ping_asp.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 30 行

NASL
30
字号
## This script was written by Michel Arboi <arboi@alussinan.org>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>#      Erik Anderson <eanders@carmichaelsecurity.com>#      Added CAN.  Added link to the Bugtraq message archive## See the Nessus Scripts License for details#if(description){ script_id(10968); script_version ("$Revision: 38 $");  name["english"] = "ping.asp"; script_name(english:name["english"]);  desc["english"] = "The 'ping.asp' CGI is installed. Some versionsallows a cracker to launch a ping flood against your machine or another by entering'127.0.0.1 -l 65000 -t' in the Address field.Solution : remove it.Reference : http://online.securityfocus.com/archive/82/275088Risk factor : High"; desc["francais"] = "Le CGI 'ping.asp' est install

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?