NSE
Finding Scripts :
>>> locate .nse | grep [port name]
>>> ls -la /usr/share/nmap/scripts/ | grep -e ‘[ port name ]’
What This Script Do??
>>> nmap --script-help [script name]
Vulnerability Scanning :
>>> nmap --script vuln $IP
>>> mkdir /usr/share/nmap/scripts/vulnscan; cd /usr/share/nmap/scripts/vulnscan; git clone https://github.com/scipag/vulscan.git; nmap -sS -sV --script=/usr/share/nmap/scripts/vulnscan/vulscan.nse $IP
[ use all HTTP Scripts ]
>>> nmap -p 80 --script=http*vuln* $IP
Every nmap Script
>>> nmap -p 80 --script=all $IP [ A-Z Scripts on target , may take an hours ]
[ entire network for a directory traversal vulnerability ]
>>> nmap -p 80 --script=http-vuln-cve2010-2861 $IP/24
More For Websites
basic auth brute force:
nmap -d -vv -p 80 --script http-brute --script-args http-brute.path=/ www.example.org
Run all nmap scan scripts against found ports.
nmap -Pn -sV -O -pT:{TCP ports found},U:{UDP ports found} --script *vuln* $ip
Last updated