mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
mostly documentation cleanup, though I also moved ftp-anon into the safe category since I don't think it is any more intrusive than other scripts in that category
This commit is contained in:
@@ -7,7 +7,7 @@ turn queries a third-party service provided by Team Cymru
|
|||||||
use by Nmap.
|
use by Nmap.
|
||||||
|
|
||||||
The responses to these queries contain both Origin and Peer ASNs and
|
The responses to these queries contain both Origin and Peer ASNs and
|
||||||
their descriptions, displayed along with the BG Prefix and Country Code.
|
their descriptions, displayed along with the BGP Prefix and Country Code.
|
||||||
|
|
||||||
The script caches results to reduce the number of queries and should
|
The script caches results to reduce the number of queries and should
|
||||||
perform a single query for all scanned targets in a BG Prefix present in
|
perform a single query for all scanned targets in a BG Prefix present in
|
||||||
@@ -16,7 +16,7 @@ Team Cymru's database.
|
|||||||
Be aware that any targets against which this script is run will be sent
|
Be aware that any targets against which this script is run will be sent
|
||||||
to and potentially recorded by one or more DNS servers and Team Cymru.
|
to and potentially recorded by one or more DNS servers and Team Cymru.
|
||||||
In addition your IP address will be sent along with the ASN to a DNS
|
In addition your IP address will be sent along with the ASN to a DNS
|
||||||
server (your default DNS server, or whichever you specified with the
|
server (your default DNS server, or whichever one you specified with the
|
||||||
<code>dns</code> script argument).
|
<code>dns</code> script argument).
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks a DNS server for the predictable-port recursion vulnerability.
|
Checks a DNS server for the predictable-port recursion vulnerability.
|
||||||
Predictable source ports can make a DNS server vulnerable to cache poisoning
|
Predictable source ports can make a DNS server vulnerable to cache poisoning
|
||||||
attacks (CVE-2008-1447).
|
attacks (see CVE-2008-1447).
|
||||||
|
|
||||||
The script works by querying porttest.dns-oarc.net.
|
The script works by querying porttest.dns-oarc.net.
|
||||||
Be aware that any targets against which this script is run will be sent to and
|
Be aware that any targets against which this script is run will be sent to and
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks a DNS server for the predictable-TXID DNS recursion
|
Checks a DNS server for the predictable-TXID DNS recursion
|
||||||
vulnerability. Predictable TXID values can make a DNS server vulnerable to
|
vulnerability. Predictable TXID values can make a DNS server vulnerable to
|
||||||
cache poisoning attacks (CVE-2008-1447).
|
cache poisoning attacks (see CVE-2008-1447).
|
||||||
|
|
||||||
The script works by querying txidtest.dns-oarc.net.
|
The script works by querying txidtest.dns-oarc.net.
|
||||||
Be aware that any targets against which this script is run will be sent to and
|
Be aware that any targets against which this script is run will be sent to and
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to get a list of usernames via the finger service.
|
Attempts to retrieve a list of usernames using the finger service.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
author = "Eddie Bell <ejlbell@gmail.com>"
|
author = "Eddie Bell <ejlbell@gmail.com>"
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ Checks if an FTP server allows anonymous logins.
|
|||||||
|
|
||||||
author = "Eddie Bell <ejlbell@gmail.com>"
|
author = "Eddie Bell <ejlbell@gmail.com>"
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
categories = {"default", "auth", "intrusive"}
|
categories = {"default", "auth", "safe"}
|
||||||
|
|
||||||
require "shortport"
|
require "shortport"
|
||||||
|
|
||||||
|
|||||||
@@ -3,14 +3,16 @@ Shows the title of the default page of a web server.
|
|||||||
|
|
||||||
The script will follow no more than one HTTP redirect, and only if the
|
The script will follow no more than one HTTP redirect, and only if the
|
||||||
redirection leads to the same host. The script may send a DNS query to
|
redirection leads to the same host. The script may send a DNS query to
|
||||||
determine if the host the redirect leads to has the same IP address as the
|
determine whether the host the redirect leads to has the same IP address as the
|
||||||
original target.
|
original target.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
--@output
|
--@output
|
||||||
-- 80/tcp open http syn-ack
|
-- Interesting ports on scanme.nmap.org (64.13.134.52):
|
||||||
-- |_ html-title: Foo.
|
-- PORT STATE SERVICE
|
||||||
|
-- 80/tcp open http
|
||||||
|
-- |_ html-title.nse: Go ahead and ScanMe!
|
||||||
|
|
||||||
author = "Diman Todorov <diman.todorov@gmail.com>"
|
author = "Diman Todorov <diman.todorov@gmail.com>"
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Gets the authentication scheme and realm of a web service that requires
|
Retrieves the authentication scheme and realm of a web service that requires
|
||||||
authentication.
|
authentication.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
description=[[
|
description=[[
|
||||||
Checks if an HTTP proxy is open.
|
Checks if an HTTP proxy is open.
|
||||||
|
|
||||||
The script attempts to connect to www.google.com through the proxy and checks
|
The script attempts to connect to www.google.com through the (possible) proxy and checks
|
||||||
for a <code>Server: gws</code> header field in the response.
|
for a <code>Server: gws</code> header field in the response.
|
||||||
|
|
||||||
If the target is an open proxy, this script will cause the target to retrieve a
|
If the target is an open proxy, this script causes the target to retrieve a
|
||||||
web page from www.google.com.
|
web page from www.google.com.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks if a web server is vulnerable to directory traversal by attempting to
|
Checks if a web server is vulnerable to directory traversal by attempting to
|
||||||
retrieve /etc/passwd.
|
retrieve <code>/etc/passwd</code> using various traversal methods such as requestiong <code>../../../../etc/passwd</code>.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
-- 07/20/2007:
|
-- 07/20/2007:
|
||||||
|
|||||||
@@ -1,8 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Detects the UDP IAX2 service.
|
Detects the UDP IAX2 service.
|
||||||
|
|
||||||
The script sends an IAX Control Frame POKE request and checks for a proper
|
The script sends an Inter-Asterisk eXchange (IAX) Revision 2 Control Frame POKE request and checks for a proper response. This protocol is used to enable VoIP connections between servers as well as client-server communication.
|
||||||
response.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
author = "Ferdy Riphagen <f.riphagen@nsec.nl>"
|
author = "Ferdy Riphagen <f.riphagen@nsec.nl>"
|
||||||
|
|||||||
@@ -1,8 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to find the owner of a scanned port.
|
Attempts to find the owner of an open TCP port by querying an identd
|
||||||
|
(auth - port 113) daemon which must also be open on the target system.
|
||||||
The script makes a connection to the auth port (113) and queries the owner of
|
|
||||||
an open port.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
author = "Diman Todorov <diman.todorov@gmail.com>"
|
author = "Diman Todorov <diman.todorov@gmail.com>"
|
||||||
|
|||||||
@@ -7,11 +7,11 @@ It uses STATS, LUSERS, and other queries to obtain this information.
|
|||||||
---
|
---
|
||||||
-- @output
|
-- @output
|
||||||
-- 6665/tcp open irc
|
-- 6665/tcp open irc
|
||||||
-- | irc-info: Server: foo.bar.net
|
-- | irc-info: Server: target.example.org
|
||||||
-- | Version: hyperion-1.0.2b(381). foo.bar.net
|
-- | Version: hyperion-1.0.2b(381). target.example.org
|
||||||
-- | Lservers/Lusers: 0/4204
|
-- | Lservers/Lusers: 0/4204
|
||||||
-- | Uptime: 106 days, 2:46:30
|
-- | Uptime: 106 days, 2:46:30
|
||||||
-- | Source host: bar.foo.net
|
-- | Source host: source.example.org
|
||||||
-- |_ Source ident: OK n=nmap
|
-- |_ Source ident: OK n=nmap
|
||||||
|
|
||||||
author = "Doug Hoyte"
|
author = "Doug Hoyte"
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to extract information from Microsoft SQL Server.
|
Attempts to extract information from Microsoft SQL Server instances.
|
||||||
]]
|
]]
|
||||||
-- rev 1.0 (2007-06-09)
|
-- rev 1.0 (2007-06-09)
|
||||||
|
|
||||||
|
|||||||
@@ -3,8 +3,8 @@ Connects to a MySQL server and prints information such as the protocol and
|
|||||||
version numbers, thread ID, status, capabilities, and the password salt.
|
version numbers, thread ID, status, capabilities, and the password salt.
|
||||||
|
|
||||||
If service detection is performed and the server appears to be blocking
|
If service detection is performed and the server appears to be blocking
|
||||||
our host or is blocked from too many connections, then we don't bother
|
our host or is blocked because of too many connections, then this script isn't run
|
||||||
running this script (see the portrule).
|
(see the portrule).
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
@@ -13,7 +13,7 @@ running this script (see the portrule).
|
|||||||
-- | mysql-info: Protocol: 10
|
-- | mysql-info: Protocol: 10
|
||||||
-- | Version: 5.0.51a-3ubuntu5.1
|
-- | Version: 5.0.51a-3ubuntu5.1
|
||||||
-- | Thread ID: 7
|
-- | Thread ID: 7
|
||||||
-- | Some Capabilities: Connect with DB, Compress, Transactions, Secure Connection
|
-- | Some Capabilities: Connect with DB, Transactions, Secure Connection
|
||||||
-- | Status: Autocommit
|
-- | Status: Autocommit
|
||||||
-- |_ Salt: bYyt\NQ/4V6IN+*3`imj
|
-- |_ Salt: bYyt\NQ/4V6IN+*3`imj
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempt's to get the target's NetBIOS names and MAC address.
|
Attempt's to retrieve the target's NetBIOS names and MAC address.
|
||||||
|
|
||||||
By default, the script displays the name of the computer and the logged-in
|
By default, the script displays the name of the computer and the logged-in
|
||||||
user; if the verbosity is turned up, it displays all names the system thinks it
|
user; if the verbosity is turned up, it displays all names the system thinks it
|
||||||
@@ -12,14 +12,14 @@ owns.
|
|||||||
--
|
--
|
||||||
-- @output
|
-- @output
|
||||||
-- (no verbose)\n
|
-- (no verbose)\n
|
||||||
-- |_ nbstat: NetBIOS name: TEST1, NetBIOS user: RON, NetBIOS MAC: 00:0c:29:f9:d9:28\n
|
-- |_ nbstat: NetBIOS name: TST, NetBIOS user: RON, NetBIOS MAC: 00:0c:29:f9:d9:28\n
|
||||||
--\n
|
--\n
|
||||||
-- (verbose)\n
|
-- (verbose)\n
|
||||||
-- | nbstat: NetBIOS name: TEST1, NetBIOS user: RON, NetBIOS MAC: 00:0c:29:f9:d9:28\n
|
-- | nbstat: NetBIOS name: TST, NetBIOS user: RON, NetBIOS MAC: 00:0c:29:f9:d9:28\n
|
||||||
-- | Name: TEST1<00> Flags: <unique><active>\n
|
-- | Name: TST<00> Flags: <unique><active>\n
|
||||||
-- | Name: TEST1<20> Flags: <unique><active>\n
|
-- | Name: TST<20> Flags: <unique><active>\n
|
||||||
-- | Name: WORKGROUP<00> Flags: <group><active>\n
|
-- | Name: WORKGROUP<00> Flags: <group><active>\n
|
||||||
-- | Name: TEST1<03> Flags: <unique><active>\n
|
-- | Name: TST<03> Flags: <unique><active>\n
|
||||||
-- | Name: WORKGROUP<1e> Flags: <group><active>\n
|
-- | Name: WORKGROUP<1e> Flags: <group><active>\n
|
||||||
-- | Name: RON<03> Flags: <unique><active>\n
|
-- | Name: RON<03> Flags: <unique><active>\n
|
||||||
-- | Name: WORKGROUP<1d> Flags: <unique><active>\n
|
-- | Name: WORKGROUP<1d> Flags: <unique><active>\n
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Retrieves POP3 server capabilities.
|
Retrieves POP3 email server capabilities.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to extract system information from the PPTP service.
|
Attempts to extract system information from the point-to-point tunneling protocol (PPTP) service.
|
||||||
]]
|
]]
|
||||||
-- rev 0.2 (11-14-2007)
|
-- rev 0.2 (11-14-2007)
|
||||||
|
|
||||||
|
|||||||
@@ -1,14 +1,14 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks if SMTP is running on a non-standard port.
|
Checks if SMTP is running on a non-standard port.
|
||||||
|
|
||||||
This usually indicates crackers or script kiddies have set up a backdoor on the
|
This may indicate that crackers or script kiddies have set up a backdoor on the
|
||||||
system to send spam or control your machine.
|
system to send spam or control the machine.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
-- @output
|
-- @output
|
||||||
-- 22/tcp open ssh
|
-- 22/tcp open smtp
|
||||||
-- |_ smtp-strangeport: Warning: smtp is running on a strange port
|
-- |_ smtp-strangeport: Mail server on unusual port: possible malware
|
||||||
|
|
||||||
author = "Diman Todorov <diman.todorov@gmail.com>"
|
author = "Diman Todorov <diman.todorov@gmail.com>"
|
||||||
|
|
||||||
@@ -35,6 +35,6 @@ portrule = function(host, port)
|
|||||||
end
|
end
|
||||||
|
|
||||||
action = function()
|
action = function()
|
||||||
return "Warning: smtp is running on a strange port"
|
return "Mail server on unusual port: possible malware"
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks if a target on a local Ethernet has its network card in promiscuous mode.
|
Checks if a target on a local Ethernet has its network card in promiscuous mode.
|
||||||
|
|
||||||
The technique is described at
|
The techniques used are described at
|
||||||
http://www.securityfriday.com/promiscuous_detection_01.pdf.
|
http://www.securityfriday.com/promiscuous_detection_01.pdf.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Attempts to find an SNMP community string by brute force.
|
Attempts to find an SNMP community string by brute force guessing.
|
||||||
]]
|
]]
|
||||||
-- 2008-07-03
|
-- 2008-07-03
|
||||||
|
|
||||||
|
|||||||
@@ -6,14 +6,11 @@ The script spiders an HTTP server looking for URLs containing queries. It then
|
|||||||
proceeds to combine crafted SQL commands with susceptible URLs in order to
|
proceeds to combine crafted SQL commands with susceptible URLs in order to
|
||||||
obtain errors. The errors are analysed to see if the URL is vulnerable to
|
obtain errors. The errors are analysed to see if the URL is vulnerable to
|
||||||
attack. This uses the most basic form of SQL injection but anything more
|
attack. This uses the most basic form of SQL injection but anything more
|
||||||
complication is more suited to a standalone tool. Both meta and HTTP redirects
|
complicated is better suited to a standalone tool. Both meta-style and HTTP redirects
|
||||||
are supported.
|
are supported.
|
||||||
|
|
||||||
It is not advisable to run this against unknown hosts.
|
We may not have access to the target web server's true hostname, which can prevent access to
|
||||||
|
virtually hosted sites. This script only follows absolute links when the host name component is the same as the target server's reverse-DNS name.
|
||||||
We may not have access to the server's true hostname. This means we cannot
|
|
||||||
access virtually hosted sites and cannot follow absolute links when the
|
|
||||||
hostname is different from the resolved IP address
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
require('url')
|
require('url')
|
||||||
|
|||||||
@@ -1,9 +1,7 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Shows SSH hostkeys.
|
Shows SSH hostkeys.
|
||||||
|
|
||||||
Shows fingerprint or fingerprint and key depending on verbosity level. Puts the
|
Shows the target SSH server's key fingerprint and (with high enough verbosity level) the public key itself. It records the discovered host keys in <code>nmap.registry</code> for use by other scripts. Output can be controlled with the <code>ssh_hostkey</code> script argument.
|
||||||
found hostkeys in nmap.registry for other scripts to use them. You can control
|
|
||||||
the output with the <code>ssh_hostkey</code> script argument.
|
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Checks if an SSH server supports SSH Protocol Version 1.
|
Checks if an SSH server supports the obsolete and less secure SSH Protocol Version 1.
|
||||||
]]
|
]]
|
||||||
author = "Brandon Enright <bmenrigh@ucsd.edu>"
|
author = "Brandon Enright <bmenrigh@ucsd.edu>"
|
||||||
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
description = [[
|
description = [[
|
||||||
Determines whether the server (still) supports SSL-v2, and what ciphers it
|
Determines whether the server supports obsolete and less secure SSL-v2, and discovers which ciphers it
|
||||||
offers.
|
supports.
|
||||||
]]
|
]]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
Reference in New Issue
Block a user