Skip to main content

Posts

Showing posts from June, 2008

Welcome to Mark Baggett - In Depth Defense

I am the course Author of SANS SEC573 Automating Information Security with Python. Check back frequently for updated tools and articles related to course material.




First Stab at NSE Scripting

Over the weekend I decided to take my first look at the NMAP scripting engine.   I’ve read about it, but had not really tried it until now.   First, here is how to use the built in scripts.   First make sure you have the latest scripts.    Similar to NIKTO and other vulnerability scanning systems NMAP has the ability to update its detection scripts.    To update your scripts type this; nmap --script-updatedb This will download the latest .NSE scripts from the nmap site.    The scripts (by default) are located in /usr/local/share/nmap/scripts.    Here is the list of scripts as of today: You can run ALL of these scripts against a host like this…   Macintosh:scripts mark.baggett$ nmap localhost -n --script all              Starting Nmap 4.65 ( http://nmap.org ) at 2008-06-20 10:44 EDT Interesting ports on 127.0.0.1: PORT    STATE SERVICE 80/tcp open   http |_ HTML title: Test Page for Apache Installation Nmap done: 1 IP address (1 host up) scanned in 42.216 seconds   -n