📄 realvnc_auth_bypass.nse
字号:
id="RealVNC Authentication Bypass (CVE-2006-2369)"description="Checks to see if the VNC Server is vulnerable to the RealVNC authentication bypass."author = "Brandon Enright <bmenrigh@ucsd.edu>" license = "See nmaps COPYING for licence"categories = {"backdoor"}require "shortport"portrule = shortport.port_or_service(5900, "vnc")action = function(host, port) local socket = nmap.new_socket() local result local status = true socket:connect(host.ip, port.number, port.protocol) status, result = socket:receive_lines(1) if (result == "TIMEOUT") then socket:close() return end socket:send("RFB 003.008\n") status, result = socket:receive_bytes(2) if (result == "TIMEOUT") then socket:close() return end if (result ~= "\001\002") then socket:close() return end socket:send("\001") status, result = socket:receive_bytes(4) if (result == "TIMEOUT") then socket:close() return end if (result ~= "\000\000\000\000") then socket:close() return end socket:close() return "Vulnerable"end
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -