![]() System : Linux absol.cf 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.33 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /proc/self/root/usr/share/nmap/scripts/ |
Upload File : |
local comm = require "comm" local shortport = require "shortport" description = [[ Checks for an identd (auth) server which is spoofing its replies. Tests whether an identd (auth) server responds with an answer before we even send the query. This sort of identd spoofing can be a sign of malware infection, though it can also be used for legitimate privacy reasons. ]] --- -- @output -- PORT STATE SERVICE REASON -- 113/tcp open auth syn-ack -- |_auth-spoof: Spoofed reply: 0, 0 : USERID : UNIX : OGJdvM author = "Diman Todorov" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"malware", "safe"} portrule = shortport.port_or_service(113, "auth") action = function(host, port) local status, owner = comm.get_banner(host, port, {lines=1}) if not status then return end return "Spoofed reply: " .. owner end