ping_asp.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 30 行
NASL
30 行
## This script was written by Michel Arboi <arboi@alussinan.org>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com># Erik Anderson <eanders@carmichaelsecurity.com># Added CAN. Added link to the Bugtraq message archive## See the Nessus Scripts License for details#if(description){ script_id(10968); script_version ("$Revision: 38 $"); name["english"] = "ping.asp"; script_name(english:name["english"]); desc["english"] = "The 'ping.asp' CGI is installed. Some versionsallows a cracker to launch a ping flood against your machine or another by entering'127.0.0.1 -l 65000 -t' in the Address field.Solution : remove it.Reference : http://online.securityfocus.com/archive/82/275088Risk factor : High"; desc["francais"] = "Le CGI 'ping.asp' est install
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?