Over the weekend I decided to take my first look at the NMAP scripting engine. I’ve read about it, but had not really tried it until now. First, here is how to use the built in scripts. First make sure you have the latest scripts. Similar to NIKTO and other vulnerability scanning systems NMAP has the ability to update its detection scripts. To update your scripts type this; nmap --script-updatedb This will download the latest .NSE scripts from the nmap site. The scripts (by default) are located in /usr/local/share/nmap/scripts. Here is the list of scripts as of today: You can run ALL of these scripts against a host like this… Macintosh:scripts mark.baggett$ nmap localhost -n --script all Starting Nmap 4.65 ( http://nmap.org ) at 2008-06-20 10:44 EDT Interesting ports on 127.0.0.1: PORT STATE SERVICE 80/tcp open http |_ HTML title: Test Page for Apache Installation Nmap done: 1 IP address (1 host up) scanned in 42.216 seconds -n
This is a collection of Articles, Tools, Conference talks, interviews, etc by Mark Baggett