⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sybase_asa_ping.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# kst-gpl## (C) David Lodge 13/08/2007# This script is based on sybase_blank_password.nasl which is (C) Tenable Security## This script is released under the GPLv2#desc["english"] = "Synopsis :The remote database server is affected by an information disclosurevulnerability. Description :The remote Sybase SQL Anywhere / Adaptive Server Anywhere database isconfigured to listen for client connection broadcasts, which allows anattacker to see the name and port that the Sybase SQL Anywhere /Adaptive Server Anywhere server is running on. See also :http://www.sybase.com/products/databasemanagement/sqlanywhereSolution :Switch off broadcast listening via the '-sb' switch when startingSybase. Risk factor :Medium / CVSS Base Score : 5.0(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)";if(description){ script_id(80089);; script_version ("$Revision: 1.1 $"); name["english"] = "Sybase ASA Ping"; script_name(english:name["english"]); script_description(english:desc["english"]);  summary["english"] = "Locate service enabled on Sybase server"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2007 David Lodge"); family["english"] = "Databases"; script_family(english:family["english"]); exit(0);}## The script code starts here#include("misc_func.inc");port = 2638;if (!get_udp_port_state(port)) exit(0);req = raw_string(   0x1b, 0x00, 0x00, 0x39, 0x00, 0x00, 0x00, 0x00, 0x12,   "CONNECTIONLESS_TDS",   0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00,   0x04, 0x00, 0x00, 0x01, 0x02, 0x00, 0x00, 0x03, 0x01, 0x01,   0x04, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00);soc = open_sock_udp(port);if(soc){   send(socket:soc, data:req);   r  = recv(socket:soc, length:4096);   close(soc);   if(!r)exit(0);    name="";   length=ord(r[0x27]);   for (i=0x28;i<0x27+length;i++)   {      name+=r[i];   }   offset=0x27+length+3;   serverport=ord(r[offset])*256+ord(r[offset+1]);   report = desc["english"] +      string("\n\nPlugin output :\n\n") +      "Database name: " + name + string("\n") +      "Database port: " + serverport;   security_warning(port:port, protocol:"udp", data:report);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -