MHQ: The Quarterly Journal of Military History takes you on an exciting journey to the world's greatest battles and campaigns over the last 5, years, from ancient warfare through modern battles.
Written by distinguished authors and historians who bring the world of history alive, the magazine covers in vivid detail the soldiers, leaders, tactics, and weapons throughout military history, and delivers it in an exquisitely illustrated, premium quality edition.
You may cancel online at any time during your subscription by contacting mhq emailcustomerservice. Topics include naval history, army, infantry and foot soldiers from all branches of the military. Each issue contains incisive accounts from top military writers and historians who take a fresh look at our nation's military heritage: the commanders, campaigns, battles, and weapons that made history.
You may cancel online at any time during your subscription by contacting militaryhistory emailcustomerservice. Vietnam is the only magazine exclusively devoted to telling the full story of the Vietnam war, with gripping firsthand accounts and carefully researched articles by Vietnam war veterans of the conflict and top military historians.
You may cancel online at any time during your subscription by contacting Vietnam emailcustomerservice. Experience the Old West and cowboys and Indians from top historical writers. Wild West brings to life the fascinating history, lore and culture of the great American frontier. You may cancel online at any time during your subscription by contacting wildwest emailcustomerservice. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location.
Windows Capcom. This module abuses the Capcom. This function purposely disables SMEP prior to invoking a This exploit uses two vulnerabilities to execute a command as an elevated user. This module uploads an executable file to the victim system, creates a share containing that executable, creates a remote service on each target system using a UNC path to that file, and finally This module exploits a vulnerability in the handling of Windows Shortcut files.
This vulnerability is a variant of MS An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability.
This module exploits CVE, an arbitrary pointer dereference vulnerability within win32k which occurs due to an uninitalized variable, which allows user mode attackers to write a limited A vulnerability exists within the Microsoft Server Message Block 3. This local exploit implementation leverages this This exploit leverages a file write vulnerability in the print spooler service which will restart if stopped. Because the service cannot be stopped long enough to remove the dll, there is no way to By utilizing this You cannot schedule something in a The Cloud Filter driver, cldflt.
The flaw exists in how the WndExtra field of a window can be This exploit leverages a vulnerability in docker desktop community editions prior to 2. Druva inSync client for Windows exposes a network service on TCP port on the local network interface. It requires The named pipe, SUPipeServer, can be accessed by normal users to interact with the System update service.
This module exploits a vulnerability in a statement in the system programming guide of the Intel 64 and IA architectures software developer's manual being mishandled in various operating system A vulnerability within the MQAC.
If the session in use is already elevated then the exploit will not run. The module relies on This module exploits the Task Scheduler 2. When processing task files, the Windows Task Scheduler only uses a CRC32 checksum to validate that the file has not been This module exploits a flaw in the AfdJoinLeaf function of the afd. An address within the HalDispatchTable is overwritten and when triggered with a call Due to a problem with isolating window broadcast messages in the Windows kernel, an attacker can broadcast commands from a lower Integrity Level process to a higher Integrity Level process, thereby This module leverages a kernel pool overflow in Win32k which allows local privilege escalation.
The kernel shellcode nulls the ACL for the winlogon. This allows any This module exploits a vulnerability in win32k. This module exploits a vulnerability in Internet Explorer Sandbox which allows to escape the Enhanced Protected Mode and execute code with Medium Integrity. The vulnerability exists in the This module abuses a process creation policy in Internet Explorer's sandbox, specifically in the. NET Deployment Service dfsvc.
Under special conditions, the NULL pointer dereference can be MS Windows tcpip! This flaw can be abused to This vulnerability allows the This module exploits improper object handling in the win32k. This module has been tested on vulnerable builds of Windows 7 x64 and x86, and Windows R2 SP1 x This module exploits a pool based buffer overflow in the atmfd. The vulnerability was exploited by the hacking team and disclosed in the July data leak.
This module uses the This module exploits an uninitialized stack variable in the WMI subsystem of ntoskrnl. This Module will generate and upload an executable to a remote host, next will make it a persistent service. It will create a new service which will start the payload whenever the service is running. MS mrxdav. This module exploits the vulnerability in mrxdav. This module exploits the lack of sanitization of standard handles in Windows' Secondary Logon Service.
The vulnerability is known to affect versions of Windows and 2kk12 32 and 64 bit. Windows 10 after version , April update, This module exploits elevation of privilege vulnerability that exists in Windows 7 and R2 when the Win32k component fails to properly handle objects in memory.
An attacker who successfully MS Microsoft Windows ndproxy. This module exploits a flaw in the ndproxy. The vulnerability exists while processing an IO Control Novell Client 2 SP3 nicm. This module exploits a flaw in the nicm. The vulnerability occurs while handling ioctl requests with code 0xB6B, where a user provided pointer Novell Client 4.
This module exploits a flaw in the nwfs. The corruption occurs while handling ioctl requests with code 0xBB, where a 0x dword is written to an A normal The NULL pointer dereference occurs because the It contains a stacked based buffer overflow as a result of a memmove operation.
Note the slight When run, it checks a user writable folder for certain DLL files, and if any are found they are automatically This module will inject a payload into memory of a process.
If a payload isn't selected, then it'll default to a reverse x86 TCP meterpreter. If the PID datastore option isn't specified, then it'll This module will install a payload that is executed during boot. It will be executed either at user logon or system startup via the registry value in "CurrentVersionRun" depending on privilege and Windows allows you to set up a debug process when a process exits.
This module uploads a payload and declares that it is the debug process to launch when a specified process exits. This module executes Powershell to upgrade a Windows Shell session to a full Meterpreter session. At the moment, the module has been tested successfully on This module generates a dynamic executable on the session host using.
NET templates. Code is pulled from C templates and impregnated with a payload before being sent to a modified PowerShell session This module uses WMI execution to launch a payload instance on a remote machine. In order to avoid AV detection, all execution is performed in memory via psh-net encoded payload. Persistence option The default configuration loads a linux kernel and initrd into memory that reads the hard drive, placing the payload on the hard Razer Synapse rzpnk.
A vulnerability exists in the latest version of Razer Synapse v2. Various Ricoh printer drivers allow escalation of privileges on Windows systems. Output is not returned by default.
Unless targeting a local user either set the Creates a scheduled task that will run using service-for-user S4U. This allows the scheduled task to run even as an unprivileged user that is not logged into the device. This will result in lower If directly creating a service fails, this module will inspect existing services to look for insecure This module exploits a logic flaw due to how the lpApplicationName parameter is handled.
When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example A vulnerability within the VBoxGuest driver allows an attacker to inject memory they control into an arbitrary location they define. This module exploits a vulnerability in the 3D Acceleration support for VirtualBox. The vulnerability exists in the remote rendering of OpenGL-based 3D graphics. By sending a sequence of specially This module will attempt to create a persistent payload in a new volume shadow copy.
This module exploits a flaw in the 'webexservice' Windows service, which runs as SYSTEM, can be used to run arbitrary commands locally, and can be started by limited users in default installations. This module executes powershell on the remote host using the current user credentials or those supplied.
This module will create a permanent WMI event subscription to achieve file-less persistence using one of five methods. Symantec System Center Alert Management System is prone to a remote command-injection vulnerability because the application fails to properly sanitize user-supplied input. This is part of Symantec This module exploits a stack buffer overflow in Intel Alert Originator Service msgsys.
When an attacker sends a specially crafted alert, arbitrary code may be executed. This module exploits a stack buffer overflow in Symantec Client Security 3.
This module has only been tested against Symantec Client Security 3. This module exploits a code execution flaw in Symantec Workspace Streaming. The vulnerability exists in the ManagementAgentServer. Trend Micro ServerProtect 5.
This module exploits a buffer overflow in Trend Micro ServerProtect 5. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute This module exploits a stack buffer overflow in the Arkeia backup client for the Windows platform.
This vulnerability affects all versions up to and including 5. This module will execute an arbitrary payload against any system infected with the Arugizer trojan horse. This vulnerability occurs when a recv call has a length value too long for the destination stack buffer.
This vulnerability occurs when a client authentication request is received with type '3' and a long By sending a specially crafted RPC request to opcode 0x, an attacker could overflow the buffer This vulnerability occurs when a specific type of request is sent to the TCP listener on port This vulnerability This vulnerability occurs when a large request is sent to UDP port , triggering a stack buffer overflow.
By sending a specially crafted request, an attacker could overflow the buffer and execute By sending a specially crafted request, an attacker could overflow the By sending a specially crafted request to multiple commands, an attacker By sending a specially crafted request rxsUseLicenseIni , an attacker By sending a specially crafted request to the lic98rmtd. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary This vulnerability was discovered by cybertronic[at]gmx.
Triple userland exception results in heap growth and execution of dereferenced function pointer at a Prior versions are assumed to be vulnerable as well.
This module exploits a vulnerability in Adobe Flash Player versions This results in unsafe Adobe Flash Player This module exploits a vulnerability in Adobe Flash Player that was discovered, and has been exploited actively in the wild. By embedding a specially crafted. This module exploits a vulnerability in the DoABC tag handling within versions 9.
Adobe Reader and Acrobat are also vulnerable, as are any other applications that may By supplying a specially crafted swf file it is possible to trigger an integer underflow in This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs in the casi32 method, where an integer overflow occurs if a ByteArray of length 0 is setup as domainMemory for The position field of the destination This module exploits a use-after-free vulnerability in Adobe Flash Player.
The vulnerability occurs when the ByteArray assigned to the current ApplicationDomain is freed from an ActionScript worker, This module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November This module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt. By supplying a specially crafted. A compilation logic error in the PCRE engine, specifically in the handling of the c escape sequence when followed by a multi-byte By supplying a specially crafted swf file with special regex value, it is possible to This module exploits a vulnerability found in Adobe Flash Player's Flash10u.
This module exploits an uninitialized memory vulnerability in Adobe Flash Player. This module exploits an integer overflow vulnerability in Adobe Reader and Adobe Acrobat Professional versions before 9. Adobe Collab. This module exploits a buffer overflow in Adobe Reader and Adobe Acrobat.
This module exploits a heap-based pointer corruption flaw in Adobe Reader 9. This module relies upon javascript for the heap spray. Adobe Doc. This module exploits a use after free vulnerability in Adobe Reader and Adobe Acrobat Professional versions up to and including 9.
This module exploits a weakness in the Adobe Shockwave player's handling of Director movies. A memory corruption vulnerability occurs through an undocumented rcsL chunk. This module exploits an use after free condition on Adobe Reader versions The vulnerability exists while handling the ToolButton object, where the cEnable callback Adobe util. Advantech WebAccess dvs. This module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.
An attacker can execute arbitrary code by supplying an overly sized buffer as the 'message' parameter. By supplying a long string of data to the ChooseFilePath function, a buffer overflow occurs, which may Amaya Browser v This module exploits a stack buffer overflow in the Amaya v11 Browser.
By sending an overly long string to the "bdo" tag, an attacker may be able to execute arbitrary code. This module allows remote attackers to download and execute arbitrary files on a users system via the DownloadAgent function of the ICQPhone. SipxPhoneManager ActiveX control. Apple ITunes 4. This module exploits a stack buffer overflow in Apple ITunes 4. Apple QuickTime 7. This module exploits a memory trust issue in Apple QuickTime 7. This module exploits a buffer overflow in Apple QuickTime 7.
The stack based overflow occurs when processing a malformed Content-Type header. The module has been tested successfully on Safari This module exploits a vulnerability found in Apple Quicktime. The flaw is triggered when Quicktime fails to properly handle the data length for certain atoms such as 'rdrf' or 'dref' in the Alis This module was inspired by MOAB The Browser target for this module was tested against IE 6 and Firefox 1.
When processing a malformed SMIL uri, a stack-based buffer overflow can occur when logging an error message. This module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the This module exploits a stack buffer overflow in Ask. An attacker may be able to execute arbitrary code by sending an overly long string to the "ShortFormat " method in A buffer overflow condition is possible in multiple places due to the use of the CxDbgPrint function, An attacker can execute arbitrary code by triggering a heap use This module exploits a format string vulnerability within version By calling the By setting an overly BaoFeng Storm mps.
Versions of mps. When passing an overly long string to the method The insecure control can be abused to download By passing an overly long argument to the AddColumn method, a remote attacker could Chrome This exploit takes advantage of a use after free vulnerability in Google Chrome The FileReader.
This control is typically used to install the VPN client. An attacker can set the 'url' property The vulnerability, This module exploits a stack based buffer overflow in the Citrix Gateway ActiveX control. Exploitation of this vulnerability requires user interaction.
The victim must click a button in a dialog to CommuniCrypt Mail 1. By sending an overly long string to the "AddAttachments " method, an By setting an overly long value to 'ConvertFile ', an AwingSoft Winds3D Player 3. This module exploits an untrusted program execution vulnerability within the Winds3D Player from AwingSoft. This module exploits a stack-based buffer overflow in Green Dam Youth Escort version 3.
By setting an overly long URL, an attacker can overrun a buffer and This module exploits a buffer overflow vulnerability in the Isig. The vulnerability is found This module exploits a flaw within the handling of MixerSequencer objects in Java 6u18 and before. When the This ActiveX control can be abused by using the GetObject function to load additional unsafe classes such as Microsoft reports that version 5. This module exploits an integer overflow vulnerability on Internet Explorer.
The vulnerability exists in the handling of the dashstyle. The exploit By sending an overly long string to the "Get " This module exploits a stack buffer overflow in Orbit Downloader 2.
When an attacker serves up a malicious web site, arbitrary code may be executed. When passing an overly long string By sending an overly long string to the The affected control can be found in the PrintControl. This module exploits a vulnerability in Dell Webcam's CrazyTalk component. Specifically, when supplying a long string for a file path to the BackImage property, an overflow may occur after checking Worldweaver DX Studio Player shell.
This module exploits a command execution vulnerability within the DX Studio Player from Worldweaver for versions 3. When sending an overly long string to the CheckRequirements method, an attacker may This module exploits a Remote Code Execution vulnerability in Exodus Wallet, a vulnerability in the ElectronJS Framework protocol handler can be used to get arbitrary command execution if the user This module exploits a stack buffer overflow in Facebook Photo Uploader 4.
By sending an overly long string to the "ExtractIptc " property located in the ImageUploader4. This module exploits a stack-based buffer overflow vulnerability in GetGo Download Manager version 5. By persuading the victim to This module exploits a stack buffer overflow in GOM Player 2.
The test results are listed below:. File Station is now only supported on the customized port to provide independent access to individuals.
Download DSM 2. The "Router Configuration" feature is also available on the management UI under "Internet Connection" category, which accomplishes the port forwarding tasks on the router for you. View the supported router list here. Download Station Enhancements: MegaUpload download with a premium account is supported. Wireless Support: With the supported wireless dongles, the DiskStation will be accessible via Both the infrastructure and Ad-Hoc modes are supported.
View the supported USB wireless dongle list here. After firmware upgrade, the system will automatically create additional thumbnails for all photos stored in "photo" shared folder. Photo Station service will not be affected. This firmware upgrade is intended for specific cases only.
Under normal circumstances, it is not necessary to upgrade to this version. Windows Mobile 6. UPS Setting Enhancement: You can now set up the time period before the server enters safe mode after a power failure.
And NTFS disks are not supported. This bug will be fixed in later version of Synology Assistant. To ensure proper operation of Photo Station, using File Station 2 to modify sub-folder privileges for "photo" shared folder is disabled. This firmware upgrade is intended for users advised by Synology Online Support. Enhanced Photo Station 3 : The performance of thumbnail browsing has been improved. Attempts to discover available IPv6 hosts on the LAN by sending an MLD multicast listener discovery query to the link-local multicast address ff and listening for any responses.
The query's maximum response delay set to 1 to provoke hosts to respond immediately rather than waiting for other responses from their multicast group. Adds IPv6 addresses to the scan queue using a wordlist of hexadecimal "words" that form addresses in a given subnet. Sniffs the local network for a configurable amount of time 10 seconds by default and prints discovered addresses.
If the newtargets script argument is set, discovered addresses are added to the scan queue. Inserts traceroute hops into the Nmap scanning queue. It only functions if Nmap's --traceroute option is used and the newtargets script argument is given. Detects the TeamSpeak 2 voice communication server and attempts to determine version and configuration information. Determines whether the encryption option is supported on a remote telnet server. Some systems including FreeBSD and the krb5 telnetd available in many Linux distributions implement this option incorrectly, leading to a remote root vulnerability.
This script currently only tests whether encryption is supported, not for that particular vulnerability. Enumerates TFTP trivial file transfer protocol filenames by testing for a list of common ones. Lists the geographic locations of each hop in a traceroute and optionally saves the results to a KML file, plottable on Google earth and maps. Compares the detected service on a port against the expected service for that port number e. The script requires that a version scan has been run in order to be able to discover what service is actually running on each port.
Script output differs from other script as URLs are written to stdout directly. There is also an option to log the results to file. Detects the Ventrilo voice communication server service versions 2. Some of the older versions pre 3.
Extracts information, including file paths, version and database names from a Versant object database. Tries to log into a VNC server and get its desktop name. Uses credentials discovered by vnc-brute, or None authentication types.
Retrieves cluster and store information from the Voldemort distributed key-value store using the Voldemort Native Protocol. Detects vulnerabilities and gathers information such as version numbers and hardware support from VxWorks Wind DeBug agents. Requests an XDMCP X display manager control protocol session and lists supported authentication and authorization mechanisms. Connects to XMPP server port and collects server information such as: supported auth mechanisms, compression methods, whether TLS is supported and mandatory, stream management, language, support of In-Band registration, server capabilities.
If possible, studies server vendor. It is not feature complete and still missing several functions. A basic AJP 1. This library implements a minimal subset of the BitCoin protocol It currently supports the version handshake and processing Addr responses. Bittorrent and DHT protocol library which enables users to read information from a torrent file, decode bencoded bittorrent encoded buffers, find peers associated with a certain torrent and retrieve nodes discovered during the search for peers.
The brute library is an attempt to create a common framework for performing password guessing against remote services. It is not feature complete and is missing several functions and parameters. Common communication functions for network discovery tasks like banner grabbing and data exchange.
A minimal CVS Concurrent Versions System pserver protocol implementation which currently only supports authentication. Read and parse some of Nmap's data files: nmap-protocols , nmap-rpc , nmap-services , and nmap-mac-prefixes. A smallish httpspider library providing basic spidering capabilities It consists of the following classes:.
The library implements the minimum needed to perform brute force password guessing. Library methods for handling JSON data. A MobileMe web service client that allows discovering Apple devices using the "find my iPhone" functionality. An implementation of MQTT 3. The functions used here can be accessed over TCP ports and , with an established session. A NULL session the default will work for some functions and operating systems or configurations , but not for others.
By querying this structure, you can get a whole lot of information about what's going on. The values passed in and out are based on structs defined by the protocol, and documented by Samba developers. For detailed breakdowns of the types, take a look at Samba 4. An implementation of the Network Block Device protocol. PostgreSQL library supporting both version 2 and version 3 of the protocol.
The library currently contains the bare minimum to perform authentication. Authentication is supported with or without SSL enabled and using the plain-text or MD5 authentication mechanisms. Currently has functionality to determine encryption and cipher support.
This library implements the fundamentals needed to communicate with the WinPcap Remote Capture Daemon. It currently supports authenticating to the service using either NULL-, or Password-based authentication. In addition it has the capabilities to list the interfaces that may be used for sniffing.
It is currently not a truly valid XML parser, however, as it allows certain XML that is syntactically-invalid not well-formed to be parsed without reporting an error. The streaming parser does a simple pass through the input and reports what it sees along the way.
You can optionally ignore white-space only text nodes using the stripWhitespace option. The library contains the parser class and the parseDOM function. A relatively small implementation of the Service Location Protocol.
It was initially designed to support requests for discovering Novell NCP servers, but should work for any other service as well. Functions for the SSH-1 protocol.
This module also contains functions for formatting key fingerprints. A library providing functions for collecting SSL certificates and storing them in the host-based registry. Standard Nmap Scripting Engine functions.
This module contains various handy functions that are too small to justify modules of their own. Strict declared global library. Checks for undeclared global variables during runtime execution.
The code is entirely based on packet dumps captured when using the Versant Management Center administration application. A library that enables scripts to send Web Service Dynamic Discovery probes and perform some very basic decoding of responses. The library is in no way a full WSDD implementation it's rather the result of some packet captures and some creative coding.
A XMPP Jabber library, implementing a minimal subset of the protocol enough to do authentication brute-force. Scripts acarsd-info Retrieves information from a listening acarsd daemon. An indication of potential XSS vulnerability. In order to avoid this problem try: - reducing the size of your dictionary - use the brute delay option to introduce a delay between guesses - split the guessing up in chunks and wait for a while between them iax2-version Detects the UDP IAX2 service.
It supports the following operations: map - maps a new external port on the router to an internal port of the requesting IP unmap - unmaps a previously mapped port for the requesting IP unmapall - unmaps all previously mapped ports for the requesting IP nbd-info Displays protocol and block device information from NBD servers.
Follows RFC Checks for an identd auth server which is spoofing its replies. Discovers Jenkins servers on a LAN by sending a discovery broadcast probe. Discovers Microsoft SQL servers in the same broadcast domain.
Attempts to discover master browsers and the domains they manage. Discovers Versant object databases using the broadcast srvloc protocol. Wakes a remote system up from sleep by sending a Wake-On-Lan packet. Performs brute force password auditing against the Cassandra database.
Attempts to get basic info and server status from a Cassandra database. Detects the CCcam service software for sharing subscription TV among multiple receivers. Extracts a list of published applications from the ICA Browser service. Extracts the name of the server farm and member servers from Citrix XML service. Exploits ClamAV servers vulnerable to unauthenticated clamav comand execution. Analyzes the clock skew between the scanner and various services that report timestamps.
Lists currently queued print jobs of the remote CUPS service grouped by printer. Performs brute force password auditing against CVS pserver authentication. Performs brute force password auditing against the DelugeRPC daemon. Attempts to perform a dynamic DNS update without authentication. Performs brute force password auditing against the Lotus Domino Console. Performs brute force password auditing against an iPhoto Library.
Attempts to retrieve a list of usernames using the finger service. Prints the readable strings from service fingerprints of unknown services. Detects the Freelancer game server FLServer. Determines if a ASP. Retrieves the authentication scheme and realm of a web service that requires authentication. Performs brute force password auditing against http basic, digest and ntlm authentication. Tests for access with default credentials used by a variety of web applications and devices.
Enumerates directories used by popular web applications and servers. This script crawls through the website and returns any error pages. This script crawls through the website to find any rss or atom feeds. Performs brute force password auditing against http form-based authentication. Checks whether target machines are vulnerable to anonymous Frontpage login.
Attempts to extract information from HP iLO boards including versions and addresses. Performs brute force password auditing against Joomla web CMS installations. Performs brute force password guessing against HTTP proxy servers. Enumerates users of a Subversion repository by examining logs of most recent commits. Checks if various crawling utilities are allowed by the host.
Exploits a file disclosure vulnerability in Webmin CVE An 0 day was released on the 6th December by rubina, and was patched in Zimbra 7. Detects the RomPager 4. Tries to detect the presence of a web application firewall and its type and version. A script to detect WebDAV installations. This script searches the xssed. Retrieves a list of tables and column definitions for each database on an Informix server. Classifies a host's IP ID sequence test for susceptibility to idle scan.
Checks an IRC server for channels that are commonly used by malicious botnets. Performs brute force password auditing against iSCSI targets. Retrieves configuration information from a Lexmark SS printer. Performs brute force password auditing against Couchbase Membase servers. Performs brute force username and password auditing against Metasploit msgrpc interface. Performs brute force password auditing against the MongoDB database.
Attempts to get build info and server status from a MongoDB database. Queries for the multicast path from a source to a destination host.
Detects the Murmur service server for the Mumble voice communication client versions 1. Runs a query against a MySQL database and returns the results as a table. Displays protocol and block device information from NBD servers. Extends version detection to detect NetBuster, a honeypot service that mimes NetBus. Shows NFS exports, like the showmount -e command. Performs brute force password auditing against an Nping Echo service.
Parses and displays the banner information of an OpenLookup network key-value store server.
0コメント