mirror of
https://github.com/nmap/nmap.git
synced 2025-12-08 21:51:28 +00:00
49 lines
1.3 KiB
Lua
49 lines
1.3 KiB
Lua
description = [[
|
|
Determines the supported authentication mechanisms of a remote SOCKS
|
|
proxy server. Starting with SOCKS version 5 socks servers may support
|
|
authentication. The script checks for the following authentication
|
|
types:
|
|
0 - No authentication
|
|
1 - GSSAPI
|
|
2 - Username and password
|
|
]]
|
|
|
|
---
|
|
-- @usage
|
|
-- nmap -p 1080 <ip> --script socks-auth-info
|
|
--
|
|
-- @output
|
|
-- PORT STATE SERVICE
|
|
-- 1080/tcp open socks
|
|
-- | socks-auth-info:
|
|
-- | No authentication
|
|
-- |_ Username and password
|
|
--
|
|
|
|
require 'shortport'
|
|
require 'socks'
|
|
|
|
author = "Patrik Karlsson"
|
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
|
categories = {"discovery", "safe", "default"}
|
|
|
|
portrule = shortport.port_or_service({1080, 9050}, {"socks", "socks5", "tor-socks"})
|
|
|
|
action = function(host, port)
|
|
|
|
local helper = socks.Helper:new(host, port)
|
|
local auth_methods = {}
|
|
|
|
-- iterate over all authentication methods as the server only responds with
|
|
-- a single supported one if we send a list.
|
|
for _, method in pairs(socks.AuthMethod) do
|
|
local status, response = helper:connect( method )
|
|
if ( status ) then
|
|
table.insert(auth_methods, helper:authNameByNumber(response.method))
|
|
end
|
|
end
|
|
|
|
helper:close()
|
|
if ( 0 == #auth_methods ) then return end
|
|
return stdnse.format_output(true, auth_methods)
|
|
end |