📄 securemote.nasl
字号:
# This script was written by Yoav Goldberg <yoavg@securiteam.com>## Body of a script#if(description){ script_name(english:"Checkpoint SecureRemote detection"); script_id(10617);#script_cve_id("CVE-MAP-NOMATCH"); script_version ("$Revision: 38 $");desc["english"] = "The remote host seems to be a Checkpoint FW-1 running SecureRemote.Letting attackers know that you are running FW-1 may enable them tofocus their attack or will make them change their attack strategy.You should not let this information leak out.Furthermore, an attacker can perform a denial of service attack on themachine.Solution:Restrict access to this port from untrusted networks.Risk factor : LowFor More Information:http://www.securiteam.com/securitynews/CheckPoint_FW1_SecureRemote_DoS.html"; script_description(english:desc["english"]); script_summary(english:"Determine if a remote host is running CheckPoint's SecureRemote"); script_category(ACT_GATHER_INFO); script_family(english:"Firewalls"); script_copyright(english:"This script is Copyright (C) 2001 SecuriTeam"); script_require_ports(264); exit(0);}## Actual script starts here#SecureRemote = 0;buffer1 = raw_string(0x41, 0x00, 0x00, 0x00);buffer2 = raw_string(0x02, 0x59, 0x05, 0x21);if(get_port_state(264)) { soc = open_sock_tcp(264); if(soc) { send(socket:soc, data:buffer1); send(socket:soc, data:buffer2); response = recv(socket:soc, length:5); if (response == buffer1) { SecureRemote = 1;} close(soc); } }if(SecureRemote){ set_kb_item(name:"Host/firewall", value:"Checkpoint Firewall-1"); security_warning(264);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -