I will try it and let you know .
Thanks.

Regards


On 8/9/07, Pavithra H <[EMAIL PROTECTED]> wrote:
> Code snippet from ssh_get_info.nasl which handles Slackware.
>
> ###################### Slackware
> ########################################
>
>   buf = info_send_cmd(cmd: 'cat /etc/slackware-version');
>
>   if ("Slackware" >< buf)
>   {
>     buf = ereg_replace(string: buf, pattern: "^Slackware +", replace: "");
>     report += '\nThe remote Slackware system is :\n' + buf;
>     if (buf !~ '^[0-9.]+[ \t\r\n]*$')
>     {
>       report += '\nThe Slackware version is unknown, therefore
> local security checks have been disabled\n';
>       security_note(port:port, data:report);
>       exit(0);
>     }
>     set_kb_item(name:"Host/Slackware/release", value:
> chomp(buf));
>
>     buf = info_send_cmd(cmd: 'ls -1 /var/log/packages');
>
>     if (buf)
>     {
>       report += '\nLocal security checks have been enabled for this host.';
>       set_kb_item(name:"Host/Slackware/packages",
> value:buf);
>       set_kb_item(name:'Host/local_checks_enabled', value:
> TRUE);
>       security_note(port:port, data:report);
>     }
>     else
>     {
>       report +=
> 'For any reason, /var/log/packages/ could not be read,
> therefore local security checks have been disabled';
>     set_kb_item(name:'HostLevelChecks/failure',
> value:"'/var/log/packages' could not be read");
>     security_note(port:port, data:report);
>     }
>     misc_calls_and_exit();
>   }
>
>   report +=
> '\nThe remote Linux distribution is not supported, therefore local security
> checks have not been enabled';
>   security_note(port:port, data:report);
>   set_kb_item(name:'HostLevelChecks/failure',
> value:"Unsupported Linux distribution");
>   misc_calls_and_exit();
> }
>
> ########################################################################
>
> From the code it is inferred that executing a command 'cat
> /etc/slackware-version' confirms Slackware has been installed and then only
> proceed further. So if you have the permission to edit this plugin as below.
> But remember this will break the chain of detecting Slackware and enforcing
> the local checks in Slackware. If you run this script any other system it
> sets the kb item for Slackware since we dont any checks to say which Os is
> running.
>
> #############################################
>     # hard code Slackware release version here
>     buf = 10.0; # whatever version that has been installed
>     set_kb_item(name:"Host/Slackware/release", value:
> chomp(buf));
>
>     buf = info_send_cmd(cmd: 'ls -1 /var/log/packages');
>
>     if (buf)
>     {
>       report += '\nLocal security checks have been enabled for this host.';
>       set_kb_item(name:"Host/Slackware/packages",
> value:buf);
>       set_kb_item(name:'Host/local_checks_enabled', value:
> TRUE);
>       security_note(port:port, data:report);
>     }
>     else
>     {
>       report +=
> 'For any reason, /var/log/packages/ could not be read,
> therefore local security checks have been disabled';
>     set_kb_item(name:'HostLevelChecks/failure',
> value:"'/var/log/packages' could not be read");
>     security_note(port:port, data:report);
>     }
>     misc_calls_and_exit();
>   }
>
>   report +=
> '\nThe remote Linux distribution is not supported, therefore local security
> checks have not been enabled';
>   security_note(port:port, data:report);
>   set_kb_item(name:'HostLevelChecks/failure',
> value:"Unsupported Linux distribution");
>   misc_calls_and_exit();
> #####################
>
> PS: I have not tested the code. Pls try the code & do reply.
>
> On 8/9/07, Serkan Özkan <[EMAIL PROTECTED] > wrote:
> > Yes, i have it.
> >
> > On 8/9/07, Pavithra H < [EMAIL PROTECTED]> wrote:
> > > hey do you have the permission to modify the plugin ssh_get_info.nasl?
> > >
> >
>
>
>
> --
> Thanks,
> Pavithra.H
> Research Analyst, Thirdbrigade Labs
> Bangalore
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to