You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Good afternoon. Many values in a directive target_string can have the same beginning, but completely different endings. To do this have to create many lines in order to make the bot respond to the detected open port.
But this method is not efficient enough, because it is impossible to know in advance all the possible answers given by open ports.
Can I use wildcard "*" data masks to combine all of these values into one string to find similarities in different responses during a port scan?
For example: target_string = "*SSH-2.0*"; or target_string = "*SSH-*.0*";
There is probably some other way to combine similar answers into one search string, but I do not know this and did not find descriptions in the documentation for your bot. If I am wrong, please tell me similar method.
If at the moment the use of such symbols is not possible to create masks, then please, make this improvement into the future update, because it will be very useful.
The text was updated successfully, but these errors were encountered:
Wildcards are currently not supported as hopm uses strstr for string matching in this case. So all of the examples you listed above would have been covered with a single target_string = "SSH-2.0-dropbear_"; directive.
1. Can I summarize (covered) all the answers this way and will this work for all similar responses when scanning ports?
target_string = "SSH";
2. Please tell me if there is a need to prescribe such directives in each next scanner name, or is it enough to indicate this only in the topmost first one?
For example: name = "ssh"; protocol = SSH:22; target_string = "SSH";
Good afternoon. Many values in a directive target_string can have the same beginning, but completely different endings. To do this have to create many lines in order to make the bot respond to the detected open port.
target_string = "SSH-2.0-dropbear_0.51";
target_string = "SSH-2.0-dropbear_0.52";
target_string = "SSH-2.0-dropbear_0.53.1";
target_string = "SSH-2.0-dropbear_2012.55";
target_string = "SSH-2.0-dropbear_2013.62";
target_string = "SSH-2.0-dropbear_2014.63";
But this method is not efficient enough, because it is impossible to know in advance all the possible answers given by open ports.
Can I use wildcard "*" data masks to combine all of these values into one string to find similarities in different responses during a port scan?
For example:
target_string = "*SSH-2.0*";
ortarget_string = "*SSH-*.0*";
There is probably some other way to combine similar answers into one search string, but I do not know this and did not find descriptions in the documentation for your bot. If I am wrong, please tell me similar method.
If at the moment the use of such symbols is not possible to create masks, then please, make this improvement into the future update, because it will be very useful.
The text was updated successfully, but these errors were encountered: