OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
nmap
/
nselib
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/07/2020 12:36:00 PM
rwxr-xr-x
📄
afp.lua
71.92 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ajp.lua
16.69 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
amqp.lua
10.5 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
anyconnect.lua
4.45 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
asn1.lua
14.57 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
base32.lua
7.33 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
base64.lua
5.67 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bin.lua
12.89 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bit.lua
2.43 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bitcoin.lua
16.99 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bits.lua
1.82 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bittorrent.lua
40.77 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bjnp.lua
9.45 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
brute.lua
50.04 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
cassandra.lua
5.78 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
citrixxml.lua
16 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
coap.lua
76.24 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
comm.lua
10.75 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
creds.lua
18.22 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
cvs.lua
3.13 KB
04/16/2018 01:11:39 AM
rw-r--r--
📁
data
-
08/07/2020 12:36:00 PM
rwxr-xr-x
📄
datafiles.lua
11.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
datetime.lua
1.16 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dhcp.lua
29.17 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dhcp6.lua
19.87 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dns.lua
51.44 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dnsbl.lua
19.02 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dnssd.lua
12.57 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
drda.lua
24.2 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
eap.lua
7.64 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
eigrp.lua
14.47 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
formulas.lua
5.35 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ftp.lua
9.03 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
geoip.lua
1.71 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
giop.lua
18.44 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
gps.lua
3.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
http.lua
105.81 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
httpspider.lua
36.15 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
iax2.lua
9.6 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ike.lua
15.02 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
imap.lua
9.59 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
informix.lua
39.76 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ipOps.lua
26.92 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ipmi.lua
10.02 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ipp.lua
12.54 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
irc.lua
757 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
iscsi.lua
21.45 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
isns.lua
15.34 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
jdwp.lua
43.57 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
json.lua
11.65 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ldap.lua
31.86 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
lfs.luadoc
1.68 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
libssh2-utility.lua
4.39 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
libssh2.luadoc
4.75 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
listop.lua
4.66 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
lpeg-utility.lua
5.64 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
lpeg.luadoc
351 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
ls.lua
10.96 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
match.lua
2.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
membase.lua
9.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mobileme.lua
8.46 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mongodb.lua
21.29 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mqtt.lua
28.95 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
msrpc.lua
179.93 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
msrpcperformance.lua
29.72 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
msrpctypes.lua
167.61 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mssql.lua
110.87 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
multicast.lua
6.1 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mysql.lua
17.09 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
natpmp.lua
5.04 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ncp.lua
36 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ndmp.lua
11.58 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
netbios.lua
13.9 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nmap.luadoc
40.34 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nrpc.lua
4.42 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nsedebug.lua
3.49 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
omp2.lua
4.77 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
openssl.luadoc
7.08 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ospf.lua
15.29 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
packet.lua
36.65 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pcre.luadoc
6.79 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pgsql.lua
20.61 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pop3.lua
5.7 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pppoe.lua
29.95 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
proxy.lua
12.04 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rdp.lua
11.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
re.lua
8.22 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
redis.lua
3.59 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rmi.lua
47.89 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rpc.lua
106.22 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rpcap.lua
11.19 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rsync.lua
5.19 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rtsp.lua
8.67 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sasl.lua
16.38 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
shortport.lua
8.01 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sip.lua
30.56 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
slaxml.lua
17.9 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smb.lua
175.85 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smb2.lua
16.32 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smbauth.lua
37.53 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smtp.lua
19.81 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
snmp.lua
15.99 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
socks.lua
8.26 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
srvloc.lua
12.25 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ssh1.lua
8.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ssh2.lua
11.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sslcert.lua
33.34 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sslv2.lua
9.63 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
stdnse.lua
45.93 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
strbuf.lua
4.52 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
strict.lua
2.53 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
stun.lua
11.51 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tab.lua
3.35 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
target.lua
3.93 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tftp.lua
9.38 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tls.lua
56.16 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tn3270.lua
43.75 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tns.lua
64.17 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
unicode.lua
14.32 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
unittest.lua
12.33 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
unpwdb.lua
10.08 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
upnp.lua
11.18 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
url.lua
12.09 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
versant.lua
8.6 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
vnc.lua
23.3 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
vulns.lua
76.29 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
vuzedht.lua
16.62 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
wsdd.lua
12.03 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
xdmcp.lua
11.9 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
xmpp.lua
15.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
Editing: ftp.lua
Close
--- -- FTP functions. -- -- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html local comm = require "comm" local stdnse = require "stdnse" local string = require "string" local ipOps = require "ipOps" local nmap = require "nmap" _ENV = stdnse.module("ftp", stdnse.seeall) local ERROR_MESSAGES = { ["EOF"] = "connection closed", ["TIMEOUT"] = "connection timeout", ["ERROR"] = "failed to receive data" } local crlf_pattern = "\r?\n" --- Connects to the FTP server based on the provided options and returns the parsed banner. -- -- @param host The host table -- @param port The port table -- @param opts The connection option table, from comm.lua. -- @return socket The socket descriptor, or nil on errors -- @return code The numeric response code, as returned by read_reply, or error message if socket is nil. -- @return message The response message -- @return buffer The socket read buffer function, to be passed to read_reply. -- @see comm.lua connect = function(host, port, opts) opts = opts or {} opts.recv_before = true local socket, err, proto, ret = comm.tryssl(host, port, '', opts) if not socket then return socket, (ERROR_MESSAGES[ret] or 'unspecified error') end local buffer = stdnse.make_buffer(socket, crlf_pattern) local pos = 1 -- Should we just pass the output of buffer()? local usebuf = false -- Since we already read the first chunk of banner from the socket, -- we have to supply it line-by-line to read_reply. local code, message = read_reply(function() if usebuf then -- done reading the initial banner; pass along the socket buffer. return buffer() end -- Look for CRLF local i, j = ret:find(crlf_pattern, pos) if not i then -- Didn't find it! Grab another chunk (up to CRLF) and return it usebuf = true local chunk = buffer() return ret:sub(pos) .. chunk end local oldpos = pos -- start the next search just after CRLF pos = j + 1 if pos >= #ret then -- We consumed the whole thing! Start calling buffer() next. usebuf = true end return ret:sub(oldpos, i - 1) end) return socket, code, message, buffer end --- -- Read an FTP reply and return the numeric code and the message. See RFC 959, -- section 4.2. -- @param buffer The buffer returned by ftp.connect or created with -- <code>stdnse.make_buffer(socket, "\r?\n")</code>. -- @return numeric code or <code>nil</code>. -- @return text reply or error message. function read_reply(buffer) local readline local line, err local code, message local _, p, tmp line, err = buffer() if not line then return line, err end -- Single-line response? code, message = string.match(line, "^(%d%d%d) (.*)$") if code then return tonumber(code), message end -- Multi-line response? _, p, code, message = string.find(line, "^(%d%d%d)%-(.*)$") if p then while true do line, err = buffer() if not line then return line, err end tmp = string.match(line, "^%d%d%d (.*)$") if tmp then message = message .. "\n" .. tmp break end message = message .. "\n" .. line end return tonumber(code), message end return nil, string.format("Unparseable response: %q", line) end --- Close an FTP command connection -- -- @param socket The socket with the live connection function close(socket) socket:send("QUIT\r\n") socket:close() end --- Issue a STARTTLS command. -- -- @param socket The connected command socket -- @param buffer The socket read buffer -- @return Boolean true if AUTH TLS succeeded, false otherwise -- @return error string on failure function starttls(socket, buffer) -- Send AUTH TLS command, ask the service to start encryption local status, err = socket:send("AUTH TLS\r\n") if not status then return nil, err end local code, result = read_reply(buffer) return code == 234, result end local function is_ssl(socket) return pcall(socket.get_ssl_certificate, socket) end -- Should we try STARTTLS based on this error? local function should_try_ssl(code, message) return code and code >= 400 and ( message:match('[Ss][Ss][Ll]') or message:match('[Tt][Ll][Ss]') or message:match('[Ss][Ee][Cc][Uu][Rr]') ) end -- Try to reconnect over STARTTLS. local function reconnect_ssl(socket, buffer) local status, err = starttls(socket, buffer) if status then status, err = socket:reconnect_ssl() if status then return true end end return nil, err end --- Authenticate with username and password -- -- May negotiate AUTH TLS if required -- @param socket The connected command socket -- @param buffer The socket read buffer -- @param username The username to send -- @param password The password to send -- @param acct (optional) If the server requires it, send this account name. Default: username -- @return Boolean true if auth succeeded, false otherwise -- @return FTP response code -- @return FTP response message function auth(socket, buffer, username, password, acct) local already_ssl = is_ssl(socket) ::TRY_AGAIN:: local status, err = socket:send(("USER %s\r\n"):format(username)) if not status then return nil, err end local code, message = read_reply(buffer) if code == 331 then -- 331: User name okay, need password. status, err =socket:send(("PASS %s\r\n"):format(password)) if not status then return nil, err end code, message = read_reply(buffer) elseif not already_ssl and should_try_ssl(code, message) then if not reconnect_ssl(socket, buffer) then return nil end already_ssl = true goto TRY_AGAIN end if code == 332 then -- 332: Need account for login. -- This is rarely seen but may come in response to a -- USER or PASS command. status, err = socket:send("ACCT %s\r\n"):format(acct or username) if not status then return nil, err end code, message = read_reply(buffer) if code == 331 then -- 331: User name okay, need password. status, err = socket:send("PASS %s\r\n"):format(password) if not status then return nil, err end code, message = read_reply(buffer) elseif not already_ssl and should_try_ssl(code, message) then if not reconnect_ssl(socket, buffer) then return nil end already_ssl = true goto TRY_AGAIN end end if code and code >= 200 and code < 300 then -- We are primarily looking for 230: User logged in, proceed. return true, code, message else if code and not already_ssl and should_try_ssl(code, message) then if not reconnect_ssl(socket, buffer) then return nil end already_ssl = true goto TRY_AGAIN end return nil, code, message end end --- Start PASV mode -- -- For IPv6 connections, attempts to use EPSV (RFC 2428). If the server sends an address that is not the target address, then this is an error. -- @param socket The connected command socket -- @param buffer The receive buffer -- @return The connected data socket, or nil on error -- @return Error message if data socket is nil function pasv(socket, buffer) local epsv = false local status, lhost, lport, rhost, rport = socket:get_info() if not status then return nil, ("Can't determine remote host IP: %s"):format(lhost) end epsv = #ipOps.ip_to_str(rhost) > 4 ::TRY_AGAIN:: local cmd = epsv and "EPSV" or "PASV" -- ask the server for a Passive Mode: it should give us a port to -- listen to, where it will dump the directory listing local status, err = socket:send(cmd .. "\r\n") if not status then return status, err end local code, message = read_reply(buffer) local pasv_port if epsv then if not code then return nil, ("EPSV failed: socket %s"):format(message) elseif code ~= 229 then stdnse.debug2("Falling back to PASV. EPSV: %d %s", code, message) epsv = false goto TRY_AGAIN end status, pasv_port = string.match(message, "%((.)%1%1(%d+)%1%)") if not status then stdnse.debug2("Can't parse EPSV response: %s", message) epsv = false goto TRY_AGAIN end else if not code or code >= 300 then return nil, ("PASV failed: %d %s"):format(code or "socket", message) end -- Compute the PASV port as given by the server -- The server should answer with something like -- 2xx Entering Passive Mode (a,b,c,d,hp,lp) -- (-- IP--,PORT) -- PORT is (hp x 256) + lp local ip, high, low = string.match(message, "%((%d+,%d+,%d+,%d+),(%d+),(%d+)%)") if not ip then return nil, string.format("Can't parse PASV response: %q", message) end ip = ip:gsub(",", ".") if not (ipOps.compare_ip(ip, "eq", rhost) or ipOps.compare_ip(ip, "eq", "0.0.0.0")) then return nil, ("PASV IP %s is not the same as %s"):format(ip, rhost) end pasv_port = high * 256 + low end local list_socket = nmap.new_socket() status, err = list_socket:connect(rhost, pasv_port, "tcp") if not status then return status, err end return list_socket end return _ENV;