指令類型:hostrule
Nmap Script摘要
偵測被Conficker蠕蟲感染的Microsoft Windows系統。這項檢查可能會導致系統崩潰,因此具有危險性。
基於Simple Conficker Scanner進行鬆散改編,
這項檢查之前是smb-check-vulns的一部分。
Nmap Script參數
smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
查看smbauth庫的文檔。
randomseed, smbbasic, smbport, smbsign
查看smb庫的文檔。
vulns.short, vulns.showall
查看vulns庫的文檔。
Nmap Script範例
nmap --script smb-vuln-conficker.nse -p445 <host>
nmap -sU --script smb-vuln-conficker.nse -p T:139 <host>
Nmap Script輸出
smb-vuln-conficker:
| VULNERABLE:
| Microsoft Windows system infected by Conficker
| State: VULNERABLE
| IDs: CVE:2008-4250
| This system shows signs of being infected by a variant of the worm Conficker.
| References:
| https://technet.microsoft.com/en-us/library/security/ms08-067.aspx
| http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Win32%2fConficker
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250
Nmap Script作者:
Ron Bowes Jiayi Ye Paulino Calderon <calderon()websec.mx>
License: Same as Nmap--See https://nmap.org/book/man-legal.html