Retrieves day and time from Daytime servic
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Nmap | rtsp-url-brute NSE Script | 26 Oct 201121:36 | – | nmap |
Nmap | ssh-auth-methods NSE Script | 14 Aug 201402:09 | – | nmap |
Nmap | http-axis2-dir-traversal NSE Script | 24 Jul 201121:10 | – | nmap |
Nmap | smtp-enum-users NSE Script | 13 Mar 201004:03 | – | nmap |
Nmap | dns-brute NSE Script | 5 Mar 201121:16 | – | nmap |
Nmap | mikrotik-routeros-brute NSE Script | 30 Jul 201403:48 | – | nmap |
Nmap | http-slowloris NSE Script | 16 Jul 201219:27 | – | nmap |
Nmap | freelancer-info NSE Script | 20 Nov 201304:31 | – | nmap |
Nmap | irc-info NSE Script | 6 Nov 200802:52 | – | nmap |
Nmap | ajp-methods NSE Script | 7 May 201218:49 | – | nmap |
local comm = require "comm"
local shortport = require "shortport"
local oops = require "oops"
description = [[
Retrieves the day and time from the Daytime service.
]]
---
-- @output
-- PORT STATE SERVICE
-- 13/tcp open daytime
-- |_daytime: Wed Mar 31 14:48:58 MDT 2010
author = "Diman Todorov"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"discovery", "safe"}
portrule = shortport.port_or_service(13, "daytime", {"tcp", "udp"})
action = function(host, port)
return oops.output(comm.exchange(host, port, "dummy", {lines=1}))
end
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo