-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kippo-detect.nse #72
Comments
Do we have this as a signature already? |
no, not that i'm aware of. at least not in 6.0.0. not sure about the newer version. script works good though! |
Hi! Maybe it would be nice to check with the development version from the repository before! I've just read your script and have a couple of comments:
|
i guess a fingerprint could possibly work. my initial findings were that i was able to get TCP 22 to spit out data that could be used to fingerprint the kippo service, when connecting via a telnet client: there's also an existing metasploit module, which works well and uses the technique i describe: |
@dmiller-nmap thoughts? |
Version detection will not work for this, since the SSH banner is matched on the Null probe, so doing a NSE script is the right move. But @cldrn is correct, the portrule should be |
@dmiller-nmap thanks for the explanation, makes sense. If the string can be anything that does not start with |
can i submit a new script here?
https://github.com/x-42/nmap-kippo-detect.nse/blob/master/kippo-detect.nse
The text was updated successfully, but these errors were encountered: