-
Hi!
I'm running into issue running the script, please see debug info below:
```
Starting Nmap 6.40 ( http://nmap.org ) at 2021-02-24 12:44 PST
PORTS: Using top 1000 ports found open (TCP:1000,…
-
Issue Type: Bug
sdfsdf
VS Code version: Code 1.56.2 (054a9295330880ed74ceaedda236253b4f39a335, 2021-05-12T17:44:30.902Z)
OS version: Darwin x64 19.5.0
System Info
|Item|Value|
|---|---…
-
**Describe the issue**
nmap scripting is not reliable in scanning HTTPS, see these issues:
https://github.com/GossiTheDog/scanning/issues/2
https://github.com/nmap/nmap/issues/2094
-
### Current Behavior
After updating to 3.1.9 netbox-docker:latest-ldap + netbox-bgp, netbox-qrcode, & Caddy Reverse Prody
OS: Ubuntu 20.04 LTS fully patched
Docker: 20.10.12
Docker-Compose: 1,29…
-
This is a clarification question more so than an issue.
In the text of the http-vuln-cve2021-26855.nse file it provides sample output of:
-- @output
-- PORT STATE SERVICE
-- 443/tcp open …
-
Original script:
https://github.com/alt3kx/CVE-2021-21972/blob/main/CVE-2021-21972.nse
-
I noticed when using NMAP 7.70 to scan Windows Server 2008R2 and 2012R2, it does not return TLSv1.2 or any of its ciphers. If I scan a Windows 2016 server with NMAP 7.70 it does return TLSv1.2 and ci…
ghost updated
3 years ago
-
Average DNS queries performed: 217/sec, Average retries required: 82.03%
…
-
## Steps to reproduce
How'd you do it?
1. Create test target on local laptop ProFTPD 1.3.3
```
$ sudo docker run -p 2021:2021 proftpd_vuln:latest
- using TCP receive buffer size of 13107…
capme updated
3 years ago
-
With MSExchange hacking still making headlines every day since 4th March 2021 the attacks are going on all over the world with tens of thousands servers hacked he need a CVE-2021-26855 vuln detection …