1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 14:11:29 +00:00
Files
nmap/scripts/kibuvDetection.nse
2006-12-11 00:34:26 +00:00

54 lines
1.1 KiB
Lua

id = "Kibuv worm"
description = "\
A fake FTP server was installed by the KIBUV.B worm \
on this port. This worm uses known security flaws to \
infect the system. \
\
This machine may already be a 'zombi' used by crackers \
to perform distributed denial of service. \
\
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KIBUV.B&VSect=T"
author = "Diman Todorov <diman.todorov@gmail.com>"
license = "See nmaps COPYING for licence"
categories = {"malware"}
portrule = function(host, port)
local decision
if
( port.number == 7955
or
port.number == 14920
or
port.number == 42260)
and port.service == "ftp"
and port.protocol == "tcp"
and port.state == "open"
then
decision = true
else
decision = false
end
return decision
end
action = function(host, port)
local socket = nmap.new_socket()
socket:connect(host.ip, port.number)
local status, s = socket:receive_lines(1)
if string.match(s, "220 StnyFtpd 0wns j0")
or
string.match(s, "220 fuckFtpd 0wns j0")
then
return "Suspecting that the host is KIBUV.B infected"
end
return
end