⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 socks4_loop_connect.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script was written by Michel Arboi <mikhail@nessus.org# GPL# # Socks4 protocol is described on # http://www.socks.nec.com/protocol/socks4.protocol# Socks4a extension is described on # http://www.socks.nec.com/protocol/socks4a.protocol#if(description){ script_id(17155); script_version ("$Revision: 38 $"); name["english"] = "Connect back to SOCKS4 server"; script_name(english:name["english"]);  desc["english"] = "It was possible to connect to the SOCKS4 serverthrough itself. This allow anybody to saturate the proxy CPU, memory or file descriptors.Solution: reconfigure your proxy so that it refuses connections to itselfRisk factor : Medium"; script_description(english:desc["english"]);  summary["english"] = "Connect back to SOCKS4 proxy"; script_summary(english:summary["english"]);  script_category(ACT_ATTACK);  script_copyright(english:"This script is Copyright (C) 2005 Michel Arboi"); family["english"] = "Denial of Service"; family["francais"] = "D閚i de service"; script_family(english:family["english"], francais:family["francais"]); script_require_ports("Services/socks4", 1080); script_dependencie("find_service.nes", "find_service2.nasl"); exit(0);}## include("dump.inc");port = get_kb_item("Services/socks4");if (! port) port = 1080;if (! get_port_state(port)) exit(0);s = open_sock_tcp(port);if (! s) exit(0);p2 = port % 256;p1 = port / 256;a = split(get_host_ip(), sep: '.');cmd = raw_string(4, 1, p1, p2, int(a[0]), int(a[1]), int(a[2]), int(a[3]))	+ "root" + '\0';for (i = 3; i >= 0; i --){  send(socket: s, data: cmd);  data = recv(socket: s, length: 8, min: 8);  # dump(ddata: data, dtitle: "socks");  if (strlen(data) != 8 || ord(data[0]) != 4 || ord(data[1]) != 90) break;}close(s);if (i < 0) security_hole(port);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -