1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00
Files
nmap/scripts/rpcinfo.nse
david 4863d506c1 Remove script ids. Scripts are identified by file name in output (just the
basename without ".nse", or the full path with debugging level 2 or higher).
This includes documentation changes in scripting.xml.
2008-11-05 00:52:55 +00:00

118 lines
3.8 KiB
Lua

description = [[
Connects to portmapper and fetches a list of all registered programs.
]]
---
-- @output
-- 111/tcp open rpcbind
-- | rpcinfo:
-- | 100000 2 111/udp rpcbind
-- | 100005 1,2,3 705/udp mountd
-- | 100003 2,3,4 2049/udp nfs
-- | 100024 1 32769/udp status
-- | 100021 1,3,4 32769/udp nlockmgr
-- | 100000 2 111/tcp rpcbind
-- | 100005 1,2,3 706/tcp mountd
-- | 100003 2,3,4 2049/tcp nfs
-- | 100024 1 50468/tcp status
-- |_ 100021 1,3,4 50468/tcp nlockmgr
require "shortport"
require "datafiles"
require "bin"
require "bit"
require "tab"
author = "Sven Klemm <sven@c3d2.de>"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"default","safe","discovery"}
portrule = shortport.port_or_service(111, "rpcbind")
--- Format a table of version for output.
--@param version_table table containing the versions .
--@return string with the formatted versions.
local format_version = function( version_table )
table.sort( version_table )
return table.concat( version_table, ',' )
end
action = function(host, port)
local socket = nmap.new_socket()
socket:set_timeout(1000)
local catch = function() socket:close() end
local try = nmap.new_try(catch)
local rpc_numbers = try(datafiles.parse_rpc())
try(socket:connect(host.ip, port.number))
-- build rpc dump call packet
local transaction_id = math.random(0x7FFFFFFF)
local request = bin.pack('>IIIIIIILL',0x80000028,transaction_id,0,2,100000,2,4,0,0)
try(socket:send(request))
local answer = try(socket:receive_bytes(1))
local _,offset,header,length,tx_id,msg_type,reply_state,accept_state,value,payload,last_fragment
last_fragment = false; offset = 1; payload = ''
-- extract payload from answer and try to receive more packets if
-- RPC header with last_fragment set has not been received
-- If we can't get further packets don't stop but process what we
-- got so far.
while not last_fragment do
if offset > #answer then
local status, data = socket:receive_bytes(1)
if not status then break end
answer = answer .. data
end
offset,header = bin.unpack('>I',answer,offset)
last_fragment = bit.band( header, 0x80000000 ) ~= 0
length = bit.band( header, 0x7FFFFFFF )
payload = payload .. answer:sub( offset, offset + length - 1 )
offset = offset + length
end
socket:close()
offset,tx_id,msg_type,reply_state,_,_,accept_state = bin.unpack( '>IIIIII', payload )
-- transaction_id matches, message type reply, reply state accepted and accept state executed successfully
if tx_id == transaction_id and msg_type == 1 and reply_state == 0 and accept_state == 0 then
local dir = { udp = {}, tcp = {}}
local protocols = {[6]='tcp',[17]='udp'}
local prog, version, proto, port
offset, value = bin.unpack('>I',payload,offset)
while value == 1 and #payload - offset >= 19 do
offset,prog,version,proto,port,value = bin.unpack('>IIIII',payload,offset)
proto = protocols[proto] or tostring( proto )
-- collect data in a table
dir[proto] = dir[proto] or {}
dir[proto][port] = dir[proto][port] or {}
dir[proto][port][prog] = dir[proto][port][prog] or {}
table.insert( dir[proto][port][prog], version )
end
-- format output
local output = tab.new(4)
for proto, o in pairs(dir) do
-- get list of all used ports
local ports = {}
for port,_ in pairs(o) do table.insert(ports, port) end
table.sort(ports)
-- iterate over ports to produce output
for _, port in ipairs(ports) do
for prog, versions in pairs(o[port]) do
local name = rpc_numbers[prog] or ''
tab.addrow(output,prog,format_version(versions),('%5d/%s'):format(port,proto),name)
end
end
end
return ' \n' .. tab.dump( output )
end
end