PNG  IHDR;IDATxܻn0K )(pA 7LeG{ §㻢|ذaÆ 6lذaÆ 6lذaÆ 6lom$^yذag5bÆ 6lذaÆ 6lذa{ 6lذaÆ `}HFkm,mӪôô! x|'ܢ˟;E:9&ᶒ}{v]n&6 h_tڠ͵-ҫZ;Z$.Pkž)!o>}leQfJTu іچ\X=8Rن4`Vwl>nG^is"ms$ui?wbs[m6K4O.4%/bC%t Mז -lG6mrz2s%9s@-k9=)kB5\+͂Zsٲ Rn~GRC wIcIn7jJhۛNCS|j08yiHKֶۛkɈ+;SzL/F*\Ԕ#"5m2[S=gnaPeғL lذaÆ 6l^ḵaÆ 6lذaÆ 6lذa; _ذaÆ 6lذaÆ 6lذaÆ RIENDB` local comm = require "comm" local shortport = require "shortport" description = [[ Checks for an identd (auth) server which is spoofing its replies. Tests whether an identd (auth) server responds with an answer before we even send the query. This sort of identd spoofing can be a sign of malware infection, though it can also be used for legitimate privacy reasons. ]] --- -- @output -- PORT STATE SERVICE REASON -- 113/tcp open auth syn-ack -- |_auth-spoof: Spoofed reply: 0, 0 : USERID : UNIX : OGJdvM author = "Diman Todorov" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"malware", "safe"} portrule = shortport.port_or_service(113, "auth") action = function(host, port) local status, owner = comm.get_banner(host, port, {lines=1}) if not status then return end return "Spoofed reply: " .. owner end