local brute = require "brute"
local creds = require "creds"
local nmap = require "nmap"
local shortport = require "shortport"
local stdnse = require "stdnse"
local table = require "table"
description=[[
Performs brute force password auditing against a Nessus vulnerability scanning daemon using the XMLRPC protocol.
]]
---
-- @output
-- PORT STATE SERVICE REASON
-- 8834/tcp open unknown syn-ack
-- | nessus-xmlrpc-brute:
-- | Accounts
-- | nessus:nessus - Valid credentials
-- | Statistics
-- |_ Performed 1933 guesses in 26 seconds, average tps: 73
--
-- @args nessus-xmlrpc-brute.threads sets the number of threads.
-- @args nessus-xmlrpc-brute.timeout socket timeout for connecting to Nessus (default 5s)
author = "Patrik Karlsson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"intrusive", "brute"}
portrule = shortport.port_or_service(8834, "ssl/http", "tcp")
local arg_timeout = stdnse.parse_timespec(stdnse.get_script_args(SCRIPT_NAME..'.timeout'))
arg_timeout = (arg_timeout or 5) * 1000
local arg_threads = stdnse.get_script_args("nessus-xmlrpc-brute.threads")
local function authenticate(host, port, username, password)
local post_data = ("login=%s&password=%s"):format(username, password)
local headers = {
"POST /login HTTP/1.1",
"User-Agent: Nmap",
("Host: %s:%d"):format(host.ip, port.number),
"Accept: */*",
("Content-Length: %d"):format(#post_data),
"Content-Type: application/x-www-form-urlencoded",
}
local data = table.concat(headers, "\r\n") .. "\r\n\r\n" .. post_data
local socket = nmap.new_socket()
socket:set_timeout(arg_timeout)
local status, err = socket:connect(host, port)
if ( not(status) ) then
return false, "Failed to connect to server"
end
local status, err = socket:send(data)
if ( not(status) ) then
return false, "Failed to send request to server"
end
local status, response = socket:receive()
socket:close()
if ( not(status) ) then
return false, "Failed to receive response from server"
end
return status, response
end
Driver =
{
new = function (self, host, port )
local o = { host = host, port = port }
setmetatable (o,self)
self.__index = self
return o
end,
connect = function ( self ) return true end,
login = function( self, username, password )
local status, response = authenticate(self.host, self.port, username, password)
if ( status and response ) then
if ( response:match("^HTTP/1.1 200 OK.*OK") ) then
return true, creds.Account:new(username, password, creds.State.VALID)
elseif ( response:match("^HTTP/1.1 200 OK.*ERROR") ) then
return false, brute.Error:new("incorrect login")
end
end
local err = brute.Error:new( "incorrect response from server" )
err:setRetry(true)
return false, err
end,
disconnect = function( self ) return true end,
}
local function fail(err) return stdnse.format_output(false, err) end
action = function(host, port)
local status, response = authenticate(host, port, "nmap-ssl-test-probe", "nmap-ssl-test-probe")
if ( not(status) ) then
return fail(response)
end
-- patch the protocol due to the ugly way the Nessus web server works.
-- The server answers non-ssl connections as legitimate http stating that
-- the server should be connected to using https on the same port. ugly.
if ( status and response:match("^HTTP/1.1 400 Bad request\r\n") ) then
port.protocol = "ssl"
status, response = authenticate(host, port, "nmap-ssl-test-probe", "nmap-ssl-test-probe")
if ( not(status) ) then
return fail(response)
end
end
if ( not(response:match("^HTTP/1.1 200 OK.*Server: NessusWWW.*ERROR")) ) then
return fail("Failed to detect Nessus Web server")
end
local engine = brute.Engine:new(Driver, host, port)
if ( arg_threads ) then
engine:setMaxThreads(arg_threads)
end
engine.options.script_name = SCRIPT_NAME
local result
status, result = engine:start()
return result
end