mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 12:41:29 +00:00
Add script idea for vulnscan based on detected os/versions
This commit is contained in:
@@ -103,6 +103,14 @@ o We should offer partial results when a host
|
|||||||
printed that out only, we could potentially isolate it in just one
|
printed that out only, we could potentially isolate it in just one
|
||||||
place.
|
place.
|
||||||
|
|
||||||
|
o [NSE] Consider a script which uses Nmap's detected OS and open port
|
||||||
|
information to print out _possible_ (unverified) vulnerabilities.
|
||||||
|
Of course it is better to have scripts which actually check for
|
||||||
|
vulnerability, but we don't have comprehensive vuln detection yet,
|
||||||
|
so this could still be quite useful.
|
||||||
|
o Marc Ruef is working on a vulnscan.nse script which uses CVE to do
|
||||||
|
this. See this thread: http://seclists.org/nmap-dev/2010/q2/527
|
||||||
|
|
||||||
o Consider providing an option which causes Nmap to scan ALL IP
|
o Consider providing an option which causes Nmap to scan ALL IP
|
||||||
addresses returned for a given name. So if "google.com" returns 4
|
addresses returned for a given name. So if "google.com" returns 4
|
||||||
names, scan them all (right now we print them all but only scan
|
names, scan them all (right now we print them all but only scan
|
||||||
|
|||||||
Reference in New Issue
Block a user