summaryrefslogtreecommitdiffstats
path: root/scripts/rexec-brute.nse
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-17 07:42:04 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-17 07:42:04 +0000
commit0d47952611198ef6b1163f366dc03922d20b1475 (patch)
tree3d840a3b8c0daef0754707bfb9f5e873b6b1ac13 /scripts/rexec-brute.nse
parentInitial commit. (diff)
downloadnmap-0d47952611198ef6b1163f366dc03922d20b1475.tar.xz
nmap-0d47952611198ef6b1163f366dc03922d20b1475.zip
Adding upstream version 7.94+git20230807.3be01efb1+dfsg.upstream/7.94+git20230807.3be01efb1+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'scripts/rexec-brute.nse')
-rw-r--r--scripts/rexec-brute.nse113
1 files changed, 113 insertions, 0 deletions
diff --git a/scripts/rexec-brute.nse b/scripts/rexec-brute.nse
new file mode 100644
index 0000000..4e09e83
--- /dev/null
+++ b/scripts/rexec-brute.nse
@@ -0,0 +1,113 @@
+local brute = require "brute"
+local creds = require "creds"
+local shortport = require "shortport"
+local stdnse = require "stdnse"
+
+description=[[
+Performs brute force password auditing against the classic UNIX rexec (remote exec) service.
+]]
+
+---
+-- @usage
+-- nmap -p 512 --script rexec-brute <ip>
+--
+-- @output
+-- PORT STATE SERVICE
+-- 512/tcp open exec
+-- | rexec-brute:
+-- | Accounts
+-- | nmap:test - Valid credentials
+-- | Statistics
+-- |_ Performed 16 guesses in 7 seconds, average tps: 2
+--
+-- @args rexec-brute.timeout socket timeout for connecting to rexec (default 10s)
+
+-- Version 0.1
+-- Created 11/02/2011 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>
+
+
+author = "Patrik Karlsson"
+license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
+categories = {"brute", "intrusive"}
+
+portrule = shortport.port_or_service(512, "exec", "tcp")
+
+--- Copied from telnet-brute
+-- Decide whether a given string (presumably received from a telnet server)
+-- indicates a failed login
+--
+-- @param str The string to analyze
+-- @return Verdict (true or false)
+local is_login_failure = function (str)
+ local lcstr = str:lower()
+ return lcstr:find("%f[%w]incorrect%f[%W]")
+ or lcstr:find("%f[%w]failed%f[%W]")
+ or lcstr:find("%f[%w]denied%f[%W]")
+ or lcstr:find("%f[%w]invalid%f[%W]")
+ or lcstr:find("%f[%w]bad%f[%W]")
+end
+
+Driver = {
+
+ -- creates a new Driver instance
+ -- @param host table as received by the action function
+ -- @param port table as received by the action function
+ -- @return o instance of Driver
+ new = function(self, host, port, options)
+ local o = { host = host, port = port, timeout = options.timeout }
+ setmetatable(o, self)
+ self.__index = self
+ return o
+ end,
+
+ connect = function(self)
+ self.socket = brute.new_socket()
+ self.socket:set_timeout(self.timeout)
+ local status, err = self.socket:connect(self.host, self.port)
+ if ( not(status) ) then
+ local err = brute.Error:new("Connection failed")
+ err:setRetry( true )
+ return false, err
+ end
+ return true
+ end,
+
+ login = function(self, username, password)
+ local cmd = "id"
+ local data = ("\0%s\0%s\0%s\0"):format(username, password, cmd)
+
+ local status, err = self.socket:send(data)
+ if ( not(status) ) then
+ local err = brute.Error:new("Send failed")
+ err:setRetry( true )
+ return false, err
+ end
+
+ local response
+ status, response = self.socket:receive()
+ if ( status and not is_login_failure(response)) then
+ return true, creds.Account:new(username, password, creds.State.VALID)
+ end
+ return false, brute.Error:new( "Incorrect password" )
+ end,
+
+ disconnect = function(self)
+ self.socket:close()
+ end,
+
+}
+
+
+local arg_timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME .. ".timeout"))
+arg_timeout = (arg_timeout or 10) * 1000
+
+action = function(host, port)
+ local options = {
+ timeout = arg_timeout
+ }
+
+ local engine = brute.Engine:new(Driver, host, port, options)
+ engine.options.script_name = SCRIPT_NAME
+ local status, result = engine:start()
+ return result
+end