There are various scripts that fire if vulnerable PHP versions are detected,
e.g. 25368, 24907 (those only fire if you set report_paranoia to 'paranoid'). A
starting point to making your own might be 24260 (http_info.nasl) which shows
the HTTP server headers. You could make a modified copy of this which fires only
if a powered-by PHP header is found.


Regards,

-- 
Hubert Seiwert

Internet Security Specialist, Westpoint Ltd
Albion Wharf, 19 Albion Street, Manchester M1 5LN, United Kingdom

Web: www.westpoint.ltd.uk
Tel: +44-161-2371028




Mike Gilligan wrote:
> Hi
> 
> I'm looking for a NASL script that simply does a banner grab on a host
> running PHP for either the X-Powered-By or PHP version information with
> the end goal of compiling a list of external hosts running PHP. Does
> something like this already exist in the current 'free' plugin feed or
> would I need to go about writing my own?
> 
> Thanks,
> 
> Mike.
> 
> _________________________________________________________________
> Get the new Windows Live Messenger! http://get.live.com/messenger/overview
> 
> _______________________________________________
> Nessus mailing list
> [email protected]
> http://mail.nessus.org/mailman/listinfo/nessus
> 
> 
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to