Nmap Development mailing list archives

Re: [NSE script] SSH1 Hostkey


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Tue, 5 Aug 2008 17:57:04 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tue, 05 Aug 2008 19:41:20 +0200
Sven Klemm <sven () c3d2 de> wrote:

I've attached a new version that only shows the fingerprint of the
key unless verbosity is at least 2 like I did for SSH2 version.


Looks good.  This script is a good candidate for replacing my SSHv1
support script.  There is no reason to test that a server supports
protocol v1 and then grab the hostkey in another script.

Also, I know v2 and v1 have little in common but you might think about
combining your fingerprint scripts.  Think of this as a replacement for

ssh-keyscan -t rsa,dsa,rsa1 host.domain.tld

Also, since you seem to be a NSE ninja ;-), you might think about
adding a bubblebabble output option for the fingerprints.  Around here
all the Solaris guys still use that output...

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkiYlHcACgkQqaGPzAsl94LVWgCgnNE3rDUpHEUAwazAcZnkjCG4
DOAAn0HI4ob6GVF4j0UggHe10owflzAx
=Hj4p
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: