home *** CD-ROM | disk | FTP | other *** search
- #
- # This script was written by David Maciejak <david dot maciejak at kyxar dot fr>
- # This script is released under the GNU GPL v2
- #
- if(description)
- {
- script_id(17583);
- script_version("$Revision: 1.1 $");
-
- name["english"] = "Aventail ASAP detection";
-
- script_name(english:name["english"]);
-
- desc["english"] = "
- The remote host seems to be an Aventail SSL VPN appliance,
- connections are allowed to the web console management.
-
- Letting attackers know that you are using this software will help
- them to focus their attack or will make them change their strategy.
- In addition to this, an attacker may attempt to set up a brute force attack
- to log into the remote interface.
-
- Solution : Filter incoming traffic to this port
- Risk factor : None";
-
- script_description(english:desc["english"]);
-
- summary["english"] = "Aventail ASAP Management Console management";
-
- script_summary(english:summary["english"]);
-
- script_category(ACT_GATHER_INFO);
-
- script_copyright(english:"This script is Copyright (C) 2005 David Maciejak");
-
- family["english"] = "Misc.";
- family["francais"] = "Divers";
- script_family(english:family["english"], francais:family["francais"]);
- script_dependencie("http_version.nasl");
-
- script_require_ports(8443);
- exit(0);
- }
-
- function https_get(port, request)
- {
- if(get_port_state(port))
- {
-
- soc = open_sock_tcp(port, transport:ENCAPS_SSLv23);
- if(soc)
- {
- send(socket:soc, data:string(request,"\r\n"));
- result = http_recv(socket:soc);
- close(soc);
- return(result);
- }
- }
- }
-
- #
- # The script code starts here
- #
- include("http_func.inc");
- include("http_keepalive.inc");
-
- port = 8443;
- if(get_port_state(port))
- {
- req = http_get(item:"/console/login.do", port:port);
- rep = https_get(request:req, port:port);
- if( rep == NULL ) exit(0);
- #<title>ASAP Management Console Login</title>
- if ("<title>ASAP Management Console Login</title>" >< rep)
- {
- security_note(port);
- }
- }
-