Lucene search

K

snmp-processes NSE Script

🗓️ 16 Feb 2010 09:38:15Reported by Patrik KarlssonType 
nmap
 nmap
🔗 nmap.org👁 190 Views

snmp-processes NSE Script - Enumerate running processes through SNMP

Show more
Related
Code
ReporterTitlePublishedViews
Family
Nmap
ftp-syst NSE Script
26 Jul 201719:34
nmap
Nmap
http-jsonp-detection NSE Script
7 Aug 201718:16
nmap
Nmap
http-put NSE Script
20 Oct 201102:32
nmap
Nmap
pop3-ntlm-info NSE Script
8 Jan 201616:06
nmap
Nmap
broadcast-xdmcp-discover NSE Script
26 Jan 201219:35
nmap
Nmap
wdb-version NSE Script
16 Aug 201014:39
nmap
Nmap
versant-info NSE Script
8 Mar 201217:51
nmap
Nmap
ms-sql-xp-cmdshell NSE Script
4 Apr 201010:11
nmap
Nmap
broadcast-pc-duo NSE Script
18 Dec 201109:33
nmap
Nmap
http-joomla-brute NSE Script
23 Aug 201106:29
nmap
Rows per page
local nmap = require "nmap"
local shortport = require "shortport"
local snmp = require "snmp"
local stdnse = require "stdnse"

description = [[
Attempts to enumerate running processes through SNMP.
]]

---
-- @usage
-- nmap -sU -p 161 --script=snmp-processes <target>
-- @output
-- | snmp-processes:
-- |   1:
-- |     Name: System Idle Process
-- |   4:
-- |     Name: System
-- |   256:
-- |     Name: smss.exe
-- |     Path: \SystemRoot\System32\
-- |   308:
-- |     Name: csrss.exe
-- |     Path: C:\WINDOWS\system32\
-- |     Params: ObjectDirectory=\Windows SharedSection=1024,3072,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserS
-- |   332:
-- |     Name: winlogon.exe
-- |   380:
-- |     Name: services.exe
-- |     Path: C:\WINDOWS\system32\
-- |   392:
-- |     Name: lsass.exe
-- |_    Path: C:\WINDOWS\system32\
--
-- @xmloutput
-- <table key="1">
--   <elem key="Name">System Idle Process</elem>
-- </table>
-- <table key="4">
--   <elem key="Name">System</elem>
-- </table>
-- <table key="256">
--   <elem key="Name">smss.exe</elem>
--   <elem key="Path">\SystemRoot\System32\</elem>
-- </table>
-- <table key="308">
--   <elem key="Name">csrss.exe</elem>
--   <elem key="Path">C:\WINDOWS\system32\</elem>
--   <elem key="Params">ObjectDirectory=\Windows SharedSection=1024,3072,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserS</elem>
-- </table>
-- <table key="332">
--   <elem key="Name">winlogon.exe</elem>
-- </table>
-- <table key="380">
--   <elem key="Name">services.exe</elem>
--   <elem key="Path">C:\WINDOWS\system32\</elem>
-- </table>
-- <table key="392">
--   <elem key="Name">lsass.exe</elem>
--   <elem key="Path">C:\WINDOWS\system32\</elem>
-- </table>

author = "Patrik Karlsson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"default", "discovery", "safe"}
dependencies = {"snmp-brute"}

-- Version 0.4
-- Created 01/15/2010 - v0.1 - created by Patrik Karlsson <[email protected]>
-- Revised 01/19/2010 - v0.2 - fixed loop that would occur if a mib did not exist
-- Revised 01/19/2010 - v0.3 - removed debugging output and renamed file
-- Revised 04/11/2010 - v0.4 - moved snmp_walk to snmp library <[email protected]>


portrule = shortport.port_or_service(161, "snmp", "udp", {"open", "open|filtered"})

--- Gets a value for the specified oid
--
-- @param tbl table containing <code>oid</code> and <code>value</code>
-- @param oid string containing the object id for which the value should be extracted
-- @return value of relevant type or nil if oid was not found
function get_value_from_table( tbl, oid )

  for _, v in ipairs( tbl ) do
    if v.oid == oid then
      return v.value
    end
  end

  return nil
end

--- Processes the table and creates the script output
--
-- @param tbl table containing <code>oid</code> and <code>value</code>
-- @return table suitable for <code>stdnse.format_output</code>
function process_answer( tbl )

  local swrun_name = "1.3.6.1.2.1.25.4.2.1.2"
  local swrun_pid = "1.3.6.1.2.1.25.4.2.1.1"
  local swrun_path = "1.3.6.1.2.1.25.4.2.1.4"
  local swrun_params = "1.3.6.1.2.1.25.4.2.1.5"
  local new_tbl = stdnse.output_table()

  for _, v in ipairs( tbl ) do

    if ( v.oid:match("^" .. swrun_pid) ) then
      local item = stdnse.output_table()
      local objid = v.oid:gsub( "^" .. swrun_pid, swrun_name)
      local value = get_value_from_table( tbl, objid )

      if value then
        item["Name"] = value
      end

      objid = v.oid:gsub( "^" .. swrun_pid, swrun_path)
      value =  get_value_from_table( tbl, objid )

      if value and value:len() > 0 then
        item["Path"] = value
      end

      objid = v.oid:gsub( "^" .. swrun_pid, swrun_params)
      value = get_value_from_table( tbl, objid )

      if value and value:len() > 0 then
        item["Params"] = value
      end

      -- key (PID) must be a string for output to work.
      new_tbl[tostring(v.value)] = item
    end

  end

  return new_tbl

end


action = function(host, port)

  local data, snmpoid = nil, "1.3.6.1.2.1.25.4.2"
  local shares = {}
  local status

  local snmpHelper = snmp.Helper:new(host, port)
  snmpHelper:connect()

  status, shares = snmpHelper:walk( snmpoid )

  if (not(status)) or ( shares == nil ) or ( #shares == 0 ) then
    return
  end

  shares = process_answer( shares )

  nmap.set_port_state(host, port, "open")

  return shares
end

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Feb 2010 09:15Current
EPSS0.972
190
.json
Report