猜解默认数据库和conn.asp暴库的NASL脚本
呵呵,脚本语言发挥起来也是很强大的。 :)
CODE:
include("http_func.inc");
include("http_keepalive.inc");
dir = make_list("/data/database.mdb", "/data/data.mdb", "/data/date.mdb", "/data/bbs.mdb", "/data/dvbbs7.mdb", "/data.mdb", "/database.mdb");
#display(dir);
foreach path (dir)
{
if (port = is_cgi_installed(path))
{
#display(path);
report = "
Under the cgi path " + path + " found database!
Your database is possiblly to be download!
";
solution = "Solution : you d better rename the database name, or move the database to other cgis
";
Risk_factor = "Risk factor: High ";
report = report + solution + Risk_factor;
security_hole(data:string(report), port:port);
}
}
# conn.asp
port = get_http_port(default:80);
if(!get_port_state(port))exit(0);
dirs = make_list("/conn.inc", "/conn.asp", "/connection.asp", "/inc/conn.inc", "/inc/conn.asp", "/inc/connection.asp");
foreach paths (dirs)
{
req = http_get(item:paths, port:port);
r = http_keepalive_send_recv(port:port, data:req, bodyonly:1);
if (r == NULL) exit(0);
if (egrep(pattern:"80004005", string:r))
{
info = ereg_replace(pattern:.*([^0-9]:.*).*, string:r, replace:\1);
report = The path + info + maybe is the database physical path!
Your databae is possiblly to be download!
;
Solution =
Solution : Please modify the conn.asp file add ON ERROR RESUME NEXT statement.
+ Risk factor : Medium
;
report = report + Solution;
security_hole(data:report, port:port);
display("
");
}
}
上一篇: hadoop2.6源码解读之DFSClient方法调用的RPC流程讲解
下一篇: 很扫兴了