1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-08 05:31:31 +00:00
Files
nmap/scripts/vnc-info.nse
djalal 30bd1681b0 o [NSE] Made the following scripts in the default category:
giop-info.nse
  vnc-info.nse
  ncp-serverinfo.nse
  afp-serverinfo.nse
2011-07-18 09:50:18 +00:00

58 lines
1.5 KiB
Lua

description = [[
Queries a VNC server for its protocol version and supported security types.
]]
author = "Patrik Karlsson"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"default", "discovery", "safe"}
---
-- @output
-- PORT STATE SERVICE
-- 5900/tcp open vnc
-- | vnc-info:
-- | Protocol version: 3.889
-- | Security types:
-- | Mac OS X security type (30)
-- |_ Mac OS X security type (35)
--
-- Version 0.2
-- Created 07/07/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>
-- Revised 08/14/2010 - v0.2 - changed so that errors are reported even without debugging
require 'shortport'
require 'vnc'
portrule = shortport.port_or_service( {5900, 5901, 5902} , "vnc", "tcp", "open")
action = function(host, port)
local vnc = vnc.VNC:new( host.ip, port.number )
local status, data
local result = {}
status, data = vnc:connect()
if ( not(status) ) then return " \n ERROR: " .. data end
status, data = vnc:handshake()
if ( not(status) ) then return " \n ERROR: " .. data end
status, data = vnc:getSecTypesAsStringTable()
if ( not(status) ) then return " \n ERROR: " .. data end
table.insert(result, ("Protocol version: %s"):format(vnc:getProtocolVersion()) )
if ( data and #data ~= 0 ) then
data.name = "Security types:"
table.insert( result, data )
end
if ( vnc:supportsSecType(vnc.sectypes.NONE) ) then
table.insert(result, "WARNING: Server does not require authentication")
end
return stdnse.format_output(status, result)
end