針對 port 5353 傳送 空的 UDP 封包(IP4, IP6)對某台電腦 進行 類似暴力攻擊 官方: https://nmap.org/nsedoc/scripts/broadcast-avahi-dos.html 內容: local dnssd = require "dnssd" local nmap = require "nmap" local stdnse = require "stdnse" local table = require "table" description=[[ Attempts to discover hosts in the local network using the DNS Service Discovery protocol and sends a NULL UDP packet to each host to test if it is vulnerable to the Avahi NULL UDP packet denial of service (CVE-2011-1002). The <code>broadcast-avahi-dos.wait</code> script argument specifies how many number of seconds to wait before a new attempt of host discovery. Each host who does not respond to this second attempt will be considered vulnerable. Reference: * http://avahi.org/ticket/325 * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002 ]] --- -- @usage -- nmap --script=broadcast-avahi-dos -- -- @output -- | broadcast-avahi-dos: -- | Discover
留言
張貼留言