HOME>>>>>>>>>

File smb-vuln-ms10-061

脚本使用类型: hostrule
脚本所属分类: vuln, intrusive
脚本下载地址: http://nmap.org/svn/scripts/smb-vuln-ms10-061.nse

User Summary

Tests whether target machines are vulnerable to ms10-061 Printer Spooler impersonation vulnerability.

This vulnerability was used in Stuxnet worm. The script checks for the vuln in a safe way without a possibility of crashing the remote system as this is not a memory corruption vulnerability. In order for the check to work it needs access to at least one shared printer on the remote system. By default it tries to enumerate printers by using LANMAN API which on some systems is not available by default. In that case user should specify printer share name as printer script argument. To find a printer share, smb-enum-shares can be used. Also, on some systems, accessing shares requires valid credentials which can be specified with smb library arguments smbuser and smbpassword.

References: - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729 - http://technet.microsoft.com/en-us/security/bulletin/MS10-061 - http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx

Script Arguments

printer

Printer share name. Optional, by default script tries to enumerate available printer shares.

vulns.showall

See the documentation for the vulns library.

randomseed, smbbasic, smbport, smbsign

See the documentation for the smb library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

Example Usage

执行格式

nmap  -p 445 <target> --script=smb-vuln-ms10-061

Script Output

PORT    STATE SERVICE      REASON
445/tcp open  microsoft-ds syn-ack

Requires


Author: Aleksandar Nikolic

License: VER007 整理 http://www.ver007.com