# # This script was written by David Maciejak # This script is released under the GNU GPL v2 # if(description) { script_id(17585); script_version("$Revision: 1.1 $"); name["english"] = "ISS deployment manager detection"; script_name(english:name["english"]); desc["english"] = " The remote host appears to run ISS deployment manager, connections are allowed to the web interface to remote install various SiteProtector components. Letting attackers know that you are using this software will help them to focus their attack or will make them change their strategy. In addition to this, an attacker may attempt to set up a brute force attack to log into the remote interface. Solution : Filter incoming traffic to this port Risk factor : None"; script_description(english:desc["english"]); summary["english"] = "Checks for ISS deployment manager web interface"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005 David Maciejak"); family["english"] = "Misc."; family["francais"] = "Divers"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("http_version.nasl"); script_require_ports(3994); exit(0); } function https_get(port, request) { if(get_port_state(port)) { soc = open_sock_tcp(port, transport:ENCAPS_SSLv23); if(soc) { send(socket:soc, data:string(request,"\r\n")); result = http_recv(socket:soc); close(soc); return(result); } } } # # The script code starts here # include("http_func.inc"); include("http_keepalive.inc"); port = 3994; if(get_port_state(port)) { req = http_get(item:"/deploymentmanager/index.jsp", port:port); rep = https_get(request:req, port:port); if( rep == NULL ) exit(0); if ("SiteProtector" >< rep && egrep(pattern:"Welcome to SiteProtector Deployment Manager", string:rep)) { security_note(port); } }