📄 telnetserver_detect_type_nd_version.nasl
字号:
## This script was written by Noam Rathaus <noamr@securiteam.com>## See the Nessus Scripts License for details#if(description){ script_id(10281); script_version ("$Revision: 38 $");#script_cve_id("CVE-MAP-NOMATCH"); name["english"] = "Detect Server type and version via Telnet"; script_name(english:name["english"]); desc["english"] = "This detects the Telnet Server's type and version by connecting to the server and processing the buffer received.This information gives potential attackers additional information about thesystem they are attacking. Versions and Types should be omittedwhere possible.Solution: Change the login banner to something generic.Risk factor : Low"; script_description(english:desc["english"]); summary["english"] = "Detect Server type and version via Telnet"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 1999 SecuriTeam"); family["english"] = "General"; script_family(english:family["english"]); script_dependencies("find_service.nes", "doublecheck_std_services.nasl"); script_require_ports("Services/telnet", 23); exit(0);}## The script code starts here#include("telnet_func.inc");port = get_kb_item("Services/telnet");if(!port)port = 23;if (get_port_state(port)){ banner = get_telnet_banner(port: port); if(strlen(banner)) { data = string("Remote telnet banner :\n"); if(banner)data = data + banner; l = strlen(banner); security_note(port:port, data:data); }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -