![]() System : Linux absol.cf 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.33 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /usr/share/nmap/scripts/ |
Upload File : |
local shortport = require "shortport" local stdnse = require "stdnse" local libssh2_util = require "libssh2-utility" local rand = require "rand" description = [[ Returns authentication methods that a SSH server supports. This is in the "intrusive" category because it starts an authentication with a username which may be invalid. The abandoned connection will likely be logged. ]] --- -- @usage -- nmap -p 22 --script ssh-auth-methods --script-args="ssh.user=<username>" <target> -- -- @output -- 22/tcp open ssh syn-ack -- | ssh-auth-methods: -- | Supported authentication methods: -- | publickey -- |_ password author = "Devin Bjelland" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} local username = stdnse.get_script_args("ssh.user") or rand.random_alpha(5) portrule = shortport.port_or_service(22, 'ssh') function action (host, port) local result = stdnse.output_table() local helper = libssh2_util.SSHConnection:new() if not helper:connect(host, port) then return "Failed to connect to ssh server" end local authmethods = helper:list(username) result["Supported authentication methods"] = authmethods return result end