There are various scripts that fire if vulnerable PHP versions are detected, e.g. 25368, 24907 (those only fire if you set report_paranoia to 'paranoid'). A starting point to making your own might be 24260 (http_info.nasl) which shows the HTTP server headers. You could make a modified copy of this which fires only if a powered-by PHP header is found.
Regards, -- Hubert Seiwert Internet Security Specialist, Westpoint Ltd Albion Wharf, 19 Albion Street, Manchester M1 5LN, United Kingdom Web: www.westpoint.ltd.uk Tel: +44-161-2371028 Mike Gilligan wrote: > Hi > > I'm looking for a NASL script that simply does a banner grab on a host > running PHP for either the X-Powered-By or PHP version information with > the end goal of compiling a list of external hosts running PHP. Does > something like this already exist in the current 'free' plugin feed or > would I need to go about writing my own? > > Thanks, > > Mike. > > _________________________________________________________________ > Get the new Windows Live Messenger! http://get.live.com/messenger/overview > > _______________________________________________ > Nessus mailing list > [email protected] > http://mail.nessus.org/mailman/listinfo/nessus > > _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
