00:00
sophron
9561155701 Patch by nnposter that improves performance of http-default-accounts
http://seclists.org/nmap-dev/2013/q3/346

For any given fingerprint from http-default-accounts-fingerprints
script http-default-accounts currently tests corresponding default
credentials if at least one  of the probe URLs succeeded, namely
returned with status other than 404.

Some web servers, such as Linksys devices, respond with HTTP/401 even
for non-existent URLs. This causes the script to assume that these URLs
do exist and to test the credentials, while ideally they should be
tested only on those servers where they make sense.

The purpose of the attached patches is to reduce unnecessary credential
guessing by implementing a new optional fingerprint element, function
target_check(), which takes some already collected target information,
including a probe URL response, and returns true or false, indicating
whether the credential guessing should be attempted or not.

All of the current fingerprints have been retrofitted with simple
target validations as follows:

* If the fingerprint uses native HTTP authentication, validate that the
target's realm matches the server type.

* If the fingerprint uses form-based authentication, validate that the
probe URL returned with HTTP/200 (as opposed to perhaps HTTP/401).

When testing against the above-mentioned Linksys the difference was
notable: 14 login attempts before the patch versus 1 attempt after the
patch.

This functionality provides opportunity for further improvement by
being able to match page content to differentiate between real HTTP/200
and a custom error page. (As of now the script completely skips targets
that return HTTP/200 for non-existent pages.)
2013-08-18 01:42:48 +00:00
sophron
af81f31573 Correctly handle cases where the basepath consists of a single character other than "/". 2013-08-15 17:32:39 +00:00
sophron
d3cb3dfa37 Fixed category's name in the description of http-default-accounts.nse. 2013-07-29 22:19:59 +00:00
tomsellers
644595d077 Modified multiple scripts that operated against HTTP based services so as to remove false positives that were generated when the target service answers with a 200 response to all requests.
Some scripts that had been previously modified were updated so that the debug output was consistent.

A few scripts were calling identify_404 with host.ip as opposed to the proper host object.  This has been adjusted as well.
2012-07-08 12:41:37 +00:00
perdo
5ac6c7d64a Fixed errors found by nse_check_globals. 2012-06-06 22:23:02 +00:00
batrick
000f6dc4d9 Lua 5.2 upgrade [1] for NSE.
[1] http://seclists.org/nmap-dev/2012/q2/34
2012-05-27 08:53:32 +00:00
fyodor
2ff08a24a1 Update some script nsedoc descriptions for consistency. The description should almost always start with an active verb and never with the script name or 'this script'. Admittedly that makes the first sentence a fragment. The first sentence should be capitalized 2011-09-11 20:50:56 +00:00
fyodor
bff90f3d55 minor updates to the nsedoc descriptions for some scripts 2011-09-11 18:26:37 +00:00
paulino
c8c2ef76d0 Fixes typo in default fingerprint file 2011-07-27 04:56:41 +00:00
paulino
26dc09ad43 Gets arguments with stdnse.get_script_args instead of reading them from nmap.registry 2011-07-27 03:28:13 +00:00
paulino
7c75967507 Quits iterating over probes when a valid login for that application has been found. If we don't quit we get the same valid credentials in different paths. 2011-07-08 18:43:51 +00:00
paulino
89bf1d1661 Fixes bug when adding credentials using creds library. 2011-07-04 20:55:39 +00:00
paulino
82a68e02db Adds http-default-accounts - It tests for access with default credentials in a variety of web applications and devices.
It works similar to http-enum, we detect applications by matching known paths and launching a login routine using default credentials when found.
This script depends on a fingerprint file containing the target's information: name, category, location paths, default credentials and login routine.
2011-07-01 21:43:34 +00:00