Current Path : /usr/local/share/nmap/scripts/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //usr/local/share/nmap/scripts/RealVNC_auth_bypass.nse |
id="RealVNC Authentication Bypass (CVE-2006-2369)" description="Checks to see if the VNC Server is vulnerable to the RealVNC authentication bypass." author = "Brandon Enright <bmenrigh@ucsd.edu>" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"default", "malware", "vuln"} require "shortport" portrule = shortport.port_or_service(5900, "vnc") action = function(host, port) local socket = nmap.new_socket() local result local status = true socket:connect(host.ip, port.number, port.protocol) status, result = socket:receive_lines(1) if (result == "TIMEOUT") then socket:close() return end socket:send("RFB 003.008\n") status, result = socket:receive_bytes(2) if (result == "TIMEOUT") then socket:close() return end if (result ~= "\001\002") then socket:close() return end socket:send("\001") status, result = socket:receive_bytes(4) if (result == "TIMEOUT") then socket:close() return end if (result ~= "\000\000\000\000") then socket:close() return end socket:close() return "Vulnerable" end