Sha256: b940e050d3344c3ea6e0c2edc23a48a59a18b59cbf6fc949c7df0ef68368b8a9
Contents?: true
Size: 1.74 KB
Versions: 6
Compression:
Stored size: 1.74 KB
Contents
# frozen_string_literal: true ## # This file is part of WhatWeb and may be subject to # redistribution and commercial restrictions. Please see the WhatWeb # web site for more information on licensing and terms of use. # http://www.morningstarsecurity.com/research/whatweb ## WhatWeb::Plugin.define "Axel-Device" do @author = "Brendan Coles <bcoles@gmail.com>" # 2011-05-20 @version = "0.1" @description = "Axel design and manufacture innovative TCP/IP based Thin Client Terminals and Office Servers for Windows, Unix/Linux and AS/400 environments. Axel products are unique in having no embedded operating system." @website = "http://www.axel.com/" # ShodanHQ results as at 2011-05-20 # # 28 for Axel Admin Server # Google results as at 2011-05-20 # # 1 for "Syntax Error or Not Axel XML data" # Dorks # @dorks = [ '"Syntax Error or Not Axel XML data"' ] # Passive # def passive(target) m = [] # HTTP Server Header if /^Axel Admin Server$/.match?(target.headers["server"]) m << { name: "HTTP Server Header" } if /^<AxelAdmin>$/.match?(target.body) # Server Name m << { string: target.body.scan(/^<Name>([^\s^<]+)<\/Name>$/) } if target.body =~ /^<Name>([^\s^<]+)<\/Name>$/ # Firmware Version Detection m << { firmware: target.body.scan(/^<Version>([^\s^<]+)<\/Version>$/) } if target.body =~ /^<Version>([^\s^<]+)<\/Version>$/ end end # Return passive matches m end end # The AX3000 hardware information is in the form of FKx-BVyyy # # FKx is the electronic board code (click here for more information) # BVyyy is the boot code version (the boot code is the non-erasable part of the flash memory) # # More info: http://www.axel.com/faq/faq_axtcp_e.html
Version data entries
6 entries across 6 versions & 1 rubygems