����JFIF��� ( %"1"%)+...383,7(-.- 404 Not Found
Sh3ll
OdayForums


Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20
System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64
User : apache ( 48)
PHP Version : 7.4.20
Disable Function : NONE
Directory :  /usr/share/nmap/scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/nmap/scripts/metasploit-msgrpc-brute.nse
local brute = require "brute"
local shortport = require "shortport"
local stdnse = require "stdnse"
local string = require "string"
local http = require "http"
local bin = require "bin"
local creds = require "creds"

description = [[
Performs brute force username and password auditing against 
Metasploit msgrpc interface.

]]

---
-- @usage
-- nmap --script metasploit-msgrpc-brute -p 55553 <host>
--
-- This script uses brute library to perform password
-- guessing agains Metasploit's msgrpc interface.
-- 
--
-- @output
-- PORT      STATE SERVICE REASON
-- 55553/tcp open  unknown syn-ack
-- | metasploit-msgrpc-brute:
-- |   Accounts
-- |     root:root - Valid credentials
-- |   Statistics
-- |_    Performed 10 guesses in 10 seconds, average tps: 1



author = "Aleksandar Nikolic"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"intrusive", "brute"}

portrule = shortport.port_or_service(55553,"metasploit-msgrpc")


-- simple function that implements basic msgpack encoding we need for this script
-- see http://wiki.msgpack.org/display/MSGPACK/Format+specification for more
local encode = function(username, password)
	local method = "auth.login"
	local username_prefix 
	local password_prefix 
	
	if string.len(username) <= 31 then -- http://wiki.msgpack.org/display/MSGPACK/Format+specification#Formatspecification-fixraw
		username_prefix = bin.pack("C",0xa0 + string.len(username))
	else -- http://wiki.msgpack.org/display/MSGPACK/Format+specification#Formatspecification-raw16
		username_prefix = bin.pack("C",0xda)  .. bin.pack("s",string.len(username))
	end
	if string.len(password) <= 31 then
		password_prefix = bin.pack("C",0xa0 + string.len(password))
	else 
		password_prefix = bin.pack("C",0xda)  .. bin.pack("s",string.len(password))
	end
	
	return bin.pack("C",0x93) .. bin.pack("C",0xaa) .. method .. username_prefix .. username .. password_prefix .. password
end

Driver = {

	new = function(self, host, port)
		local o = {}
       	setmetatable(o, self)
        self.__index = self
		o.host = host
		o.port = port
		return o
	end,

	-- as we are using http methods, no need for connect and disconnect
	-- this might cause a problem as in other scripts that don't have explicit connect
	-- as there is no way to "reserve" a socket 
	connect = function( self )
		return true
	end,
	
	login = function (self, user, pass)
		local data
		local options = {
			header = {
				["Content-Type"] = "binary/message-pack"
			}
		}
		stdnse.print_debug( "Trying %s/%s ...", user, pass )
		data = http.post(self.host,self.port, "/api/",options, nil , encode(user,pass))
		if data and data.status and tostring( data.status ):match( "200" )  then
			if string.find(data.body,"success") then
				return true, brute.Account:new( user, pass, creds.State.VALID)
			else
				return false,  brute.Error:new( "Incorrect username or password" )
			end
		end
		local err = brute.Error:new("Login didn't return a proper response")
		err:setRetry( true )
		return false, err
	end,

	disconnect = function( self ) 
		return true
	end
}

action = function( host, port )

	local status, result 
	local engine = brute.Engine:new(Driver, host, port)
	engine.options.script_name = SCRIPT_NAME
	engine.options.firstonly = true 
	engine.max_threads = 3
	engine.max_retries = 10
	status, result = engine:start()
	
	return result
end

ZeroDay Forums Mini