⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ece_flag.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
if (description){ script_id(12118); script_bugtraq_id(2293); script_version ("$Revision: 38 $"); script_name(english:"Firewall ECE-bit bypass"); script_cve_id("CVE-2001-0183");  desc["english"] = "The remote host seems vulnerable to a bug wherein a remoteattacker can circumvent the firewall by setting the ECE bitwithin the TCP flags field.  At least one firewall (ipfw) is known to exhibit this sort of behavior.Known vulnerable systems include all FreeBSD 3.x ,4.x, 3.5-STABLE, and 4.2-STABLE.Solution:  If you are running FreeBSD 3.X, 4.x, 3.5-STABLE,4.2-STABLE, upgrade your firewall.  If you are not running FreeBSD, contact your firewall vendor for a patch.See also: http://www.securityfocus.com/bid/2293/Risk Factor: High"; script_description(english:desc["english"]); script_summary(english:"Firewall ECE-bit bypass"); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2004 Andrey I. Zakharov and John Lampe"); exit(0);}include('global_settings.inc');if ( report_paranoia < 2 ) exit(0);if ( islocalnet() || islocalhost() ) exit(0);# start scriptsport= (rand() % 64511) + 1024;ipid = 1234;myack = 0xFF67;init_seq = 538;# so, we need a list of commonly open, yet firewalled ports...port[0] = 22;port[1] = 111;port[2] = 1025;port[3] = 139;port[4] = 3389;port[5] = 23;for (i=0; port[i]; i++) {    reply=NULL;    sport++;    filter = string("src port ", port[i], " and src host ", get_host_ip(), " and dst port ", sport);    # STEP 1:  Send a Naked SYN packet    ip = forge_ip_packet(ip_v:4, ip_hl:5, ip_tos:0,ip_off:0,ip_len:20,                         ip_p:IPPROTO_TCP, ip_id:ipid, ip_ttl:0x40,                         ip_src:this_host());    tcp = forge_tcp_packet(ip:ip, th_sport:sport, th_dport:port[i],                          th_flags:0x02, th_seq:init_seq,th_ack:myack,                          th_x2:0, th_off:5, th_win:2048, th_urp:0);    for ( j = 0 ; j < 3 ; j ++ )    {    	reply =  send_packet(tcp, 			pcap_active : TRUE,                        pcap_filter : filter,                        pcap_timeout : 1);    	if ( reply ) break;    }    # STEP 2:  If we don't get a response back from STEP 1,     # we will send a SYN+ECE to port    if (! reply)       {     	     sport++;    	     filter = string("src port ", port[i], " and src host ", get_host_ip(), " and dst port ", sport);             ip = forge_ip_packet(ip_v:4, ip_hl:5, ip_tos:0,ip_off:0,ip_len:20,                         ip_p:IPPROTO_TCP, ip_id:ipid, ip_ttl:0x40,                         ip_src:this_host());             tcp = forge_tcp_packet(ip:ip, th_sport:sport, th_dport:port[i],                          th_flags:0x42, th_seq:init_seq,th_ack:myack,                          th_x2:0, th_off:5, th_win:2048, th_urp:0);	     for ( j = 0; j < 3 ; j ++ )	     {             	reply =  send_packet(pcap_active : TRUE,                        pcap_filter : filter,                        pcap_timeout : 1,                        tcp);		if (reply) break;	     }             if (reply) 	     {                 flags = get_tcp_element(tcp:reply, element:"th_flags");                 if (flags & TH_ACK) security_hole(port);             }    }}exit(0);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -