enterasys_dragon_reporting_detect.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 71 行

NASL
71
字号
##  This script was written by David Maciejak <david dot maciejak at kyxar dot fr>#  This script is released under the GNU GPL v2#if(description){ script_id(18532); script_version("$Revision: 38 $");  name["english"] = "Enterasys Dragon Enterprise Reporting detection"; script_name(english:name["english"]);  desc["english"] = "The remote host is running the Enterasys Dragon Enterprise Reporting onthis port.Risk factor : None"; script_description(english:desc["english"]);  summary["english"] = "Checks for Enterasys Dragon Enterprise Reporting console";  script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2005 David Maciejak");  family["english"] = "Misc."; script_family(english:family["english"]); script_dependencie("http_version.nasl"); script_require_keys("www/apache"); script_require_ports(9443); exit(0);}## The script code starts here#include("http_func.inc");function https_get(port, request){    if(get_port_state(port))    {         soc = open_sock_tcp(port, transport:ENCAPS_SSLv23);         if(soc)         {            send(socket:soc, data:string(request,"\r\n"));            result = http_recv(socket:soc);            close(soc);            return(result);         }    }}port = 9443;if(get_port_state(port)){  req1 = http_get(item:"/dragon/login.jsp", port:port);  req = https_get(request:req1, port:port);  if(">Dragon Enterprise Reporting<" >< req)  {    security_note(port);  }}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?