# # This script was written by David Maciejak # This script is released under the GNU GPL v2 # if(description) { script_id(17583); script_version("$Revision: 1.1 $"); name["english"] = "Aventail ASAP detection"; script_name(english:name["english"]); desc["english"] = " The remote host seems to be an Aventail SSL VPN appliance, connections are allowed to the web console management. Letting attackers know that you are using this software will help them to focus their attack or will make them change their strategy. In addition to this, an attacker may attempt to set up a brute force attack to log into the remote interface. Solution : Filter incoming traffic to this port Risk factor : None"; script_description(english:desc["english"]); summary["english"] = "Aventail ASAP Management Console management"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005 David Maciejak"); family["english"] = "Misc."; family["francais"] = "Divers"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("http_version.nasl"); script_require_ports(8443); exit(0); } function https_get(port, request) { if(get_port_state(port)) { soc = open_sock_tcp(port, transport:ENCAPS_SSLv23); if(soc) { send(socket:soc, data:string(request,"\r\n")); result = http_recv(socket:soc); close(soc); return(result); } } } # # The script code starts here # include("http_func.inc"); include("http_keepalive.inc"); port = 8443; if(get_port_state(port)) { req = http_get(item:"/console/login.do", port:port); rep = https_get(request:req, port:port); if( rep == NULL ) exit(0); #ASAP Management Console Login if ("ASAP Management Console Login" >< rep) { security_note(port); } }