Nmap

Aus SchnallIchNet
Wechseln zu: Navigation, Suche

Some specials for nmap


NSE (Scripting Engine)

with the scripting engine you are able to write powerful plugin-scripts for nmap
or use a wide set of ready to use scripts for nmap.
standardscripts can be found here: /usr/local/share/nmap/scripts
or here on some distros: /usr/share/nmap/scripts

you can find a book on how to write scripts (in LUA) for nmap 5 here: NSE Writing Scripts

you can execute these scripts easy by specifying them with --script
or use a set of scripts by specifying one of the script-categories (e.g. default, vuln, intrusive etc.) find categories HERE.

nmap -sV --mtu=512 --script=default,vuln VICTIM-HOST-OR-IP

here are the script-related parameters:

-sC: equivalent to --script=default
--script=<Lua scripts>: <Lua scripts> is a comma separated list of
                        directories, script-files or script-categories
--script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts
--script-trace: Show all data sent and received
--script-updatedb: Update the script database.


Script Categories

actual categories can be found here...
the actual (per creation date of this page) list is:

auth

    These scripts deal with authentication credentials (or bypassing them) on the target system. 
    Examples include x11-access, ftp-anon, and oracle-enum-users. Scripts which use brute force attacks 
    to determine credentials are placed in the brute category instead.


broadcast

    Scripts in this category typically do discovery of hosts not listed on the command line by 
    broadcasting on the local network. Use the newtargets script argument to allow these scripts 
    to automatically add the hosts they discover to the Nmap scanning queue.


brute

    These scripts use brute force attacks to guess authentication credentials of a remote server. 
    Nmap contains scripts for brute forcing dozens of protocols, including http-brute, oracle-brute, snmp-brute, etc.


default

    These scripts are the default set and are run when using the -sC or -A options rather than listing scripts with 
    --script. This category can also be specified explicitly like any other using --script=default. Many factors are 
    considered in deciding whether a script should be run by default:

    Speed

        A default scan must finish quickly, which excludes brute force authentication crackers, web spiders, and any 
        other scripts which can take minutes or hours to scan a single service.

    Usefulness

        Default scans need to produce valuable and actionable information. If even the script author has trouble 
        explaining why an average networking or security professional would find the output valuable, the script should not 
        run by default. The script may still be worth including in Nmap so that administrators can run for those occasions 
        when they do need the extra information.

    Verbosity

        Nmap output is used for a wide variety of purposes and needs to be readable and concise. A script which frequently 
        produces pages full of output should not be added to the default category. When there is no important information to 
        report, NSE scripts (particularly default ones) should return nothing. Checking for an obscure vulnerability may be OK 
        by default as long as it only produces output when that vulnerability discovered.

    Reliability

        Many scripts use heuristics and fuzzy signature matching to reach conclusions about the target host or service. 
        Examples include sniffer-detect and sql-injection. If the script is often wrong, it doesn't belong in the default 
        category where it may confuse or mislead casual users. Users who specify a script or category directly are generally more 
        advanced and likely know how the script works or at least where to find its documentation.

    Intrusiveness

        Some scripts are very intrusive because they use significant resources on the remote system, are likely to crash the 
        system or service, or are likely to be perceived as an attack by the remote administrators. The more intrusive a script 
        is, the less suitable it is for the default category. Default scripts are almost always in the safe category too, though 
        we occasionally allow intrusive scripts by default when they are only mildly intrusive and score well in the other factors.

    Privacy

        Some scripts, particularly those in the external category described later, divulge information to third parties by 
        their very nature. For example, the whois script must divulge the target IP address to regional whois registries. 
        We have also considered (and decided against) adding scripts which check target SSH and SSL key fingerprints against 
        Internet weak key databases. The more privacy-invasive a script is, the less suitable it is for default category inclusion.

    We don't have exact thresholds for each of these criteria, and many of them are subjective. All of these factors are considered 
    together when making a decision whether to promote a script into the default category. A few default scripts are identd-owners 
    (determines the username running remote services using identd), http-auth (obtains authentication scheme and realm of web sites 
    requiring authentication), and ftp-anon (tests whether an FTP server allows anonymous access).


discovery

    These scripts try to actively discover more about the network by querying public registries, SNMP-enabled devices, 
    directory services, and the like. Examples include html-title (obtains the title of the root path of web sites), 
    smb-enum-shares (enumerates Windows shares), and snmp-sysdescr (extracts system details via SNMP).


dos

    Scripts in this category may cause denial of service, usually because they crash a service as a side effect of testing 
    it for a vulnerability.


exploit

    These scripts aim to actively exploit some vulnerability.


external

    Scripts in this category may send data to a third-party database or other network resource. An example of this is whois, 
    which makes a connection to whois servers to learn about the address of the target. There is always the possibility 
    that operators of the third-party database will record anything you send to them, which in many cases will include your IP address 
    and the address of the target. Most scripts involve traffic strictly between the scanning computer and the client; any that 
    do not are placed in this category.


fuzzer

    This category contains scripts which are designed to send server software unexpected or randomized fields in each packet. While 
    this technique can useful for finding undiscovered bugs and vulnerabilities in software, it is both a slow process and bandwidth 
    intensive. An example of a script in this category is dns-fuzz, which bombards a DNS server with slightly flawed domain requests until 
    either the server crashes or a user specified time limit elapses.


intrusive

    These are scripts that cannot be classified in the safe category because the risks are too high that they will crash the target system, 
    use up significant resources on the target host (such as bandwidth or CPU time), or otherwise be perceived as malicious by the 
    target's system administrators. Examples are http-open-proxy (which attempts to use the target server as an HTTP proxy) and 
    snmp-brute (which tries to guess a device's SNMP community string by sending common values such as public, private, and cisco). 
    Unless a script is in the special version category, it should be categorized as either safe or intrusive.


malware

    These scripts test whether the target platform is infected by malware or backdoors. Examples include smtp-strangeport, which watches 
    for SMTP servers running on unusual port numbers, and auth-spoof, which detects identd spoofing daemons which provide a fake answer 
    before even receiving a query. Both of these behaviors are commonly associated with malware infections.


safe

    Scripts which weren't designed to crash services, use large amounts of network bandwidth or other resources, or exploit security 
    holes are categorized as safe. These are less likely to offend remote administrators, though (as with all other Nmap features) 
    we cannot guarantee that they won't ever cause adverse reactions. Most of these perform general network discovery. 
    Examples are ssh-hostkey (retrieves an SSH host key) and html-title (grabs the title from a web page). Scripts in the version 
    category are not categorized by safety, but any other scripts which aren't in safe should be placed in intrusive.


version

    The scripts in this special category are an extension to the version detection feature and cannot be selected explicitly. 
    They are selected to run only if version detection (-sV) was requested. Their output cannot be distinguished from version detection 
    output and they do not produce service or host script results. Examples are skypev2-version, pptp-version, and iax2-version.


vuln

    These scripts check for specific known vulnerabilities and generally only report results if they are found. Examples include 
    realvnc-auth-bypass and afp-path-vuln.


see also

root-on-fire howto