⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 nortel_passport_default_pass.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
 # # This script was written by Rui Bernardino <rbernardino@oni.pt> # # See the Nessus Scripts License for details #  if(description) {	 script_id(10989);       script_version ("$Revision: 38 $");	 name["english"] = "Nortel/Bay Networks default password";	 script_name(english:name["english"]); 	 desc["english"] = " The remote switch/routers uses the default password. This means that anyone who has (downloaded) a user manual can telnet to it and gain administrative access.  Solution: telnet this switch/router and change all passwords  (check the manual for default users)  Risk factor : High"; 	 script_description(english:desc["english"]); 	 summary["english"] = "Logs into the remote Nortel switch/router";	 script_summary(english:summary["english"]); 	 script_category(ACT_ATTACK); 	 script_copyright(english:"This script is Copyright (C) 2002 Rui Bernardino");	 family["english"] = "Misc.";	 script_family(english:family["english"]);	 script_require_ports(23); 	 exit(0); }  # # The script code starts here # include('telnet_func.inc'); port = 23;  if(get_port_state(port)) {	banner = get_telnet_banner(port:port);	if ( !banner || "Passport" >!< banner ) exit(0);        # Although there are at least 11 (!?) default passwords to check, the passport will only allow       # 3 attempts before closing down the telnet port for 60 seconds. Fortunatelly, nothing prevents       # you to establish a new connection for each password attempt and then close it before the 3 attempts.              user[0]="rwa";       pass[0]="rwa";              user[1]="rw";       pass[1]="rw";              user[2]="l3";       pass[2]="l3";              user[3]="l2";       pass[3]="l2";              user[4]="ro";       pass[4]="ro";              user[5]="l1";       pass[5]="l1";              user[6]="l4admin";       pass[6]="l4admin";              user[7]="slbadmin";       pass[7]="slbadmin";              user[8]="operator";       pass[8]="operator";              user[9]="l4oper";       pass[9]="l4oper";              user[10]="slbop";       pass[10]="slbop";              PASS=11;              for(i=0;i<PASS;i=i+1) {	       soc=open_sock_tcp(port);	       if(!soc)exit(0);	       buf=telnet_negotiate(socket:soc);	       #display(buf);	       if("NetLogin:" >< buf)exit(0);	       if ( "Passport" >< buf ){			       if ("Login:" >< buf) {				       test = string(user[i],"\n",pass[i],"\n");				       send(socket:soc, data:test);				       resp = recv(socket:soc, length:1024);				       #display(resp);				       if("Access failure" >< resp)exit(0);				       if(!("Login" >< resp)) {					       desc = string ("Password for user ",user[i]," is ",pass[i]);					       security_hole(port:port, data:desc);				       }			       }		       close (soc);	       }	        else exit(0);       } }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -