403Webshell
Server IP : 101.53.144.229  /  Your IP : 216.73.216.181
Web Server : Apache
System : Linux host.gdigitalindia.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : digitalshiksha ( 1179)
PHP Version : 5.6.40
Disable Function : eval,show_source,system,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,dl,show_source,curl_multi_exechellcmd, ini_restore,apache_get_modules,get_cfg_var,passthru, exec ,proc_get_status,fpassthru,c999_buff_prepare,c999_sess_put,c99_buff_prepare,c99_sess_put,proc_close,ini_alter,dl,symlink,link,proc_close,ini_alter,dl,symlink,link,mail
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/nmap/scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/nmap/scripts/broadcast-networker-discover.nse
local nmap = require "nmap"
local rpc = require "rpc"
local stdnse = require "stdnse"
local table = require "table"

description = [[
Discovers EMC Networker backup software servers on a LAN by sending a network broadcast query.
]]

---
-- @usage nmap --script broadcast-networker-discover
--
-- @output
-- Pre-scan script results:
-- | broadcast-networker-discover: 
-- |_  10.20.30.40
--
--

author = "Patrik Karlsson"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"broadcast", "safe"}


prerule = function() return true end

local function Callit( host, port, program, protocol )
	
	local results = {}
	local portmap, comm = rpc.Portmap:new(), rpc.Comm:new('rpcbind', 2)

	local status, result = comm:Connect(host, port)
	if (not(status)) then
		return false, result
	end

	comm.socket:set_timeout(10000)
	status, result = portmap:Callit(comm, program, protocol, 2 )
	if ( not(status) ) then
		return false, result
	end

	while ( status ) do
		local _, rhost
		status, _, _, rhost, _ = comm:GetSocketInfo()
		if (not(status)) then
	    	return false, "Failed to get socket information"
		end
		
		if ( status ) then
			table.insert(results, rhost)
		end
	
		status, result = comm:ReceivePacket()
	end
	
	comm:Disconnect()
	return true, results
end

local function fail(err) return ("\n  ERROR: %s"):format(err or "") end

action = function()

	local results = {}
	local ip = ( nmap.address_family() == "inet" ) and "255.255.255.255" or "ff02::202"
	local iface = nmap.get_interface()
	
	-- handle problematic sends on OS X requiring the interface to be
	-- supplied as part of IPv6
	if ( iface and nmap.address_family() == "inet6" ) then
		ip = ip .. "%" .. iface
	end
	
	for _, port in ipairs({7938,111}) do
		local host, port = { ip = ip }, { number = port, protocol = "udp" }
		local status
		status, results = Callit( host, port, "nsrstat", "udp" )
		
		-- warn about problematic sends on OS X requiring the interface to be
		-- supplied as part of IPv6
		if ( not(status) and results == "Portmap.Callit: Failed to send data" ) then
			return fail("Failed sending data, try supplying the correct interface using -e")
		end
		
		if ( status ) then
			break
		end
	end
	
	if ( "table" == type(results) and 0 < #results ) then
		return stdnse.format_output(true, results)
	end
end

Youez - 2016 - github.com/yon3zu
LinuXploit