執行 URL指令 request , 對 Apache JServ Protocol 指定port 去查看是否有回應 例如: nmap -p 8009 --script ajp-request www.hinet.net 官方網站: https://nmap.org/nsedoc/scripts/ajp-request.html AJP說明: https://en.wikipedia.org/wiki/Apache_JServ_Protocol 內容: local ajp = require "ajp" local io = require "io" local shortport = require "shortport" local stdnse = require "stdnse" description = [[ Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file). Different AJP methods such as; GET, HEAD, TRACE, PUT or DELETE may be used. The Apache JServ Protocol is commonly used by web servers to communicate with back-end Java application server containers. ]] --- -- @usage -- nmap -p 8009 <ip> --script ajp-request -- -- @output -- PORT STATE SERVICE -- 8009/tcp open ajp13 -- | ajp-request: -- | <!DOCTYPE HTML> -- | <html> -- | <head> -- | <title>JSP Test</title> -- | ...
Detects the Mac OS X AFP directory traversal vulnerability 判斷 MacOS 那台 是否可以被暴力攻擊破解目錄 官方說明: https://nmap.org/nsedoc/scripts/afp-path-vuln.html 参考: https://www.cqure.net/wp/2010/03/detecting-apple-mac-os-x-afp-vulnerability-cve-2010-0533-with-nmap/ 內容: local afp = require "afp" local nmap = require "nmap" local shortport = require "shortport" local stdnse = require "stdnse" local table = require "table" local vulns = require "vulns" description = [[ Detects the Mac OS X AFP directory traversal vulnerability, CVE-2010-0533. This script attempts to iterate over all AFP shares on the remote host. For each share it attempts to access the parent directory by exploiting the directory traversal vulnerability as described in CVE-2010-0533. The script reports whether the system is vulnerable or not. In addition it lists the contents of the parent and child directories to a max depth of 2. When running in verbo...
留言
張貼留言