smb_virii.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 956 行 · 第 1/2 页

NASL
956
字号
## (C) Tenable Network Security## This script is released under the GPLv2## kst-depend-smbif(description){ script_id(80043); script_version("$Revision: 1.71 $"); name["english"] = "The remote host is infected by a virus"; script_name(english:name["english"]);  desc["english"] = "This script checks for the presence of different virii on the remotehost, by using the SMB credentials you provide Nessus with.- W32/Badtrans-B- JS_GIGGER.A@mm- W32/Vote-A- W32/Vote-B- CodeRed- W32.Sircam.Worm@mm- W32.HLLW.Fizzer@mm- W32.Sobig.B@mm- W32.Sobig.E@mm- W32.Sobig.F@mm- W32.Sobig.C@mm- W32.Yaha.J@mm- W32.mimail.a@mm- W32.mimail.c@mm- W32.mimail.e@mm- W32.mimail.l@mm- W32.mimail.p@mm- W32.Welchia.Worm- W32.Randex.Worm- W32.Beagle.A- W32.Novarg.A- Vesser- NetSky.C- Doomran.a- Beagle.m- Beagle.j- Agobot.FO- NetSky.W- Sasser- W32.Wallon.A- W32.MyDoom.M- W32.MyDoom.AI- W32.MyDoom.AX- W32.Aimdes.B- W32.Aimdes.C- W32.ahker.D- Hackarmy.i- W32.Erkez.D/Zafi.d- Winser-A- Berbew.K- Hotword.b- W32.Backdoor.Ginwui.B- W32.Wargbot- W32.Randex.GEL- W32.Fujacks.B	Risk factor : HighSolution : See the URLs which will appear in the report"; script_description(english:desc["english"]);  summary["english"] = "Checks for the presence of different virii on the remote host"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2005 Tenable Network Security"); family["english"] = "Windows"; script_family(english:family["english"]);  script_dependencies("netbios_name_get.nasl", 		     "smb_login.nasl","smb_registry_access.nasl"); script_require_keys("SMB/name", "SMB/login", "SMB/password",  "SMB/registry_access"); script_require_ports(139, 445); exit(0);}include("smb_func.inc");include("smb_hotfixes.inc");if ( get_kb_item("SMB/samba") ) exit(0);global_var handle;name = kb_smb_name();if(!name)exit(0);port = kb_smb_transport();if(!port)exit(0);if(!get_port_state(port))return(FALSE);login = kb_smb_login();pass  = kb_smb_password();domain = kb_smb_domain();if(!login)login = "";if(!pass) pass = "";	  soc = open_sock_tcp(port);if(!soc) exit(0);session_init(socket:soc, hostname:name);ret = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$");if ( ret != 1 ) exit(0);handle = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);if ( isnull(handle) ) exit(0);run = "SOFTWARE\Microsoft\Windows\CurrentVersion";key_h = RegOpenKey(handle:handle, key:run, mode:MAXIMUM_ALLOWED);n = 0;if ( ! isnull(key_h) ) { info = RegQueryInfoKey(handle:key_h); if ( ! isnull(info) )  {  for ( i = 0 ; i != info[0] ; i ++ )  {   value = RegEnumValue(handle:key_h, index:i);   if ( isnull(value) ) break;   content = RegQueryValue(handle:key_h, item:value[1]);   run_content[n++] = value[1];   run_content[n++] = content[1];  } }}RegCloseKey(handle:key_h);function check_reg(name, url, key, item, exp){  local_var key_h, sz, i, report;  # Look in our local "cache" first  if ( key == "SOFTWARE\Microsoft\Windows\CurrentVersion\Run" )  {    for ( i = 0 ; run_content[i]; i += 2 )	{	  if ( run_content[i] == item )		{		 if ( exp == NULL ) return TRUE;		 else if ( tolower(exp) >< tolower(run_content[i+1]) ) return TRUE;		 else return FALSE;		}	}     return FALSE;  }  key_h = RegOpenKey(handle:handle, key:key, mode:MAXIMUM_ALLOWED);  if  ( ! isnull(key_h) )  {    value = RegQueryValue(handle:key_h, item:item);    RegCloseKey(handle:key_h);    if ( isnull(value) ) return 0;  }  else return 0;   if(exp == NULL || tolower(exp) >< tolower(value)) {  report = string("The virus '", name, "' is present on the remote host\n","Solution : ", url, "\n","Risk factor : High");   security_hole(port:kb_smb_transport(), data:report); }}i = 0;name = NULL;# http://www.infos3000.com/infosvirus/badtransb.htmname[i] 	= "W32/Badtrans-B";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.badtrans.b@mm.html";key[i] 		= "SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce";item[i] 	= "kernel32";exp[i]		= "kernel32.exe";i++;# http://www.infos3000.com/infosvirus/jsgiggera.htmname[i] 	= "JS_GIGGER.A@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/js.gigger.a@mm.html";key[i] 		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i] 	= "NAV DefAlert";exp[i]		= NULL;i ++;# http://www.infos3000.com/infosvirus/vote%20a.htmname[i]		= "W32/Vote-A";url[i]		= "http://www.sophos.com/virusinfo/analyses/w32vote-a.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "Norton.Thar";exp[i]		= "zacker.vbs";i++ ;name[i]         = "W32/Vote-B";url[i]          = "http://securityresponse.symantec.com/avcenter/venc/data/w32.vote.b@mm.html";key[i]          = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]         = "ZaCker";exp[i]          = "DaLaL.vbs";i ++;# http://www.infos3000.com/infosvirus/codered.htmname[i]		= "CodeRed";url[i]		= "http://www.symantec.com/avcenter/venc/data/codered.worm.html";key[i]		= "SYSTEM\CurrentControlSet\Services\W3SVC\Parameters";item[i]		= "VirtualRootsVC";exp[i]		= "c:\,,217";i ++;# http://www.infos3000.com/infosvirus/w32sircam.htmname[i]		= "W32.Sircam.Worm@mm";url[i]		= "http://www.symantec.com/avcenter/venc/data/w32.sircam.worm@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices";item[i]		= "Driver32";exp[i] 		= "scam32.exe";i++;name[i]  	= "W32.HLLW.Fizzer@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.fizzer@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "SystemInit";exp[i]		= "iservc.exe";i++;name[i]  	= "W32.Sobig.B@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.b@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "SystemTray";exp[i]		= "msccn32.exe";i ++;name[i]		= "W32.Sobig.E@mm";url[i]		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.e@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "SSK Service";exp[i]		= "winssk32.exe";i ++;name[i]		= "W32.Sobig.F@mm";url[i]		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "TrayX";exp[i]		= "winppr32.exe";i ++;name[i]		= "W32.Sobig.C@mm";url[i]		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.c@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "System MScvb";exp[i]		= "mscvb32.exe";i ++;name[i] 	= "W32.Yaha.J@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.yaha.j@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "winreg";exp[i]		= "winReg.exe";i++;name[i] 	= "W32.mimail.a@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.a@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "VideoDriver";exp[i]		= "videodrv.exe";i++;name[i] 	= "W32.mimail.c@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.c@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "NetWatch32";exp[i]		= "netwatch.exe";i++;name[i] 	= "W32.mimail.e@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.e@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "SystemLoad32";exp[i]		= "sysload32.exe";i++;name[i] 	= "W32.mimail.l@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.l@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "France";exp[i]		= "svchost.exe";i++;name[i] 	= "W32.mimail.p@mm";url[i] 		= "http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.p@mm.html";key[i]		= "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]		= "WinMgr32";exp[i]		= "winmgr32.exe";i++;name[i]        = "W32.Welchia.Worm";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.html";key[i]         = "SYSTEM\CurrentControlSet\Services\RpcTftpd";item[i]        = "ImagePath";exp[i]         = "%System%\wins\svchost.exe";i++;name[i]        = "W32.Randex.Worm";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.b.html";key[i]         = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]        = "superslut";exp[i]         = "msslut32.exe";i++;name[i]        = "W32.Randex.Worm";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.c.html";key[i]         = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]        = "Microsoft Netview";exp[i]         = "gesfm32.exe";i++;name[i]        = "W32.Randex.Worm";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.d.html";key[i]         = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]        = "mssyslanhelper";exp[i]         = "msmsgri32.exe";i++;name[i]        = "W32.Randex.Worm";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.d.html";key[i]         = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]        = "mslanhelper";exp[i]         = "msmsgri32.exe";i ++;name[i]        = "W32.Beagle.A";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.a@mm.html";key[i]         = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]        = "d3update.exe";exp[i]         = "bbeagle.exe";i ++;name[i]        = "W32.Novarg.A";url[i]         = "http://securityresponse.symantec.com/avcenter/venc/data/w32.novarg.a@mm.html";key[i]         = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]        = "TaskMon";exp[i]         = "taskmon.exe";i++;name[i]       = "Vesser";url[i]        = "http://www.f-secure.com/v-descs/vesser.shtml";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "KernelFaultChk";exp[i]        = "sms.exe";i++;name[i]       = "NetSky.C";url[i]        = "http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.c@mm.html";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "ICQ Net";exp[i]        = "winlogon.exe";i++;name[i]      = "Doomran.a";url[i]       = "http://es.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_DOOMRAN.A";key[i]       = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]      = "Antimydoom";exp[i]       = "PACKAGE.EXE";i++;name[i]      = "Beagle.m";url[i]       = "http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.m@mm.html";key[i]       = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]      = "winupd.exe";exp[i]       = "winupd.exe";i++;name[i]      = "Beagle.j";url[i]       = "http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.j@mm.html";key[i]       = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]      = "ssate.exe";exp[i]       = "irun4.exe";i++;name[i]      = "Agobot.FO";url[i]       = "http://www.f-secure.com/v-descs/agobot_fo.shtml";key[i]       = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]      = "nVidia Chip4";exp[i]       = "nvchip4.exe";i ++;name[i]       = "NetSky.W";url[i]        = "http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.w@mm.html";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "NetDy";exp[i]        = "VisualGuard.exe";i++;name[i]       = "Sasser";url[i]        = "http://www.lurhq.com/sasser.html";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "avserve.exe";exp[i]        = "avserve.exe";i++;name[i]       = "Sasser.C";url[i]        = "http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.c.worm.html";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "avserve2.exe";exp[i]        = "avserve2.exe";i++;name[i]       = "W32.Wallon.A";url[i]        = "http://securityresponse.symantec.com/avcenter/venc/data/w32.wallon.a@mm.html";key[i]        = "SOFTWARE\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B1}";item[i]       = "Icon";exp[i]        = NULL;i++;name[i]       = "W32.MyDoom.M / W32.MyDoom.AX";url[i]        = "http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.ax@mm.html";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "JavaVM";exp[i]        = "JAVA.EXE";i++;name[i]       = "W32.MyDoom.AI";url[i]        = "http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.ai@mm.html";key[i]        = "SOFTWARE\Microsoft\Windows\CurrentVersion\Run";item[i]       = "lsass";exp[i]        = "lsasrv.exe";

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?