1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 14:11:29 +00:00
Commit Graph

1919 Commits

Author SHA1 Message Date
dmiller
3e54536dab Add http-server-header as a last-ditch means to get httpd version
See http://seclists.org/nmap-dev/2013/q3/599 for justification.
2013-11-08 21:19:36 +00:00
dmiller
a02dd889d7 Add xmloutput for ssh2-enum-algos 2013-11-08 17:46:07 +00:00
dmiller
86c8703486 Let dns-brute read candidate SRV records from dns-srv-names instead of hard-coded list 2013-11-01 22:10:37 +00:00
dmiller
40e9fe4746 Refactor dns-brute for readability 2013-11-01 21:48:54 +00:00
dmiller
85a86ecf8e Let dns-brute read candidates from vhosts-default.lst instead of hard-coded list 2013-11-01 21:48:53 +00:00
dmiller
9f1d2c472d Replace print() calls with stdnse.print_debug()
NSE scripts should not send data to stdout with print(). One exception
was not altered: url-snarf states in its documentation that urls are
sent to stdout by default, with a script-arg option to save to a file
instead.
2013-11-01 17:01:18 +00:00
dmiller
84c944fb71 Add xmloutput for dns-brute 2013-11-01 17:01:16 +00:00
dmiller
920f07d843 Normalize author fields, changing "and" to comma-sep 2013-11-01 15:56:37 +00:00
paulino
127679d055 Fixes false positive. 2013-10-31 17:37:22 +00:00
sophron
f57b58d095 [NSE] Updated Robtex scripts to make them work again. Primarily, changed the addresses to https and corrected some wrong patterns. 2013-10-31 17:15:52 +00:00
dmiller
901e414927 Author field should be a string, not table 2013-10-31 14:46:45 +00:00
paulino
3340ac27ef Adds http-iis-short-name-brute.nse. The script detects Microsoft IIS servers vulnerable to a filename disclosure and denial of service vulnerability. 2013-10-31 04:04:45 +00:00
dmiller
af8874d66f New script weblogic-t3-info
http://seclists.org/nmap-dev/2013/q4/74
2013-10-30 15:10:00 +00:00
dmiller
82e6745fe5 Update script.db for rfc868-time 2013-10-23 17:48:37 +00:00
dmiller
9207e2eda1 Add rfc868-time.nse, queries a Time protocol server 2013-10-23 17:45:48 +00:00
dmiller
4bbb4366d2 Fix name_confidence use (0-10, not 0-100) 2013-10-23 16:36:26 +00:00
fyodor
3daeedd608 Minor rewording for clarity that someone suggested 2013-10-22 00:51:58 +00:00
dmiller
4209ec0e82 Remove redundant verbosity check 2013-10-18 18:47:01 +00:00
dmiller
507f0bc3ee Remove use of __call output_table hack in favor of length (#) 2013-10-18 18:35:07 +00:00
dmiller
34cd23e101 Add xmloutput for ntp-info.nse 2013-10-18 18:35:05 +00:00
dmiller
a69a7fb676 Add xmloutput to dns-nsid.nse 2013-10-18 18:35:02 +00:00
dmiller
33a8bc11c4 Add xmloutput to socks-auth-info.nse 2013-10-18 18:34:55 +00:00
dmiller
1b07c5ce54 Add xmloutput to tls-nextprotoneg.nse 2013-10-18 18:34:54 +00:00
dmiller
35dbe4fe37 Add xmloutput to vnc-info.nse 2013-10-18 16:05:48 +00:00
dmiller
95585e4008 Add xmloutput to smbv2-enabled.nse 2013-10-18 16:05:46 +00:00
dmiller
66569165ac Add xmloutput to x11-access.nse 2013-10-18 16:05:45 +00:00
dmiller
8ce3b65272 Add xmloutput to sshv1.nse 2013-10-18 16:05:44 +00:00
patrik
e97a5b9d5a Add http-dlink-backdoor script that detects DLink routers with firmware
backdoor allowing admin access over HTTP interface.
2013-10-17 23:41:12 +00:00
dmiller
3945c287e9 Update nbstat.nse to structured XML output 2013-10-17 21:57:48 +00:00
sophron
a7b0fea687 [NSE] Added an enhancement to ssh-hostkey that makes a comparison with your known-hosts file. http://seclists.org/nmap-dev/2013/q3/587 2013-10-16 18:32:44 +00:00
fyodor
35e118802b Add some fingerprints of problematic keys reportedly belonging to APT1. Contributed by Mariusz Ziulek. http://seclists.org/nmap-dev/2013/q3/638 2013-09-28 03:13:07 +00:00
dmiller
31bc2847bd Normalize script author fields
Clean up some typos and differences. Most have been normalized to
whatever form of the name occurred in the largest number of scripts.
Paulino was contacted directly and requested his email be added to all
of his credits.
2013-09-20 18:56:22 +00:00
sophron
c084e2fd8d [NSE] Updated script.db. 2013-09-06 21:08:00 +00:00
sophron
27f241e20f [NSE] Added http-devframework (along with its fingerprints file) that tries to find out the technology behind the target website. 2013-09-05 19:31:40 +00:00
dmiller
989ae60dd2 Update traceroute-geolocation for new geoplugin.net API 2013-09-02 11:36:24 +00:00
david
f6c83d2a37 Performance improvement in telnet-brute.
By nnposter.
http://seclists.org/nmap-dev/2013/q3/413
2013-08-30 16:04:19 +00:00
sophron
441f840ba9 [NSE] Updated script.db 2013-08-23 02:38:20 +00:00
sophron
f7a0989391 [NSE] Added http-csrf.nse that detects Cross Site Request Forgeries (CSRF) vulnerabilities in HTML forms. 2013-08-23 02:08:09 +00:00
sophron
2283671742 [NSE] cccam-version.nse makes use of the new 'formulas' library. 2013-08-23 02:03:46 +00:00
sophron
1586dc3163 [NSE] Added http-feed.nse that crawls through the website and returns any rss or atom feeds. 2013-08-23 01:53:34 +00:00
sophron
ba35d3b087 [NSE] Added http-errors.nse that crawls through the website and returns any HTTP error pages. 2013-08-23 01:48:21 +00:00
sophron
9561155701 Patch by nnposter that improves performance of http-default-accounts
http://seclists.org/nmap-dev/2013/q3/346

For any given fingerprint from http-default-accounts-fingerprints
script http-default-accounts currently tests corresponding default
credentials if at least one  of the probe URLs succeeded, namely
returned with status other than 404.

Some web servers, such as Linksys devices, respond with HTTP/401 even
for non-existent URLs. This causes the script to assume that these URLs
do exist and to test the credentials, while ideally they should be
tested only on those servers where they make sense.

The purpose of the attached patches is to reduce unnecessary credential
guessing by implementing a new optional fingerprint element, function
target_check(), which takes some already collected target information,
including a probe URL response, and returns true or false, indicating
whether the credential guessing should be attempted or not.

All of the current fingerprints have been retrofitted with simple
target validations as follows:

* If the fingerprint uses native HTTP authentication, validate that the
target's realm matches the server type.

* If the fingerprint uses form-based authentication, validate that the
probe URL returned with HTTP/200 (as opposed to perhaps HTTP/401).

When testing against the above-mentioned Linksys the difference was
notable: 14 login attempts before the patch versus 1 attempt after the
patch.

This functionality provides opportunity for further improvement by
being able to match page content to differentiate between real HTTP/200
and a custom error page. (As of now the script completely skips targets
that return HTTP/200 for non-existent pages.)
2013-08-18 01:42:48 +00:00
fyodor
796c90ee0e Minor updates to the descriptions of some new scripts 2013-08-17 00:38:27 +00:00
sophron
af81f31573 Correctly handle cases where the basepath consists of a single character other than "/". 2013-08-15 17:32:39 +00:00
david
3728ece727 New revision of telnet-brute by nnposter.
http://seclists.org/nmap-dev/2013/q3/249

- Multi-threaded (thanks to nselib/brute.lua)

- Can automatically reduce number of threads if it senses that the
  target supports less than what brute.lua wants to use. Without this
  feature the script tends to bail out because brute.lua default of 10
  threads is too much for a lot of telnet targets. This saves the user
  the trouble of finding out how much the target can take before
  launching the script.

- Uses connection pooling for sending multiple login attempts across
  the same connection. This significantly improves performance.

- Supports password-only logins.

Other changes:

- Fixed support for Windows telnet service.
  Added support for Netgear RM356.

- Improved accuracy of target state detection.

Tested on:

- Cisco IOS
- Linux telnetd
- Windows telnet service
- Digital Sprite 2
- Nortel Contivity
- Netgear RM356
- Hummingbird telnetd
2013-08-15 07:11:08 +00:00
david
82df82b5fd Do base64-encoding of the SSH key before returning, not after.
Not all SSH key formats use base64 encoding, for example SSH1 keys looks
different. So we can't blindly base64-encode the raw strings that we
receive. Attempt to return keys in the same format as is used by the
known_hosts file.
2013-08-11 05:36:45 +00:00
sophron
623991eb82 Updated script.db. 2013-08-10 20:07:29 +00:00
sophron
cd23b07f9f [NSE] Removed facebook's domain name as an example. 2013-08-10 19:47:56 +00:00
sophron
1907693c35 [NSE] Added http-useragent-tester.nse. 2013-08-10 19:36:12 +00:00
sophron
b01bbdf733 [NSE] Added http-mobileversion-checker.nse. 2013-08-10 19:32:05 +00:00