jm_fssniffer.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 48 行

NASL
48
字号
## This script was written by Joseph Mlodzianowski <joseph@rapter.net># # if(description){script_id(11854);script_version ("$Revision: 38 $");name["english"] = "FsSniffer Detection";script_name(english:name["english"]);desc["english"] = "This host appears to be running FsSniffer on this port.FsSniffer is backdoor which allows an intruder to stealPoP3/FTP and other passwords you use on your system.An attacker may use it to steal your passwords.Solution : see www.rapter.net/jm1.htm for details on removalRisk factor : High";script_description(english:desc["english"]);summary["english"] = "Determines the presence of FsSniffer";script_summary(english:summary["english"]);script_category(ACT_GATHER_INFO);script_copyright(english:"This script is Copyright (C) 2003 J.Mlodzianowski");family["english"] = "Backdoors";script_family(english:family["english"]);script_dependencie("find_service2.nasl");exit(0);}## The code starts here#port =  get_kb_item("Services/RemoteNC");if(port)security_hole(port);

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?